This repository was archived by the owner on Mar 31, 2025. It is now read-only.
chore(deps): update module github.com/containerd/containerd to v1.6.26 [security]#141
Merged
renovate[bot] merged 1 commit intomainfrom Jan 24, 2025
Conversation
Contributor
Author
ℹ Artifact update noticeFile name: app/platform/fabric/e2e-test/specs/go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
Reviewer's Guide by SourceryThis PR updates the github.com/containerd/containerd module from v1.3.0 to v1.5.16, which includes several security fixes. No diagrams generated as the changes look simple and do not need a visual representation. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
1be46f0 to
c736fc4
Compare
cbf978d to
d441465
Compare
roderik
pushed a commit
that referenced
this pull request
Jan 24, 2025
This PR contains the following updates: | Package | Type | Update | Change | OpenSSF | |---|---|---|---|---| | [npm-run-all2](https://redirect.github.com/bcomnes/npm-run-all2) | dependencies | major | [`5.0.0` -> `7.0.2`](https://renovatebot.com/diffs/npm/npm-run-all2/5.0.0/7.0.2) | [](https://securityscorecards.dev/viewer/?uri=github.com/bcomnes/npm-run-all2) | --- ### Release Notes <details> <summary>bcomnes/npm-run-all2 (npm-run-all2)</summary> ### [`v7.0.2`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v702) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v7.0.1...v7.0.2) ##### Merged - Upgrade: Bump neostandard from 0.11.9 to 0.12.0 [`#164`](https://redirect.github.com/bcomnes/npm-run-all2/pull/164) - Upgrade: Bump codecov/codecov-action from 4 to 5 [`#161`](https://redirect.github.com/bcomnes/npm-run-all2/pull/161) ##### Commits - Raise cross-spawn version floor to ^7.0.6 [`45a9e19`](https://redirect.github.com/bcomnes/npm-run-all2/commit/45a9e191b75e0b76433409808b6219d1f4dffe83) - Merge pull request [#​163](https://redirect.github.com/bcomnes/npm-run-all2/issues/163) from bcomnes/dependabot/npm_and_yarn/mocha-11.0.1 [`285967a`](https://redirect.github.com/bcomnes/npm-run-all2/commit/285967a3fc5076d8c22ecb14823eb6fc274dd835) - Upgrade: Bump mocha from 10.8.2 to 11.0.1 [`5d1aea5`](https://redirect.github.com/bcomnes/npm-run-all2/commit/5d1aea58f17abd201515f737c06bbe8044d05d21) ### [`v7.0.1`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v701) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v7.0.0...v7.0.1) ##### Commits - Revert engine range bump back to Node 18 [`b2e849b`](https://redirect.github.com/bcomnes/npm-run-all2/commit/b2e849bf8d31135751dd7458724344dd1bca120e) ### [`v7.0.0`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v700---2024-10-21) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.6...v7.0.0) ##### Merged - Prevent a throw when looking up undefined results [`#158`](https://redirect.github.com/bcomnes/npm-run-all2/pull/158) ##### Commits - **Breaking change:** Bump node engines ^18.17.0 || >=20.5.0 [`49b95f0`](https://redirect.github.com/bcomnes/npm-run-all2/commit/49b95f0c4905504a94d1a7ce87fbb7e77ab60df5) - Merge pull request [#​156](https://redirect.github.com/bcomnes/npm-run-all2/issues/156) from bcomnes/rm-rf-rimraf [`c661ffc`](https://redirect.github.com/bcomnes/npm-run-all2/commit/c661ffc942e09a68b1a553190d3a550dc0f6a39c) - Remove rimraf [`c77e085`](https://redirect.github.com/bcomnes/npm-run-all2/commit/c77e0856c65115b32788c3e9a1e441ba69fbd430) ### [`v6.2.6`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v626---2024-10-21) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/ee3bf122e700102b9ab27b1d172d98856765f4a4...v6.2.6) ##### Commits - Prevent a throw when looking up undefined results [`d928f9a`](https://redirect.github.com/bcomnes/npm-run-all2/commit/d928f9ad59c00a20797c90d35b62ef0aecf0c364) ### [`v6.2.5`](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.4...ee3bf122e700102b9ab27b1d172d98856765f4a4) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.4...ee3bf122e700102b9ab27b1d172d98856765f4a4) ### [`v6.2.4`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v624) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.3...v6.2.4) ##### Merged - Switch to JS-based `which` command [`#154`](https://redirect.github.com/bcomnes/npm-run-all2/pull/154) ##### Fixed - Switch to JS-based `which` command [`#153`](https://redirect.github.com/bcomnes/npm-run-all2/issues/153) ### [`v6.2.3`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v623) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.2...v6.2.3) ##### Commits - Merge pull request [#​151](https://redirect.github.com/bcomnes/npm-run-all2/issues/151) from bcomnes/fix-pnpm-agian [`c43fa2b`](https://redirect.github.com/bcomnes/npm-run-all2/commit/c43fa2b677442c710a29654a333b15c8de4f00ab) - Avoid passing config fields as flags for pnpm [`dc2d7da`](https://redirect.github.com/bcomnes/npm-run-all2/commit/dc2d7da61cf0898d0bc2b25747e588325e06b9a9) ### [`v6.2.2`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v622) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.1...v6.2.2) ##### Commits - Revert "Compatibility: npm, yarn and pnpm run scripts" [`fc35f0d`](https://redirect.github.com/bcomnes/npm-run-all2/commit/fc35f0dc4f78afc1c631fa94b6ac85ba0fb0e7b1) ### [`v6.2.1`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v621) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.0...v6.2.1) ##### Merged - Compatibility: npm, yarn and pnpm run scripts [`#143`](https://redirect.github.com/bcomnes/npm-run-all2/pull/143) - Use neostandard + add more static code analysis [`#142`](https://redirect.github.com/bcomnes/npm-run-all2/pull/142) - Upgrade: Bump c8 from 9.1.0 to 10.0.0 [`#141`](https://redirect.github.com/bcomnes/npm-run-all2/pull/141) - Upgrade: Bump p-queue from 7.4.1 to 8.0.1 [`#138`](https://redirect.github.com/bcomnes/npm-run-all2/pull/138) ### [`v6.2.0`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v620) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.1.2...v6.2.0) ##### Merged - Placeholder that unfolds into multiple tasks [`#134`](https://redirect.github.com/bcomnes/npm-run-all2/pull/134) - 📝 add compatibility note for pnpm. [`#136`](https://redirect.github.com/bcomnes/npm-run-all2/pull/136) - Upgrade: Bump codecov/codecov-action from 3 to 4 [`#131`](https://redirect.github.com/bcomnes/npm-run-all2/pull/131) ### [`v6.1.2`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v612) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.1.1...v6.1.2) ##### Merged - feat: move to read-package-json-fast [`#130`](https://redirect.github.com/bcomnes/npm-run-all2/pull/130) - Upgrade: Bump c8 from 8.0.1 to 9.0.0 [`#127`](https://redirect.github.com/bcomnes/npm-run-all2/pull/127) - Upgrade: Bump github/codeql-action from 2 to 3 [`#126`](https://redirect.github.com/bcomnes/npm-run-all2/pull/126) - Upgrade: Bump actions/setup-node from 3 to 4 [`#123`](https://redirect.github.com/bcomnes/npm-run-all2/pull/123) ##### Commits - Publish the whole project [`3dde20c`](https://redirect.github.com/bcomnes/npm-run-all2/commit/3dde20c1c8fa973045773e03f4fc121360fdbed4) - Utilize CJS require for 'read-package-json-fast' [`605ca15`](https://redirect.github.com/bcomnes/npm-run-all2/commit/605ca15d9adee3ce14da6fcaa98cb14d9c03795c) - Update FUNDING.yml [`c838ee9`](https://redirect.github.com/bcomnes/npm-run-all2/commit/c838ee9eea06e545d1a7f25592f7beb8468f1afd) ### [`v6.1.1`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v611) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.1.0...v6.1.1) ##### Commits - Add an npm-run-all2 bin alias [`e6dc017`](https://redirect.github.com/bcomnes/npm-run-all2/commit/e6dc0175006a9a703c1256949f8424922043a33a) - Fix npx on node 16 [`cfbd974`](https://redirect.github.com/bcomnes/npm-run-all2/commit/cfbd974a5990e8d549ae8bf7bfb632424ff4990b) ### [`v6.1.0`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v610---2023-10-04) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.6...v6.1.0) ##### Merged - Upgrade: Bump actions/checkout from 3 to 4 [`#119`](https://redirect.github.com/bcomnes/npm-run-all2/pull/119) ##### Commits - Lets avoid spawn.sync [`a3ee6cd`](https://redirect.github.com/bcomnes/npm-run-all2/commit/a3ee6cd9e051471bfd7b1b4d153aa260fc9b6634) - Add support for pnpm ([#​117](https://redirect.github.com/bcomnes/npm-run-all2/issues/117)) [`3df3708`](https://redirect.github.com/bcomnes/npm-run-all2/commit/3df37084ab1ae55f873fcbb449ad0d7df8bc328f) ### [`v6.0.6`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v606---2023-07-04) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.5...v6.0.6) ##### Merged - Update all esm only packages [`#114`](https://redirect.github.com/bcomnes/npm-run-all2/pull/114) - Upgrade: Bump c8 from 7.14.0 to 8.0.0 [`#111`](https://redirect.github.com/bcomnes/npm-run-all2/pull/111) - Delete .nycrc [`#109`](https://redirect.github.com/bcomnes/npm-run-all2/pull/109) - Update CodeQL workflow [`#110`](https://redirect.github.com/bcomnes/npm-run-all2/pull/110) ##### Commits - Lint fix and a few hand fixes [`2c81236`](https://redirect.github.com/bcomnes/npm-run-all2/commit/2c8123694b73084f37b68eb6719632024331d2e9) - Fix tests [`79e2c97`](https://redirect.github.com/bcomnes/npm-run-all2/commit/79e2c97c5b32c46d5cf64ce37b3b78cf4035498e) - Update p-queue and ansi-styles [`10b075c`](https://redirect.github.com/bcomnes/npm-run-all2/commit/10b075c849153822e9abc1447222d186a1cd6136) ### [`v6.0.5`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v605---2023-04-03) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.4...v6.0.5) ##### Merged - Upgrade: Bump bcomnes/npm-bump from 2.1.0 to 2.2.1 [`#104`](https://redirect.github.com/bcomnes/npm-run-all2/pull/104) - Upgrade: Bump minimatch from 6.2.0 to 7.0.0 [`#103`](https://redirect.github.com/bcomnes/npm-run-all2/pull/103) - Upgrade: Bump minimatch from 5.1.4 to 6.0.4 [`#102`](https://redirect.github.com/bcomnes/npm-run-all2/pull/102) - Upgrade: Bump fs-extra from 10.1.0 to 11.1.0 [`#98`](https://redirect.github.com/bcomnes/npm-run-all2/pull/98) ##### Commits - Merge pull request [#​105](https://redirect.github.com/bcomnes/npm-run-all2/issues/105) from bcomnes/dependabot/npm_and_yarn/minimatch-8.0.2 [`cbf78c8`](https://redirect.github.com/bcomnes/npm-run-all2/commit/cbf78c8155365db9ec06cb8054bc821e057d06e2) - Upgrade: Bump minimatch from 7.4.4 to 8.0.2 [`c90d02b`](https://redirect.github.com/bcomnes/npm-run-all2/commit/c90d02b02df6dd33cbab01caac44b9729e012bb9) - Merge pull request [#​101](https://redirect.github.com/bcomnes/npm-run-all2/issues/101) from bcomnes/dependabot/npm_and_yarn/rimraf-4.0.4 [`d0d46a2`](https://redirect.github.com/bcomnes/npm-run-all2/commit/d0d46a2b0aa87a3c0c79b78a013415e7902c8324) ### [`v6.0.4`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v604---2022-11-09) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.3...v6.0.4) ##### Merged - When running through npx, use the npm that should be next to it. [`#96`](https://redirect.github.com/bcomnes/npm-run-all2/pull/96) ### [`v6.0.3`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v603---2022-11-09) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.2...v6.0.3) ##### Merged - Upgrade: Bump jsdoc from 3.6.11 to 4.0.0 [`#95`](https://redirect.github.com/bcomnes/npm-run-all2/pull/95) - Upgrade: Bump bcomnes/npm-bump from 2.0.2 to 2.1.0 [`#92`](https://redirect.github.com/bcomnes/npm-run-all2/pull/92) - docs: update minimum supported Node version [`#90`](https://redirect.github.com/bcomnes/npm-run-all2/pull/90) ##### Commits - Merge pull request [#​94](https://redirect.github.com/bcomnes/npm-run-all2/issues/94) from MarmadileManteater/runjs-being-called-instead-of-npm-run [`da913f9`](https://redirect.github.com/bcomnes/npm-run-all2/commit/da913f9481543907457bd2298ad17192a4420874) - Use NPM_CLI_JS over npm_execpath [`0224167`](https://redirect.github.com/bcomnes/npm-run-all2/commit/022416740f0d9cf8eae2f2e4ca4de8d09a6b67d8) - Add a proper check for yarn [`bb41ef6`](https://redirect.github.com/bcomnes/npm-run-all2/commit/bb41ef6fd85a803a4a22e8382f67ea9e3e235b7d) ### [`v6.0.2`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v602---2022-08-16) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.1...v6.0.2) ##### Merged - Update package shell quote [`#89`](https://redirect.github.com/bcomnes/npm-run-all2/pull/89) ### [`v6.0.1`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v601---2022-06-14) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.0...v6.0.1) ##### Commits - Lower bound node engine to ^14.18.0 || >=16.0.0 [`fc2957f`](https://redirect.github.com/bcomnes/npm-run-all2/commit/fc2957f4814848b55bc29b0a0a1def8bfadda18b) ### [`v6.0.0`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v600---2022-06-11) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v5.0.2...v6.0.0) ##### Merged - Move support to node 16 and npm 8 [`#85`](https://redirect.github.com/bcomnes/npm-run-all2/pull/85) - Upgrade: Bump pidtree from 0.5.0 to 0.6.0 [`#84`](https://redirect.github.com/bcomnes/npm-run-all2/pull/84) - Upgrade: Bump mocha from 9.2.2 to 10.0.0 [`#83`](https://redirect.github.com/bcomnes/npm-run-all2/pull/83) - Upgrade: Bump github/codeql-action from 1 to 2 [`#82`](https://redirect.github.com/bcomnes/npm-run-all2/pull/82) - Upgrade: Bump fastify/github-action-merge-dependabot from 3.0.2 to 3.1 [`#78`](https://redirect.github.com/bcomnes/npm-run-all2/pull/78) - Upgrade: Bump codecov/codecov-action from 2 to 3 [`#77`](https://redirect.github.com/bcomnes/npm-run-all2/pull/77) - Upgrade: Bump actions/setup-node from 2 to 3 [`#75`](https://redirect.github.com/bcomnes/npm-run-all2/pull/75) - Upgrade: Bump actions/checkout from 2 to 3 [`#76`](https://redirect.github.com/bcomnes/npm-run-all2/pull/76) - Upgrade: Bump minimatch from 4.2.1 to 5.0.0 [`#74`](https://redirect.github.com/bcomnes/npm-run-all2/pull/74) - Upgrade: Bump minimatch from 3.1.1 to 4.1.1 [`#73`](https://redirect.github.com/bcomnes/npm-run-all2/pull/73) - Upgrade: Bump fastify/github-action-merge-dependabot from 2.7.1 to 3.0.2 [`#72`](https://redirect.github.com/bcomnes/npm-run-all2/pull/72) - Upgrade: Bump fastify/github-action-merge-dependabot from 2.7.0 to 2.7.1 [`#71`](https://redirect.github.com/bcomnes/npm-run-all2/pull/71) - Upgrade: Bump fastify/github-action-merge-dependabot from 2.6.0 to 2.7.0 [`#70`](https://redirect.github.com/bcomnes/npm-run-all2/pull/70) - Upgrade: Bump fastify/github-action-merge-dependabot from 2.5.0 to 2.6.0 [`#69`](https://redirect.github.com/bcomnes/npm-run-all2/pull/69) - Simplify npm scripts [`#64`](https://redirect.github.com/bcomnes/npm-run-all2/pull/64) - Update CI config [`#62`](https://redirect.github.com/bcomnes/npm-run-all2/pull/62) - Add CodeQL workflow [`#65`](https://redirect.github.com/bcomnes/npm-run-all2/pull/65) - Switch to c8 for coverage [`#66`](https://redirect.github.com/bcomnes/npm-run-all2/pull/66) - tests: switch to assert's strict mode [`#67`](https://redirect.github.com/bcomnes/npm-run-all2/pull/67) - Enforce LF in the repo. [`#61`](https://redirect.github.com/bcomnes/npm-run-all2/pull/61) - Upgrade: Bump actions/setup-node from 2.4.0 to 2.4.1 [`#59`](https://redirect.github.com/bcomnes/npm-run-all2/pull/59) - Upgrade: Bump fastify/github-action-merge-dependabot from 2.4.0 to 2.5.0 [`#58`](https://redirect.github.com/bcomnes/npm-run-all2/pull/58) - Upgrade: Bump codecov/codecov-action from 2.0.2 to 2.1.0 [`#57`](https://redirect.github.com/bcomnes/npm-run-all2/pull/57) - Upgrade: Bump fastify/github-action-merge-dependabot from 2.2.0 to 2.4.0 [`#54`](https://redirect.github.com/bcomnes/npm-run-all2/pull/54) - Upgrade: Bump actions/setup-node from 2.3.2 to 2.4.0 [`#53`](https://redirect.github.com/bcomnes/npm-run-all2/pull/53) - Upgrade: Bump actions/setup-node from 2.3.1 to 2.3.2 [`#52`](https://redirect.github.com/bcomnes/npm-run-all2/pull/52) - Upgrade: Bump actions/setup-node from 2.3.0 to 2.3.1 [`#51`](https://redirect.github.com/bcomnes/npm-run-all2/pull/51) - Upgrade: Bump codecov/codecov-action from 2.0.1 to 2.0.2 [`#50`](https://redirect.github.com/bcomnes/npm-run-all2/pull/50) - Upgrade: Bump actions/setup-node from 2.2.0 to 2.3.0 [`#49`](https://redirect.github.com/bcomnes/npm-run-all2/pull/49) - Upgrade: Bump codecov/codecov-action from 1.5.2 to 2.0.1 [`#48`](https://redirect.github.com/bcomnes/npm-run-all2/pull/48) - Upgrade: Bump fastify/github-action-merge-dependabot from 2.1.1 to 2.2.0 [`#47`](https://redirect.github.com/bcomnes/npm-run-all2/pull/47) - Upgrade: Bump actions/setup-node from 2.1.5 to 2.2.0 [`#46`](https://redirect.github.com/bcomnes/npm-run-all2/pull/46) - Upgrade: Bump codecov/codecov-action from 1.5.0 to 1.5.2 [`#44`](https://redirect.github.com/bcomnes/npm-run-all2/pull/44) - Upgrade: Bump mocha from 8.4.0 to 9.0.0 [`#43`](https://redirect.github.com/bcomnes/npm-run-all2/pull/43) - Upgrade: Bump fastify/github-action-merge-dependabot from 2.1.0 to 2.1.1 [`#42`](https://redirect.github.com/bcomnes/npm-run-all2/pull/42) - Upgrade: Bump fastify/github-action-merge-dependabot from 2.0.0 to 2.1.0 [`#41`](https://redirect.github.com/bcomnes/npm-run-all2/pull/41) - Upgrade: Bump gh-release from 5.0.2 to 6.0.0 [`#40`](https://redirect.github.com/bcomnes/npm-run-all2/pull/40) - Upgrade: Bump codecov/codecov-action from 1 to 1.5.0 [`#39`](https://redirect.github.com/bcomnes/npm-run-all2/pull/39) - Upgrade: Bump fs-extra from 9.1.0 to 10.0.0 [`#38`](https://redirect.github.com/bcomnes/npm-run-all2/pull/38) - Upgrade: Bump fastify/github-action-merge-dependabot from v1.2.1 to v2.0.0 [`#33`](https://redirect.github.com/bcomnes/npm-run-all2/pull/33) - Upgrade: Bump fastify/github-action-merge-dependabot [`#32`](https://redirect.github.com/bcomnes/npm-run-all2/pull/32) - Upgrade: Bump fastify/github-action-merge-dependabot from v1.1.1 to v1.2.0 [`#31`](https://redirect.github.com/bcomnes/npm-run-all2/pull/31) - Upgrade: Bump actions/setup-node from v2.1.4 to v2.1.5 [`#30`](https://redirect.github.com/bcomnes/npm-run-all2/pull/30) - Upgrade: Bump gh-release from 4.0.4 to 5.0.0 [`#29`](https://redirect.github.com/bcomnes/npm-run-all2/pull/29) - Upgrade: Bump actions/setup-node from v2.1.3 to v2.1.4 [`#28`](https://redirect.github.com/bcomnes/npm-run-all2/pull/28) - Upgrade: Bump actions/setup-node from v2.1.2 to v2.1.3 [`#27`](https://redirect.github.com/bcomnes/npm-run-all2/pull/27) ##### Fixed - Disable override tests on > npm 7 [`#79`](https://redirect.github.com/bcomnes/npm-run-all2/issues/79) ##### Commits - **Breaking change:** Bump engines to node 16 and npm 8 [`7d19dd4`](https://redirect.github.com/bcomnes/npm-run-all2/commit/7d19dd47ee70286878f380934d18823310355471) - Add auto merge [`e598066`](https://redirect.github.com/bcomnes/npm-run-all2/commit/e598066fea7478e0fce14b4f09d64fdf37b0420f) - Update test.yml [`96260d6`](https://redirect.github.com/bcomnes/npm-run-all2/commit/96260d6c088ce0aa2bd367ff0736d653f5b0b1f1) ### [`v5.0.2`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v502---2020-12-08) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v5.0.1...v5.0.2) ##### Merged - Upgrade: Bump ansi-styles from 4.3.0 to 5.0.0 [`#26`](https://redirect.github.com/bcomnes/npm-run-all2/pull/26) - Upgrade: Bump actions/checkout from v2.3.3 to v2.3.4 [`#25`](https://redirect.github.com/bcomnes/npm-run-all2/pull/25) ### [`v5.0.1`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v501---2020-10-24) [Compare Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v5.0.0...v5.0.1) ##### Commits - Fix repo field to a valid format [`00b88f8`](https://redirect.github.com/bcomnes/npm-run-all2/commit/00b88f8a399d45cb104a33357cf56015ab92a1c0) - Remove duplicate repo field [`a2d11ff`](https://redirect.github.com/bcomnes/npm-run-all2/commit/a2d11ff3f234812ba660be32f3a9a0aa45a510f6) - Update FUNDING.yml [`648a541`](https://redirect.github.com/bcomnes/npm-run-all2/commit/648a5418725b4330571e08e9e1300756c98edd76) </details> --- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box --- This PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/settlemint/hyperledger-explorer). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzOS4xMjUuMSIsInVwZGF0ZWRJblZlciI6IjM5LjEyNS4xIiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6WyJkZXBlbmRlbmNpZXMiXX0=--> Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
d441465 to
3d3fbd8
Compare
…6 [security] Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
3d3fbd8 to
0c874cc
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.3.0->v1.6.26GitHub Vulnerability Alerts
CVE-2020-15257
Impact
Access controls for the shim’s API socket verified that the connecting process had an effective UID of 0, but did not otherwise restrict access to the abstract Unix domain socket. This would allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise reduced privileges, to cause new processes to be run with elevated privileges.
Specific Go Packages Affected
github.com/containerd/containerd/cmd
Patches
This vulnerability has been fixed in containerd 1.3.9 and 1.4.3. Users should update to these versions as soon as they are released. It should be noted that containers started with an old version of containerd-shim should be stopped and restarted, as running containers will continue to be vulnerable even after an upgrade.
Workarounds
If you are not providing the ability for untrusted users to start containers in the same network namespace as the shim (typically the "host" network namespace, for example with
docker run --net=hostorhostNetwork: truein a Kubernetes pod) and run with an effective UID of 0, you are not vulnerable to this issue.If you are running containers with a vulnerable configuration, you can deny access to all abstract sockets with AppArmor by adding a line similar to
deny unix addr=@​**,to your policy.It is best practice to run containers with a reduced set of privileges, with a non-zero UID, and with isolated namespaces. The containerd maintainers strongly advise against sharing namespaces with the host. Reducing the set of isolation mechanisms used for a container necessarily increases that container's privilege, regardless of what container runtime is used for running that container.
Credits
The containerd maintainers would like to thank Jeff Dileo of NCC Group for responsibly disclosing this issue in accordance with the containerd security policy and for reviewing the patch.
For more information
If you have any questions or comments about this advisory:
CVE-2021-32760
Impact
A bug was found in containerd where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process.
Patches
This bug has been fixed in containerd 1.5.4 and 1.4.8. Users should update to these versions as soon as they are released. Running containers do not need to be restarted.
Workarounds
Ensure you only pull images from trusted sources.
Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with unexpected files.
For more information
If you have any questions or comments about this advisory:
CVE-2021-41103
Impact
A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files.
Patches
This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability.
Workarounds
Limit access to the host to trusted users. Update directory permission on container bundles directories.
For more information
If you have any questions or comments about this advisory:
GHSA-5j5w-g665-5m35
Impact
In the OCI Distribution Specification version 1.0.0 and prior and in the OCI Image Specification version 1.0.1 and prior, manifest and index documents are ambiguous without an accompanying Content-Type HTTP header. Versions of containerd prior to 1.4.12 and 1.5.8 treat the Content-Type header as trusted and deserialize the document according to that header. If the Content-Type header changed between pulls of the same ambiguous document (with the same digest), the document may be interpreted differently, meaning that the digest alone is insufficient to unambiguously identify the content of the image.
Patches
This issue has been fixed in containerd 1.4.12 and 1.5.8. Image pulls for manifests that contain a “manifests” field or indices which contain a “layers” field are rejected.
Workarounds
Ensure you only pull images from trusted sources.
References
GHSA-mc8v-mgrf-8f4m
GHSA-77vh-xpmg-72qh
For more information
If you have any questions or comments about this advisory:
CVE-2022-23648
Impact
A bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation.
Patches
This bug has been fixed in containerd 1.6.1, 1.5.10 and 1.4.13. Users should update to these versions to resolve the issue.
Workarounds
Ensure that only trusted images are used.
Credits
The containerd project would like to thank Felix Wilhelm of Google Project Zero for responsibly disclosing this issue in accordance with the containerd security policy.
For more information
If you have any questions or comments about this advisory:
CVE-2022-31030
Impact
A bug was found in containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the
ExecSyncAPI. This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads. Kubernetes and crictl can both be configured to use containerd's CRI implementation;ExecSyncmay be used when running probes or when executing processes via an "exec" facility.Patches
This bug has been fixed in containerd 1.6.6 and 1.5.13. Users should update to these versions to resolve the issue.
Workarounds
Ensure that only trusted images and commands are used.
References
Credits
The containerd project would like to thank David Korczynski and Adam Korczynski of ADA Logics for responsibly disclosing this issue in accordance with the containerd security policy during a security audit sponsored by CNCF and facilitated by OSTIF.
For more information
If you have any questions or comments about this advisory:
CVE-2022-23471
Impact
A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO.
Patches
This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue.
Workarounds
Ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.
For more information
If you have any questions or comments about this advisory:
To report a security issue in containerd:
CVE-2023-25173
Impact
A bug was found in containerd where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container.
Downstream applications that use the containerd client library may be affected as well.
Patches
This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions.
Workarounds
Ensure that the
"USER $USERNAME"Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar toENTRYPOINT ["su", "-", "user"]to allowsuto properly set up supplementary groups.References
Note that CVE IDs apply to a particular implementation, even if an issue is common.
For more information
If you have any questions or comments about this advisory:
To report a security issue in containerd:
CVE-2023-25153
Impact
When importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service.
Patches
This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue.
Workarounds
Ensure that only trusted images are used and that only trusted users have permissions to import images.
Credits
The containerd project would like to thank David Korczynski and Adam Korczynski of ADA Logics for responsibly disclosing this issue in accordance with the containerd security policy during a security fuzzing audit sponsored by CNCF.
For more information
If you have any questions or comments about this advisory:
To report a security issue in containerd:
GHSA-7ww5-4wqc-m92c
/sys/devices/virtual/powercap accessible by default to containers
Intel's RAPL (Running Average Power Limit) feature, introduced by the Sandy Bridge microarchitecture, provides software insights into hardware energy consumption. To facilitate this, Intel introduced the powercap framework in Linux kernel 3.13, which reads values via relevant MSRs (model specific registers) and provides unprivileged userspace access via
sysfs. As RAPL is an interface to access a hardware feature, it is only available when running on bare metal with the module compiled into the kernel.By 2019, it was realized that in some cases unprivileged access to RAPL readings could be exploited as a power-based side-channel against security features including AES-NI (potentially inside a SGX enclave) and KASLR (kernel address space layout randomization). Also known as the PLATYPUS attack, Intel assigned CVE-2020-8694 and CVE-2020-8695, and AMD assigned CVE-2020-12912.
Several mitigations were applied; Intel reduced the sampling resolution via a microcode update, and the Linux kernel prevents access by non-root users since 5.10. However, this kernel-based mitigation does not apply to many container-based scenarios:
sysfsis mounted inside containers read-only; however only read access is needed to carry out this attack on an unpatched CPUWhile this is not a direct vulnerability in container runtimes, defense in depth and safe defaults are valuable and preferred, especially as this poses a risk to multi-tenant container environments. This is provided by masking
/sys/devices/virtual/powercapin the default mount configuration, and adding an additional set of rules to deny it in the default AppArmor profile.While
sysfsis not the only way to read from the RAPL subsystem, other ways of accessing it require additional capabilities such asCAP_SYS_RAWIOwhich is not available to containers by default, orperfparanoia level less than 1, which is a non-default kernel tunable.References
CVE-2021-21334
Impact
Containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared.
If you are not using containerd’s CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue.
If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue.
If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue
Patches
This vulnerability has been fixed in containerd 1.3.10 and containerd 1.4.4. Users should update to these versions as soon as they are released.
Workarounds
There are no known workarounds.
For more information
If you have any questions or comments about this advisory:
Release Notes
containerd/containerd (github.com/containerd/containerd)
v1.6.26: containerd 1.6.26Compare Source
Welcome to the v1.6.26 release of containerd!
The twenty-sixth patch release for containerd 1.6 contains various fixes and updates.
Notable Updates
/sys/devices/virtual/powercappath in runtime spec and deny in default apparmor profile (GHSA-7ww5-4wqc-m92c)Deprecation Warnings
See the changelog for complete list of changes
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
30 commits
ac5c5d3e0Prepare release notes for v1.6.2602f07fe19contrib/apparmor: deny /sys/devices/virtual/powercapc94577e78oci/spec: deny /sys/devices/virtual/powercap7cbdfc92eupdate to go1.20.12, test go1.21.5024b1cce6update to go1.20.11, test go1.21.464e56bfdeAdd cri-api v1alpha2 usage warning to all api callsefefd3bf3tasks: emit warning for runc v1 runtime7825689b4tasks: emit warning for v1 runtime7cfe7052fsnapshots: emit deprecation warning for aufsa1ae572a2Fix linter error with updated linterb638791d6ci: bump up golangci-lint to v1.55.02370a2842Fix linter issues for golangci-lint 1.54.28a65e2e31Bump up golangci-lint to v1.54.2969f8feb2Bump up golangci-lint to v1.52.266959fdf5push: inherit distribution sources from parentb4dcffcfbcontent: add InfoProvider interfacebef4145c1Change PushContent to require only Providera5fc21060vendor: google.golang.org/grpc v1.58.34fa05b3d8Upgrade github.com/klauspost/compress from v1.11.13 to v1.15.9ede0ad5e1Fix windows default path overwrite issueDependency Changes
2bc19b1-> v0.10.0Previous release can be found at v1.6.25
v1.6.25: containerd 1.6.25Compare Source
Welcome to the v1.6.25 release of containerd!
The twenty-fifth patch release for containerd 1.6 contains various fixes and updates.
Notable Updates
See the changelog for complete list of changes
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
82 commits
723d26ab2Prepare release notes for v1.6.251f865eba1update mailmapb49815300cri: fix update of pinned label for images751b0c186cri: fix using the pinned label to pin imagefb5568608vendor: golang.org/x/net v0.17.061ad86f6fvendor: golang.org/x/text v0.13.04b431c844vendor: golang.org/x/sys v0.13.062d402275Remove CVE-2022-1996 from containerd binary upgrading go-restful to 2.16.03e68bf65aEnhance container image unpack client logs0dd65c826[release/1.6] update github.com/containerd/nri v0.1.1c73be2446update runc binary to v1.1.10746bcf2ebExpose usage of cri-api v1alpha28b51a95fbfix: shimv1 leak issue6741f819b[release/1.6] update to go1.20.10, test go1.21.349615a0e9[release/1.6] update to go1.20.9, test go1.21.2b68204e53cri: add deprecation warning for configsae8c58319cri: add deprecation warning for auths455edcad2cri: add deprecation warning for mirrors878823f4dcri: add ability to emit deprecation warnings477b7d6a1ctr: new deprecations command24068b813dynamic: record deprecation for dynamic plugins218c7a1dfserver: add ability to record config deprecationsdfb9e1debpull: record deprecation warning for schema 190b42da6fintrospection: add support for deprecations0b6766b37api/introspection: deprecation warnings in serverde3cb4c18warning: new service for deprecationsda1b4419bdeprecation: new package for deprecationsbca8a3f65integration: deflake TestIssue91030985f7a43ci: Use Vagrant on ubuntu-latest-4-cores5dd64301cCheck scheme and host of request on push redirect51df21d09Avoid TLS fallback when protocol is not ambiguous8108f0d03Add a new image label if it is docker schema 15376afb3dfix protobuf aarch64e529741d3remotes: add handling for missing basic auth credentialsca45b92f4Add ErrUnexpectedStatus to resolver77c0175b4Improve ErrUnexpectedStatus default string275fc594dBump x/net to 0.135223bf39aRequire plugins to succeed after registering readiness8f5eba314cri: call RegisterReadiness after NewCRIService7b61862e7*: add runc-fp as runc wrapper to inject failpoint5238a6470containerd-shim-runc-v2: avoid potential deadlock in create handler65e908ee1containerd-shim-runc-v2: remove unnecessarys.getContainer()1dd9acecbUncopypaste parsing of OCI Bundle spec file71c89ddf2[release/1.6]: Vagrantfile: install failpoint binaries7a0c8b6b7cri: stop recommending disable_cgroup8066dd81cAllow for images with artifacts to pull2fffc344aremotes/docker: Fix MountedFrom prefixed with target repository6b5912220remotes: always try to establish tls connection when tls configured37c758de1Build binaries with 1.21.1f1591cc9balias log package to github.com/containerd/log v0.1.0f68d2d93bvendor: golang.org/x/sys v0.7.0f305fb233vendor: github.com/stretchr/testify v1.8.44e24a30afvendor: github.com/sirupsen/logrus v1.9.3b66c818baremotes/docker: Add MountedFrom and Exists push statusChanges from containerd/log
9 commits
89c9a54Update golangci to 1.49cf26711Update description in READMEf9f250cAdd project detailsfb7fe3dAdd github CI flow7e13034Add go module16a3c76Rename log import from logtest698c398Add README87c83c4Add license fileChanges from containerd/nri
3 commits
4275101Task: fix typo in godocf6acbf1remove containerd as dependencyDependency Changes
3147a52-> v0.14.0Previous release can be found at v1.6.24
v1.6.24: containerd 1.6.24Compare Source
Welcome to the v1.6.24 release of containerd!
The twenty-fourth patch release for containerd 1.6 contains various fixes and updates.
Notable Updates
See the changelog for complete list of changes
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
45 commits
cdd59290dPrepare release notes for v1.6.2433c2d88e7Revert "log: define G() as a function instead of a variable"0a7f2975elog: swap logrus functions with their equivalent on default logger9d175a19blog: add package documentation and summary of package's purpose96fb65529log: make Fields type a generic map[string]anybace17e2elog: add log.Entry typedd127885flog: define OutputFormat type5b4cf2329log: define G() as a function instead of a variableee1b4a1e2log: add all log-levels that are acceptedd563a411flog: group "enum" consts and touch-up docs6e8f4555blog: WithLogger: remove redundant intermediate varc19325559log: SetFormat: include returns in switchc3c22f8cblog: remove gotest.tools dependencya2c294800[release/1.6] update to go1.20.80da8dcaa7make repositories of install dependencies configurable8e6a9de5bupdate to go1.20.7, go1.19.128b2eb371fUpdate Go to 1.20.6,1.19.11cff669c7aupdate go to go1.20.5, go1.19.10f34a22de9update go to go1.20.4, go1.19.9e8e73065eupdate go to go1.20.3, go1.19.89b3f950d6Go 1.20.217d03ac68Go 1.20.1861f65447go.mod: go 1.1981fa93784Stop using math/rand.Read and rand.Seed (deprecated in Go 1.20)70dc11a6clint: remove//nolint:dupwordthat are no longer neededfec784a06lint: silence "SA1019: tar.TypeRegA has been deprecated... (staticheck)"6648df1adlint: silence "typeHostFileConfigis unused (unused)"e6b268bc7golangci-lint v1.51.1c552ccf67go.mod: golang.org/x/sync v0.1.0d00af5c3eintegration: issue7496 case should work for runc.v2 only583696e4eVagrantfile: add strace toolab21d60d2pkg/cri/server: add criService as argument when handle exit eventa229883cbpkg/cri/server: fix leaked shim issued8f824200integration: add case to reproduce #74968cd40e1d0Add configurable mount options to overlay453fa397afeat: make overlay sync removal configurable4cb7764dfupdate runc binary to v1.1.9Dependency Changes
036812b-> v0.1.0Previous release can be found at v1.6.23
v1.6.23: containerd 1.6.23Compare Source
Welcome to the v1.6.23 release of containerd!
The twenty-third patch release for containerd 1.6 contains various fixes and updates.
Notable Updates
See the changelog for complete list of changes
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
13 commits
e297a668fAdd release notes for v1.6.23f51bf1960Add support for stable ABI windows versions43a02c0b2Update hcsshim tag to v0.9.10cc5b0a21bcri: Don't use rel path for image volumes4238cff1cUpgrade GitHub actions packages in release workflow00d1092b7update to go1.19.1247d73b2deFix ro mount option being passedDependency Changes
Previous release can be found at v1.6.22
v1.6.22: containerd 1.6.22Compare Source
Welcome to the v1.6.22 release of containerd!
The twenty-second patch release for containerd 1.6 contains various fixes and updates.
Notable Updates
UpdateContainerStats(#8819)name_to_handle_at(#8754)Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.