Skip to content
This repository was archived by the owner on Mar 31, 2025. It is now read-only.

chore(deps): update module github.com/containerd/containerd to v1.6.26 [security]#141

Merged
renovate[bot] merged 1 commit intomainfrom
renovate/go-github.com-containerd-containerd-vulnerability
Jan 24, 2025
Merged

chore(deps): update module github.com/containerd/containerd to v1.6.26 [security]#141
renovate[bot] merged 1 commit intomainfrom
renovate/go-github.com-containerd-containerd-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Jan 24, 2025

This PR contains the following updates:

Package Type Update Change OpenSSF
github.com/containerd/containerd indirect minor v1.3.0 -> v1.6.26 OpenSSF Scorecard

GitHub Vulnerability Alerts

CVE-2020-15257

Impact

Access controls for the shim’s API socket verified that the connecting process had an effective UID of 0, but did not otherwise restrict access to the abstract Unix domain socket. This would allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise reduced privileges, to cause new processes to be run with elevated privileges.

Specific Go Packages Affected

github.com/containerd/containerd/cmd

Patches

This vulnerability has been fixed in containerd 1.3.9 and 1.4.3. Users should update to these versions as soon as they are released. It should be noted that containers started with an old version of containerd-shim should be stopped and restarted, as running containers will continue to be vulnerable even after an upgrade.

Workarounds

If you are not providing the ability for untrusted users to start containers in the same network namespace as the shim (typically the "host" network namespace, for example with docker run --net=host or hostNetwork: true in a Kubernetes pod) and run with an effective UID of 0, you are not vulnerable to this issue.

If you are running containers with a vulnerable configuration, you can deny access to all abstract sockets with AppArmor by adding a line similar to deny unix addr=@​**, to your policy.

It is best practice to run containers with a reduced set of privileges, with a non-zero UID, and with isolated namespaces. The containerd maintainers strongly advise against sharing namespaces with the host. Reducing the set of isolation mechanisms used for a container necessarily increases that container's privilege, regardless of what container runtime is used for running that container.

Credits

The containerd maintainers would like to thank Jeff Dileo of NCC Group for responsibly disclosing this issue in accordance with the containerd security policy and for reviewing the patch.

For more information

If you have any questions or comments about this advisory:

CVE-2021-32760

Impact

A bug was found in containerd where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process.

Patches

This bug has been fixed in containerd 1.5.4 and 1.4.8. Users should update to these versions as soon as they are released. Running containers do not need to be restarted.

Workarounds

Ensure you only pull images from trusted sources.

Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with unexpected files.

For more information

If you have any questions or comments about this advisory:

CVE-2021-41103

Impact

A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files.

Patches

This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability.

Workarounds

Limit access to the host to trusted users. Update directory permission on container bundles directories.

For more information

If you have any questions or comments about this advisory:

GHSA-5j5w-g665-5m35

Impact

In the OCI Distribution Specification version 1.0.0 and prior and in the OCI Image Specification version 1.0.1 and prior, manifest and index documents are ambiguous without an accompanying Content-Type HTTP header. Versions of containerd prior to 1.4.12 and 1.5.8 treat the Content-Type header as trusted and deserialize the document according to that header. If the Content-Type header changed between pulls of the same ambiguous document (with the same digest), the document may be interpreted differently, meaning that the digest alone is insufficient to unambiguously identify the content of the image.

Patches

This issue has been fixed in containerd 1.4.12 and 1.5.8. Image pulls for manifests that contain a “manifests” field or indices which contain a “layers” field are rejected.

Workarounds

Ensure you only pull images from trusted sources.

References

GHSA-mc8v-mgrf-8f4m
GHSA-77vh-xpmg-72qh

For more information

If you have any questions or comments about this advisory:

CVE-2022-23648

Impact

A bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation.

Patches

This bug has been fixed in containerd 1.6.1, 1.5.10 and 1.4.13. Users should update to these versions to resolve the issue.

Workarounds

Ensure that only trusted images are used.

Credits

The containerd project would like to thank Felix Wilhelm of Google Project Zero for responsibly disclosing this issue in accordance with the containerd security policy.

For more information

If you have any questions or comments about this advisory:

CVE-2022-31030

Impact

A bug was found in containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the ExecSync API. This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads. Kubernetes and crictl can both be configured to use containerd's CRI implementation; ExecSync may be used when running probes or when executing processes via an "exec" facility.

Patches

This bug has been fixed in containerd 1.6.6 and 1.5.13. Users should update to these versions to resolve the issue.

Workarounds

Ensure that only trusted images and commands are used.

References

Credits

The containerd project would like to thank David Korczynski and Adam Korczynski of ADA Logics for responsibly disclosing this issue in accordance with the containerd security policy during a security audit sponsored by CNCF and facilitated by OSTIF.

For more information

If you have any questions or comments about this advisory:

CVE-2022-23471

Impact

A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO.

Patches

This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue.

Workarounds

Ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.

For more information

If you have any questions or comments about this advisory:

To report a security issue in containerd:

CVE-2023-25173

Impact

A bug was found in containerd where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container.

Downstream applications that use the containerd client library may be affected as well.

Patches

This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions.

Workarounds

Ensure that the "USER $USERNAME" Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to ENTRYPOINT ["su", "-", "user"] to allow su to properly set up supplementary groups.

References

Note that CVE IDs apply to a particular implementation, even if an issue is common.

For more information

If you have any questions or comments about this advisory:

To report a security issue in containerd:

CVE-2023-25153

Impact

When importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service.

Patches

This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue.

Workarounds

Ensure that only trusted images are used and that only trusted users have permissions to import images.

Credits

The containerd project would like to thank David Korczynski and Adam Korczynski of ADA Logics for responsibly disclosing this issue in accordance with the containerd security policy during a security fuzzing audit sponsored by CNCF.

For more information

If you have any questions or comments about this advisory:

To report a security issue in containerd:

GHSA-7ww5-4wqc-m92c

/sys/devices/virtual/powercap accessible by default to containers

Intel's RAPL (Running Average Power Limit) feature, introduced by the Sandy Bridge microarchitecture, provides software insights into hardware energy consumption. To facilitate this, Intel introduced the powercap framework in Linux kernel 3.13, which reads values via relevant MSRs (model specific registers) and provides unprivileged userspace access via sysfs. As RAPL is an interface to access a hardware feature, it is only available when running on bare metal with the module compiled into the kernel.

By 2019, it was realized that in some cases unprivileged access to RAPL readings could be exploited as a power-based side-channel against security features including AES-NI (potentially inside a SGX enclave) and KASLR (kernel address space layout randomization). Also known as the PLATYPUS attack, Intel assigned CVE-2020-8694 and CVE-2020-8695, and AMD assigned CVE-2020-12912.

Several mitigations were applied; Intel reduced the sampling resolution via a microcode update, and the Linux kernel prevents access by non-root users since 5.10. However, this kernel-based mitigation does not apply to many container-based scenarios:

  • Unless using user namespaces, root inside a container has the same level of privilege as root outside the container, but with a slightly more narrow view of the system
  • sysfs is mounted inside containers read-only; however only read access is needed to carry out this attack on an unpatched CPU

While this is not a direct vulnerability in container runtimes, defense in depth and safe defaults are valuable and preferred, especially as this poses a risk to multi-tenant container environments. This is provided by masking /sys/devices/virtual/powercap in the default mount configuration, and adding an additional set of rules to deny it in the default AppArmor profile.

While sysfs is not the only way to read from the RAPL subsystem, other ways of accessing it require additional capabilities such as CAP_SYS_RAWIO which is not available to containers by default, or perf paranoia level less than 1, which is a non-default kernel tunable.

References

CVE-2021-21334

Impact

Containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared.

If you are not using containerd’s CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue.

If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue.

If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue

Patches

This vulnerability has been fixed in containerd 1.3.10 and containerd 1.4.4. Users should update to these versions as soon as they are released.

Workarounds

There are no known workarounds.

For more information

If you have any questions or comments about this advisory:


Release Notes

containerd/containerd (github.com/containerd/containerd)

v1.6.26: containerd 1.6.26

Compare Source

Welcome to the v1.6.26 release of containerd!

The twenty-sixth patch release for containerd 1.6 contains various fixes and updates.

Notable Updates
  • Fix windows default path overwrite issue (#​9441)
  • Update push to inherit distribution sources from parent (#​9453)
  • Mask /sys/devices/virtual/powercap path in runtime spec and deny in default apparmor profile (GHSA-7ww5-4wqc-m92c)
Deprecation Warnings
  • Emit deprecation warning for AUFS snapshotter usage (#​9448)
  • Emit deprecation warning for v1 runtime usage (#​9468)
  • Emit deprecation warning for CRI v1alpha1 usage (#​9468)

See the changelog for complete list of changes

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Samuel Karp
  • Derek McGowan
  • Kohei Tokunaga
  • Phil Estes
  • Bjorn Neergaard
  • Sebastiaan van Stijn
  • Brian Goff
  • Charity Kathure
  • Kazuyoshi Kato
  • Milas Bowman
  • Wei Fu
  • ruiwen-zhao
Changes
30 commits

  • [release/1.6] Prepare release notes for v1.6.26 (#​9490)
    • ac5c5d3e0 Prepare release notes for v1.6.26
  • Github Security Advisory GHSA-7ww5-4wqc-m92c
    • 02f07fe19 contrib/apparmor: deny /sys/devices/virtual/powercap
    • c94577e78 oci/spec: deny /sys/devices/virtual/powercap
  • [release/1.6] update to go1.20.12, test go1.21.5 (#​9472)
    • 7cbdfc92e update to go1.20.12, test go1.21.5
    • 024b1cce6 update to go1.20.11, test go1.21.4
  • [release/1.6] Add cri-api v1alpha2 usage warning to all api calls (#​9484)
    • 64e56bfde Add cri-api v1alpha2 usage warning to all api calls
  • [release/1.6] tasks: emit warning for v1 runtime and runc v1 runtime (#​9468)
    • efefd3bf3 tasks: emit warning for runc v1 runtime
    • 7825689b4 tasks: emit warning for v1 runtime
  • [release/1.6] snapshots: emit deprecation warning for aufs (#​9448)
    • 7cfe7052f snapshots: emit deprecation warning for aufs
  • [release/1.6] cherry-pick/backport: Update golangci lint (#​9455)
    • a1ae572a2 Fix linter error with updated linter
    • b638791d6 ci: bump up golangci-lint to v1.55.0
    • 2370a2842 Fix linter issues for golangci-lint 1.54.2
    • 8a65e2e31 Bump up golangci-lint to v1.54.2
    • 969f8feb2 Bump up golangci-lint to v1.52.2
  • [release/1.6] push: inherit distribution sources from parent (#​9453)
    • 66959fdf5 push: inherit distribution sources from parent
    • b4dcffcfb content: add InfoProvider interface
    • bef4145c1 Change PushContent to require only Provider
  • [release/1.6] Bump google.golang.org/grpc to v1.58.3 (#​9408)
    • a5fc21060 vendor: google.golang.org/grpc v1.58.3
    • 4fa05b3d8 Upgrade github.com/klauspost/compress from v1.11.13 to v1.15.9
  • [release/1.6] Windows default path overwrite fix (#​9441)
    • ede0ad5e1 Fix windows default path overwrite issue

Dependency Changes
  • cloud.google.com/go/compute/metadata v0.2.3 new
  • github.com/cespare/xxhash/v2 v2.1.2 -> v2.2.0
  • github.com/golang/protobuf v1.5.2 -> v1.5.3
  • github.com/klauspost/compress v1.11.13 -> v1.15.9
  • go.opencensus.io v0.23.0 -> v0.24.0
  • golang.org/x/oauth2 2bc19b1 -> v0.10.0
  • golang.org/x/sync v0.1.0 -> v0.3.0
  • google.golang.org/grpc v1.50.1 -> v1.58.3
  • google.golang.org/protobuf v1.28.1 -> v1.31.0

Previous release can be found at v1.6.25

v1.6.25: containerd 1.6.25

Compare Source

Welcome to the v1.6.25 release of containerd!

The twenty-fifth patch release for containerd 1.6 contains various fixes and updates.

Notable Updates
  • Check whether content did not needs to be pushed to remote registry and cross-repo mounted or already existed (#​9111)
  • Soft deprecate log package (#​9105)
  • Always try to establish tls connection when tls configured (#​9189)
  • CRI: stop recommending disable_cgroup (#​9169)
  • Allow for images with artifacts layers to pull (#​9150)
  • Require plugins to succeed after registering readiness (#​9166)
  • Avoid potential deadlock in create handler in containerd-shim-runc-v2 (#​9210)
  • Add handling for missing basic auth credentials (#​9236)
  • Add a new image label if it is docker schema 1 (#​9267)
  • Fix ambiguous tls fallback (#​9300)
  • Expose usage of deprecated features (#​9329)
  • Fix shimv1 leak issue (#​9345)
  • Go version update to 1.20.10(#​9264)
  • Update runc to v1.1.10 (#​9360)
  • CRI: fix using the pinned label to pin image (#​9382)

See the changelog for complete list of changes

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Samuel Karp
  • Derek McGowan
  • Sebastiaan van Stijn
  • Phil Estes
  • Wei Fu
  • Kazuyoshi Kato
  • Akhil Mohan
  • Akihiro Suda
  • Chen Yiyang
  • Fabian Hoffmann
  • Iceber Gu
  • Mike Brown
  • Paweł Gronowski
  • Austin Vazquez
  • Fahed Dorgaa
  • James Sturtevant
  • Kern Walster
  • Marat Radchenko
  • Qiutong Song
  • Tony Fouchard
  • ruiwen-zhao
Changes
82 commits

  • [release/1.6] Prepare release notes for v1.6.25 (#​9394)
  • [release/1.6] cri: fix using the pinned label to pin image (#​9382)
    • b49815300 cri: fix update of pinned label for images
    • 751b0c186 cri: fix using the pinned label to pin image
  • [Release/1.6] vendor: golang.org/x/net v0.17.0 (#​9387)
  • [Release/1.6] CVE-2022-1996 fix for go-restful (#​9385)
  • [release/1.6] Enhance container image unpack client logs (#​9380)
    • 3e68bf65a Enhance container image unpack client logs
  • [release/1.6] update github.com/containerd/nri v0.1.1 (#​9107)
    • 0dd65c826 [release/1.6] update github.com/containerd/nri v0.1.1
  • [release/1.6 backport] update runc binary to v1.1.10 (#​9360)
  • [release/1.6] Expose usage of cri-api v1alpha2 (#​9357)
  • [release/1.6] fix: shimv1 leak issue (#​9345)
  • [release/1.6] update to go1.20.10, test go1.21.3 (#​9264)
    • 6741f819b [release/1.6] update to go1.20.10, test go1.21.3
    • 49615a0e9 [release/1.6] update to go1.20.9, test go1.21.2
  • [release/1.6] cri: add deprecation warnings for mirrors, auths, and configs (#​9355)
    • b68204e53 cri: add deprecation warning for configs
    • ae8c58319 cri: add deprecation warning for auths
    • 455edcad2 cri: add deprecation warning for mirrors
    • 878823f4d cri: add ability to emit deprecation warnings
  • [release/1.6] deprecation: new package for deprecations (#​9329)
    • 477b7d6a1 ctr: new deprecations command
    • 24068b813 dynamic: record deprecation for dynamic plugins
    • 218c7a1df server: add ability to record config deprecations
    • dfb9e1deb pull: record deprecation warning for schema 1
    • 90b42da6f introspection: add support for deprecations
    • 0b6766b37 api/introspection: deprecation warnings in server
    • de3cb4c18 warning: new service for deprecations
    • da1b4419b deprecation: new package for deprecations
  • [release/1.6] integration: deflake TestIssue9103 (#​9353)
    • bca8a3f65 integration: deflake TestIssue9103
  • [release/1.6] ci: Use Vagrant on ubuntu-latest-4-cores (#​9332)
    • 0985f7a43 ci: Use Vagrant on ubuntu-latest-4-cores
  • [release/1.6] Fix ambiguous tls fallback (#​9300)
    • 5dd64301c Check scheme and host of request on push redirect
    • 51df21d09 Avoid TLS fallback when protocol is not ambiguous
  • [release/1.6] Add a new image label if it is docker schema 1 (#​9267)
    • 8108f0d03 Add a new image label if it is docker schema 1
  • [release/1.6 backport] fix protobuf aarch64 (#​9284)
  • [release/1.6] remotes: add handling for missing basic auth credentials (#​9236)
    • e529741d3 remotes: add handling for missing basic auth credentials
    • ca45b92f4 Add ErrUnexpectedStatus to resolver
    • 77c0175b4 Improve ErrUnexpectedStatus default string
  • [release/1.6] Update x/net to 0.13 (#​9130)
  • [release/1.6] Require plugins to succeed after registering readiness (#​9166)
    • 5223bf39a Require plugins to succeed after registering readiness
    • 8f5eba314 cri: call RegisterReadiness after NewCRIService
  • [release/1.6 backport] containerd-shim-runc-v2: avoid potential deadlock in create handler (#​9210)
    • 7b61862e7 *: add runc-fp as runc wrapper to inject failpoint
    • 5238a6470 containerd-shim-runc-v2: avoid potential deadlock in create handler
    • 65e908ee1 containerd-shim-runc-v2: remove unnecessary s.getContainer()
    • 1dd9acecb Uncopypaste parsing of OCI Bundle spec file
    • 71c89ddf2 [release/1.6]: Vagrantfile: install failpoint binaries
  • [release/1.6] cri: stop recommending disable_cgroup (#​9169)
    • 7a0c8b6b7 cri: stop recommending disable_cgroup
  • [release/1.6] Allow for images with artifacts to pull (#​9150)
    • 8066dd81c Allow for images with artifacts to pull
  • [release 1.6] remotes/docker: Fix MountedFrom prefixed with target repository (#​9192)
    • 2fffc344a remotes/docker: Fix MountedFrom prefixed with target repository
  • [release/1.6] remotes: always try to establish tls connection when tls configured (#​9189)
    • 6b5912220 remotes: always try to establish tls connection when tls configured
  • [release/1.6] Build binaries with 1.21.1 (#​9180)
  • [release/1.6 backport] alias log package to github.com/containerd/log v0.1.0 (#​9105)
    • f1591cc9b alias log package to github.com/containerd/log v0.1.0
    • f68d2d93b vendor: golang.org/x/sys v0.7.0
    • f305fb233 vendor: github.com/stretchr/testify v1.8.4
    • 4e24a30af vendor: github.com/sirupsen/logrus v1.9.3
  • [release/1.6] remotes/docker: Add MountedFrom and Exists push status (#​9111)
    • b66c818ba remotes/docker: Add MountedFrom and Exists push status

Changes from containerd/log
9 commits

Changes from containerd/nri
3 commits

  • [release/0.1 backport] remove containerd as dependency (#​58)
    • 4275101 Task: fix typo in godoc
    • f6acbf1 remove containerd as dependency

Dependency Changes
  • github.com/containerd/log v0.1.0 new
  • github.com/containerd/nri v0.1.0 -> v0.1.1
  • github.com/emicklei/go-restful v2.9.5 -> v2.16.0
  • github.com/sirupsen/logrus v1.9.0 -> v1.9.3
  • github.com/stretchr/testify v1.8.1 -> v1.8.4
  • golang.org/x/crypto 3147a52 -> v0.14.0
  • golang.org/x/net v0.8.0 -> v0.17.0
  • golang.org/x/sys v0.6.0 -> v0.13.0
  • golang.org/x/term v0.6.0 -> v0.13.0
  • golang.org/x/text v0.8.0 -> v0.13.0

Previous release can be found at v1.6.24

v1.6.24: containerd 1.6.24

Compare Source

Welcome to the v1.6.24 release of containerd!

The twenty-fourth patch release for containerd 1.6 contains various fixes and updates.

Notable Updates
  • CRI: fix leaked shim caused by high IO pressure (#​9004)
  • Update to go1.20.8 (#​9073)
  • Update runc to v1.1.9 (#​8966)
  • Backport: add configurable mount options to overlay snapshotter (#​8961)
  • log: cleanups and improvements to decouple more from logrus (#​9002)

See the changelog for complete list of changes

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Sebastiaan van Stijn
  • Akihiro Suda
  • Wei Fu
  • Derek McGowan
  • Akhil Mohan
  • Cardy.Tang
  • Danny Canter
  • Kazuyoshi Kato
  • Mike Brown
  • Phil Estes
  • Samuel Karp
Changes
45 commits

  • [release/1.6] Prepare release notes for v1.6.24 (#​9087)
    • cdd59290d Prepare release notes for v1.6.24
  • [release/1.6 backport] log: cleanups and improvements to decouple more from logrus (#​9002)
    • 33c2d88e7 Revert "log: define G() as a function instead of a variable"
    • 0a7f2975e log: swap logrus functions with their equivalent on default logger
    • 9d175a19b log: add package documentation and summary of package's purpose
    • 96fb65529 log: make Fields type a generic map[string]any
    • bace17e2e log: add log.Entry type
    • dd127885f log: define OutputFormat type
    • 5b4cf2329 log: define G() as a function instead of a variable
    • ee1b4a1e2 log: add all log-levels that are accepted
    • d563a411f log: group "enum" consts and touch-up docs
    • 6e8f4555b log: WithLogger: remove redundant intermediate var
    • c19325559 log: SetFormat: include returns in switch
    • c3c22f8cb log: remove gotest.tools dependency
  • [release/1.6] update to go1.20.8 (#​9073)
  • [release/1.6 backport] make repositories of install dependencies configurable (#​9024)
    • 0da8dcaa7 make repositories of install dependencies configurable
  • [release/1.6 backport] update Golang to go1.20.7, minimum version go1.19 (#​9020)
    • 8e6a9de5b update to go1.20.7, go1.19.12
    • 8b2eb371f Update Go to 1.20.6,1.19.11
    • cff669c7a update go to go1.20.5, go1.19.10
    • f34a22de9 update go to go1.20.4, go1.19.9
    • e8e73065e update go to go1.20.3, go1.19.8
    • 9b3f950d6 Go 1.20.2
    • 17d03ac68 Go 1.20.1
    • 861f65447 go.mod: go 1.19
    • 81fa93784 Stop using math/rand.Read and rand.Seed (deprecated in Go 1.20)
    • 70dc11a6c lint: remove //nolint:dupword that are no longer needed
    • fec784a06 lint: silence "SA1019: tar.TypeRegA has been deprecated... (staticheck)"
    • 6648df1ad lint: silence "type HostFileConfig is unused (unused)"
    • e6b268bc7 golangci-lint v1.51.1
    • c552ccf67 go.mod: golang.org/x/sync v0.1.0
  • [releases/1.6] *: fix leaked shim caused by high IO pressure (#​9004)
    • d00af5c3e integration: issue7496 case should work for runc.v2 only
    • 583696e4e Vagrantfile: add strace tool
    • ab21d60d2 pkg/cri/server: add criService as argument when handle exit event
    • a229883cb pkg/cri/server: fix leaked shim issue
    • d8f824200 integration: add case to reproduce #​7496
  • [release/1.6] Cherry-pick: [overlay] add configurable mount options to overlay snapshotter (#​8961)
    • 8cd40e1d0 Add configurable mount options to overlay
    • 453fa397a feat: make overlay sync removal configurable
  • [release/1.6 backport] update runc binary to v1.1.9 (#​8966)

Dependency Changes
  • golang.org/x/sync 036812b -> v0.1.0

Previous release can be found at v1.6.23

v1.6.23: containerd 1.6.23

Compare Source

Welcome to the v1.6.23 release of containerd!

The twenty-third patch release for containerd 1.6 contains various fixes and updates.

Notable Updates
  • **Add stable ABI support in windows platform matcher + update hcsshim tag (#​8854)
  • **cri: Don't use rel path for image volumes (#​8927)
  • **Upgrade GitHub actions packages in release workflow (#​8908)
  • **update to go1.19.12 (#​8905)
  • **backport: ro option for userxattr mount check + cherry-pick: Fix ro mount option being passed (#​8888)

See the changelog for complete list of changes

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Kirtana Ashok
  • Maksym Pavlenko
  • Austin Vazquez
  • Ben Foster
  • Derek McGowan
  • Mike Brown
  • Phil Estes
  • Rodrigo Campos
  • Sebastiaan van Stijn
  • Wei Fu
Changes
13 commits

  • [release/1.6] Add release notes for v1.6.23 (#​8939)
  • [release/1.6] Add stable ABI support in windows platform matcher + update hcsshim tag (#​8854)
    • f51bf1960 Add support for stable ABI windows versions
    • 43a02c0b2 Update hcsshim tag to v0.9.10
  • [release/1.6] cri: Don't use rel path for image volumes (#​8927)
  • cc5b0a21b cri: Don't use rel path for image volumes
  • [release/1.6 backport] Upgrade GitHub actions packages in release workflow (#​8908)
    • 4238cff1c Upgrade GitHub actions packages in release workflow
  • [release/1.6] update to go1.19.12 (#​8905)
  • [release/1.6] backport: ro option for userxattr mount check + cherry-pick: Fix ro mount option being passed (#​8888)

Dependency Changes
  • github.com/Microsoft/hcsshim v0.9.8 -> v0.9.10

Previous release can be found at v1.6.22

v1.6.22: containerd 1.6.22

Compare Source

Welcome to the v1.6.22 release of containerd!

The twenty-second patch release for containerd 1.6 contains various fixes and updates.

Notable Updates
  • RunC: Update runc binary to v1.1.8 (#​8842)
  • CRI: Fix additionalGids: it should fallback to imageConfig.User when securityContext.RunAsUser,RunAsUsername are empty (#​8823)
  • CRI: Write generated CNI config atomically (#​8826)
  • Fix concurrent writes for UpdateContainerStats (#​8819)
  • Make checkContainerTimestamps less strict on Windows (#​8827)
  • Port-Forward: Correctly handle known errors (#​8805)
  • Resolve docker.NewResolver race condition (#​8800)
  • SecComp: Always allow name_to_handle_at (#​8754)
  • Adding support to run hcsshim from local clone (#​8713)
  • Pinned image support ([#​8720](https://redirect.github.com/containerd/containe

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented Jan 24, 2025

ℹ Artifact update notice

File name: app/platform/fabric/e2e-test/specs/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 76 additional dependencies were updated

Details:

Package Change
cloud.google.com/go v0.38.0 -> v0.110.4
github.com/Azure/go-autorest/autorest v0.9.0 -> v0.11.18
github.com/Azure/go-autorest/autorest/adal v0.5.0 -> v0.9.13
github.com/Azure/go-autorest/autorest/date v0.1.0 -> v0.3.0
github.com/Azure/go-autorest/autorest/mocks v0.2.0 -> v0.4.1
github.com/Azure/go-autorest/logger v0.1.0 -> v0.2.1
github.com/Azure/go-autorest/tracing v0.5.0 -> v0.6.0
github.com/Microsoft/go-winio v0.4.15-0.20190919025122-fc70bd9a86b5 -> v0.5.2
github.com/Microsoft/hcsshim v0.8.7-0.20191101173118-65519b62243c -> v0.9.10
github.com/PuerkitoBio/purell v1.0.0 -> v1.1.1
github.com/PuerkitoBio/urlesc v0.0.0-20160726150825-5bd2802263f2 -> v0.0.0-20170810143723-de5bf2ad4578
github.com/blang/semver v3.1.0+incompatible -> v3.5.1+incompatible
github.com/containerd/cgroups v0.0.0-20190919134610-bf292b21730f -> v1.0.4
github.com/containerd/continuity v0.0.0-20190426062206-aaeac12a7ffc -> v0.3.0
github.com/containerd/fifo v0.0.0-20190226154929-a9fb20d87448 -> v1.0.0
github.com/containerd/go-runc v0.0.0-20180907222934-5a6d9f37cfa3 -> v1.0.0
github.com/containerd/ttrpc v0.0.0-20190828154514-0e0f228740de -> v1.1.2
github.com/containerd/typeurl v0.0.0-20180627222232-a93fcdb778cd -> v1.0.2
github.com/coreos/go-semver v0.2.0 -> v0.3.0
github.com/elazarl/goproxy v0.0.0-20170405201442-c4fc26588b6e -> v0.0.0-20180725130230-947c36da3153
github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633 -> v2.16.0+incompatible
github.com/evanphx/json-patch v4.9.0+incompatible -> v4.11.0+incompatible
github.com/ghodss/yaml v0.0.0-20150909031657-73d445a93680 -> v1.0.0
github.com/go-openapi/jsonpointer v0.0.0-20160704185906-46af16f9f7b1 -> v0.19.3
github.com/go-openapi/jsonreference v0.0.0-20160704190145-13c6e3589ad9 -> v0.19.3
github.com/go-openapi/spec v0.0.0-20160808142527-6aced65f8501 -> v0.19.3
github.com/go-openapi/swag v0.0.0-20160704191624-1d0bd113de87 -> v0.19.5
github.com/gogo/protobuf v1.2.2-0.20190723190241-65acae22fc9d -> v1.3.2
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b -> v1.1.0
github.com/golang/groupcache v0.0.0-20160516000752-02826c3e7903 -> v0.0.0-20210331224755-41bb18bfe9da
github.com/golang/mock v1.2.0 -> v1.6.0
github.com/google/btree v1.0.0 -> v1.0.1
github.com/google/gofuzz v1.0.0 -> v1.2.0
github.com/google/uuid v1.1.1 -> v1.3.0
github.com/googleapis/gax-go/v2 v2.0.4 -> v2.11.0
github.com/googleapis/gnostic v0.0.0-20170729233727-0c5108395e2d -> v0.5.5
github.com/hashicorp/errwrap v0.0.0-20141028054710-7554cd9344ce -> v1.1.0
github.com/hashicorp/go-multierror v0.0.0-20161216184304-ed905158d874 -> v1.1.1
github.com/imdario/mergo v0.3.5 -> v0.3.12
github.com/json-iterator/go v1.1.8 -> v1.1.12
github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024 -> v0.9.1
github.com/kisielk/errcheck v1.2.0 -> v1.5.0
github.com/konsorten/go-windows-terminal-sequences v1.0.2 -> v1.0.3
github.com/kr/pty v1.1.1 -> v1.1.5
github.com/kr/text v0.1.0 -> v0.2.0
github.com/modern-go/reflect2 v1.0.1 -> v1.0.2
github.com/morikuni/aec v0.0.0-20170113033406-39771216ff4c -> v1.0.0
github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d -> v0.0.0-20191010083416-a7dc8b61c822
github.com/opencontainers/go-digest v1.0.0-rc1 -> v1.0.0
github.com/opencontainers/image-spec v1.0.2 -> v1.1.0-rc2.0.20221005185240-3a7f492d3f1b
github.com/pelletier/go-toml v1.2.0 -> v1.9.5
github.com/prometheus/procfs v0.0.5 -> v0.7.3
github.com/russross/blackfriday v1.5.2 -> v1.6.0
github.com/sirupsen/logrus v1.8.1 -> v1.9.3
github.com/spf13/cobra v0.0.5 -> v1.0.0
github.com/spf13/viper v1.3.2 -> v1.4.0
github.com/urfave/cli v1.22.1 -> v1.22.2
github.com/xeipuuv/gojsonschema v0.0.0-20180618132009-1d523034197f -> v1.2.0
go.opencensus.io v0.22.0 -> v0.24.0
golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3 -> v0.0.0-20200302205851-738671d3881b
golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45 -> v0.10.0
golang.org/x/time v0.0.0-20190308202827-9d24e82272b4 -> v0.0.0-20210723032227-1f47c861a9ac
golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1 -> v0.0.0-20220907171357-04be3eba64a2
google.golang.org/api v0.4.0 -> v0.126.0
google.golang.org/appengine v1.5.0 -> v1.6.7
google.golang.org/genproto v0.0.0-20190425155659-357c62f0e4bb -> v0.0.0-20230711160842-782d3b101e98
google.golang.org/grpc v1.22.0 -> v1.58.3
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 -> v1.0.0-20200227125254-8fa46927fb4f
honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc -> v0.0.1-2020.1.3
k8s.io/api v0.17.16 -> v0.22.5
k8s.io/apimachinery v0.17.16 -> v0.22.5
k8s.io/client-go v0.17.16 -> v0.22.5
k8s.io/gengo v0.0.0-20190128074634-0689ccc1d7d6 -> v0.0.0-20201113003025-83324d819ded
k8s.io/kube-openapi v0.0.0-20200410145947-bcb3869e6f29 -> v0.0.0-20211109043538-20434351676c
k8s.io/utils v0.0.0-20191114184206-e782cd3c129f -> v0.0.0-20210930125809-cb0fa318a74b
sigs.k8s.io/yaml v1.1.0 -> v1.2.0

@sourcery-ai
Copy link
Copy Markdown

sourcery-ai Bot commented Jan 24, 2025

Reviewer's Guide by Sourcery

This PR updates the github.com/containerd/containerd module from v1.3.0 to v1.5.16, which includes several security fixes.

No diagrams generated as the changes look simple and do not need a visual representation.

File-Level Changes

Change Details Files
Updated the containerd module to address multiple security vulnerabilities. app/platform/fabric/e2e-test/specs/go.mod
app/platform/fabric/e2e-test/specs/go.sum

Tips and commands

Interacting with Sourcery

  • Trigger a new review: Comment @sourcery-ai review on the pull request.
  • Continue discussions: Reply directly to Sourcery's review comments.
  • Generate a GitHub issue from a review comment: Ask Sourcery to create an
    issue from a review comment by replying to it. You can also reply to a
    review comment with @sourcery-ai issue to create an issue from it.
  • Generate a pull request title: Write @sourcery-ai anywhere in the pull
    request title to generate a title at any time. You can also comment
    @sourcery-ai title on the pull request to (re-)generate the title at any time.
  • Generate a pull request summary: Write @sourcery-ai summary anywhere in
    the pull request body to generate a PR summary at any time exactly where you
    want it. You can also comment @sourcery-ai summary on the pull request to
    (re-)generate the summary at any time.
  • Generate reviewer's guide: Comment @sourcery-ai guide on the pull
    request to (re-)generate the reviewer's guide at any time.
  • Resolve all Sourcery comments: Comment @sourcery-ai resolve on the
    pull request to resolve all Sourcery comments. Useful if you've already
    addressed all the comments and don't want to see them anymore.
  • Dismiss all Sourcery reviews: Comment @sourcery-ai dismiss on the pull
    request to dismiss all existing Sourcery reviews. Especially useful if you
    want to start fresh with a new review - don't forget to comment
    @sourcery-ai review to trigger a new review!
  • Generate a plan of action for an issue: Comment @sourcery-ai plan on
    an issue to generate a plan of action for it.

Customizing Your Experience

Access your dashboard to:

  • Enable or disable review features such as the Sourcery-generated pull request
    summary, the reviewer's guide, and others.
  • Change the review language.
  • Add, remove or edit custom review instructions.
  • Adjust other review settings.

Getting Help

Copy link
Copy Markdown

@sourcery-ai sourcery-ai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have skipped reviewing this pull request. It seems to have been created by a bot (hey, renovate[bot]!). We assume it knows what it's doing!

@renovate renovate Bot force-pushed the renovate/go-github.com-containerd-containerd-vulnerability branch from 1be46f0 to c736fc4 Compare January 24, 2025 13:59
@renovate renovate Bot changed the title chore(deps): update module github.com/containerd/containerd to v1.5.16 [security] chore(deps): update module github.com/containerd/containerd to v1.5.18 [security] Jan 24, 2025
@renovate renovate Bot force-pushed the renovate/go-github.com-containerd-containerd-vulnerability branch 2 times, most recently from cbf978d to d441465 Compare January 24, 2025 18:52
roderik pushed a commit that referenced this pull request Jan 24, 2025
This PR contains the following updates:

| Package | Type | Update | Change | OpenSSF |
|---|---|---|---|---|
| [npm-run-all2](https://redirect.github.com/bcomnes/npm-run-all2) |
dependencies | major | [`5.0.0` ->
`7.0.2`](https://renovatebot.com/diffs/npm/npm-run-all2/5.0.0/7.0.2) |
[![OpenSSF
Scorecard](https://api.securityscorecards.dev/projects/github.com/bcomnes/npm-run-all2/badge)](https://securityscorecards.dev/viewer/?uri=github.com/bcomnes/npm-run-all2)
|

---

### Release Notes

<details>
<summary>bcomnes/npm-run-all2 (npm-run-all2)</summary>

###
[`v7.0.2`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v702)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v7.0.1...v7.0.2)

##### Merged

- Upgrade: Bump neostandard from 0.11.9 to 0.12.0
[`#164`](https://redirect.github.com/bcomnes/npm-run-all2/pull/164)
- Upgrade: Bump codecov/codecov-action from 4 to 5
[`#161`](https://redirect.github.com/bcomnes/npm-run-all2/pull/161)

##### Commits

- Raise cross-spawn version floor to ^7.0.6
[`45a9e19`](https://redirect.github.com/bcomnes/npm-run-all2/commit/45a9e191b75e0b76433409808b6219d1f4dffe83)
- Merge pull request
[#&#8203;163](https://redirect.github.com/bcomnes/npm-run-all2/issues/163)
from bcomnes/dependabot/npm_and_yarn/mocha-11.0.1
[`285967a`](https://redirect.github.com/bcomnes/npm-run-all2/commit/285967a3fc5076d8c22ecb14823eb6fc274dd835)
- Upgrade: Bump mocha from 10.8.2 to 11.0.1
[`5d1aea5`](https://redirect.github.com/bcomnes/npm-run-all2/commit/5d1aea58f17abd201515f737c06bbe8044d05d21)

###
[`v7.0.1`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v701)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v7.0.0...v7.0.1)

##### Commits

- Revert engine range bump back to Node 18
[`b2e849b`](https://redirect.github.com/bcomnes/npm-run-all2/commit/b2e849bf8d31135751dd7458724344dd1bca120e)

###
[`v7.0.0`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v700---2024-10-21)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.6...v7.0.0)

##### Merged

- Prevent a throw when looking up undefined results
[`#158`](https://redirect.github.com/bcomnes/npm-run-all2/pull/158)

##### Commits

- **Breaking change:** Bump node engines ^18.17.0 || >=20.5.0
[`49b95f0`](https://redirect.github.com/bcomnes/npm-run-all2/commit/49b95f0c4905504a94d1a7ce87fbb7e77ab60df5)
- Merge pull request
[#&#8203;156](https://redirect.github.com/bcomnes/npm-run-all2/issues/156)
from bcomnes/rm-rf-rimraf
[`c661ffc`](https://redirect.github.com/bcomnes/npm-run-all2/commit/c661ffc942e09a68b1a553190d3a550dc0f6a39c)
- Remove rimraf
[`c77e085`](https://redirect.github.com/bcomnes/npm-run-all2/commit/c77e0856c65115b32788c3e9a1e441ba69fbd430)

###
[`v6.2.6`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v626---2024-10-21)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/ee3bf122e700102b9ab27b1d172d98856765f4a4...v6.2.6)

##### Commits

- Prevent a throw when looking up undefined results
[`d928f9a`](https://redirect.github.com/bcomnes/npm-run-all2/commit/d928f9ad59c00a20797c90d35b62ef0aecf0c364)

###
[`v6.2.5`](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.4...ee3bf122e700102b9ab27b1d172d98856765f4a4)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.4...ee3bf122e700102b9ab27b1d172d98856765f4a4)

###
[`v6.2.4`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v624)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.3...v6.2.4)

##### Merged

- Switch to JS-based `which` command
[`#154`](https://redirect.github.com/bcomnes/npm-run-all2/pull/154)

##### Fixed

- Switch to JS-based `which` command
[`#153`](https://redirect.github.com/bcomnes/npm-run-all2/issues/153)

###
[`v6.2.3`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v623)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.2...v6.2.3)

##### Commits

- Merge pull request
[#&#8203;151](https://redirect.github.com/bcomnes/npm-run-all2/issues/151)
from bcomnes/fix-pnpm-agian
[`c43fa2b`](https://redirect.github.com/bcomnes/npm-run-all2/commit/c43fa2b677442c710a29654a333b15c8de4f00ab)
- Avoid passing config fields as flags for pnpm
[`dc2d7da`](https://redirect.github.com/bcomnes/npm-run-all2/commit/dc2d7da61cf0898d0bc2b25747e588325e06b9a9)

###
[`v6.2.2`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v622)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.1...v6.2.2)

##### Commits

- Revert "Compatibility: npm, yarn and pnpm run scripts"
[`fc35f0d`](https://redirect.github.com/bcomnes/npm-run-all2/commit/fc35f0dc4f78afc1c631fa94b6ac85ba0fb0e7b1)

###
[`v6.2.1`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v621)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.2.0...v6.2.1)

##### Merged

- Compatibility: npm, yarn and pnpm run scripts
[`#143`](https://redirect.github.com/bcomnes/npm-run-all2/pull/143)
- Use neostandard + add more static code analysis
[`#142`](https://redirect.github.com/bcomnes/npm-run-all2/pull/142)
- Upgrade: Bump c8 from 9.1.0 to 10.0.0
[`#141`](https://redirect.github.com/bcomnes/npm-run-all2/pull/141)
- Upgrade: Bump p-queue from 7.4.1 to 8.0.1
[`#138`](https://redirect.github.com/bcomnes/npm-run-all2/pull/138)

###
[`v6.2.0`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v620)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.1.2...v6.2.0)

##### Merged

- Placeholder that unfolds into multiple tasks
[`#134`](https://redirect.github.com/bcomnes/npm-run-all2/pull/134)
- 📝 add compatibility note for pnpm.
[`#136`](https://redirect.github.com/bcomnes/npm-run-all2/pull/136)
- Upgrade: Bump codecov/codecov-action from 3 to 4
[`#131`](https://redirect.github.com/bcomnes/npm-run-all2/pull/131)

###
[`v6.1.2`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v612)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.1.1...v6.1.2)

##### Merged

- feat: move to read-package-json-fast
[`#130`](https://redirect.github.com/bcomnes/npm-run-all2/pull/130)
- Upgrade: Bump c8 from 8.0.1 to 9.0.0
[`#127`](https://redirect.github.com/bcomnes/npm-run-all2/pull/127)
- Upgrade: Bump github/codeql-action from 2 to 3
[`#126`](https://redirect.github.com/bcomnes/npm-run-all2/pull/126)
- Upgrade: Bump actions/setup-node from 3 to 4
[`#123`](https://redirect.github.com/bcomnes/npm-run-all2/pull/123)

##### Commits

- Publish the whole project
[`3dde20c`](https://redirect.github.com/bcomnes/npm-run-all2/commit/3dde20c1c8fa973045773e03f4fc121360fdbed4)
- Utilize CJS require for 'read-package-json-fast'
[`605ca15`](https://redirect.github.com/bcomnes/npm-run-all2/commit/605ca15d9adee3ce14da6fcaa98cb14d9c03795c)
- Update FUNDING.yml
[`c838ee9`](https://redirect.github.com/bcomnes/npm-run-all2/commit/c838ee9eea06e545d1a7f25592f7beb8468f1afd)

###
[`v6.1.1`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v611)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.1.0...v6.1.1)

##### Commits

- Add an npm-run-all2 bin alias
[`e6dc017`](https://redirect.github.com/bcomnes/npm-run-all2/commit/e6dc0175006a9a703c1256949f8424922043a33a)
- Fix npx on node 16
[`cfbd974`](https://redirect.github.com/bcomnes/npm-run-all2/commit/cfbd974a5990e8d549ae8bf7bfb632424ff4990b)

###
[`v6.1.0`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v610---2023-10-04)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.6...v6.1.0)

##### Merged

- Upgrade: Bump actions/checkout from 3 to 4
[`#119`](https://redirect.github.com/bcomnes/npm-run-all2/pull/119)

##### Commits

- Lets avoid spawn.sync
[`a3ee6cd`](https://redirect.github.com/bcomnes/npm-run-all2/commit/a3ee6cd9e051471bfd7b1b4d153aa260fc9b6634)
- Add support for pnpm
([#&#8203;117](https://redirect.github.com/bcomnes/npm-run-all2/issues/117))
[`3df3708`](https://redirect.github.com/bcomnes/npm-run-all2/commit/3df37084ab1ae55f873fcbb449ad0d7df8bc328f)

###
[`v6.0.6`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v606---2023-07-04)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.5...v6.0.6)

##### Merged

- Update all esm only packages
[`#114`](https://redirect.github.com/bcomnes/npm-run-all2/pull/114)
- Upgrade: Bump c8 from 7.14.0 to 8.0.0
[`#111`](https://redirect.github.com/bcomnes/npm-run-all2/pull/111)
- Delete .nycrc
[`#109`](https://redirect.github.com/bcomnes/npm-run-all2/pull/109)
- Update CodeQL workflow
[`#110`](https://redirect.github.com/bcomnes/npm-run-all2/pull/110)

##### Commits

- Lint fix and a few hand fixes
[`2c81236`](https://redirect.github.com/bcomnes/npm-run-all2/commit/2c8123694b73084f37b68eb6719632024331d2e9)
- Fix tests
[`79e2c97`](https://redirect.github.com/bcomnes/npm-run-all2/commit/79e2c97c5b32c46d5cf64ce37b3b78cf4035498e)
- Update p-queue and ansi-styles
[`10b075c`](https://redirect.github.com/bcomnes/npm-run-all2/commit/10b075c849153822e9abc1447222d186a1cd6136)

###
[`v6.0.5`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v605---2023-04-03)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.4...v6.0.5)

##### Merged

- Upgrade: Bump bcomnes/npm-bump from 2.1.0 to 2.2.1
[`#104`](https://redirect.github.com/bcomnes/npm-run-all2/pull/104)
- Upgrade: Bump minimatch from 6.2.0 to 7.0.0
[`#103`](https://redirect.github.com/bcomnes/npm-run-all2/pull/103)
- Upgrade: Bump minimatch from 5.1.4 to 6.0.4
[`#102`](https://redirect.github.com/bcomnes/npm-run-all2/pull/102)
- Upgrade: Bump fs-extra from 10.1.0 to 11.1.0
[`#98`](https://redirect.github.com/bcomnes/npm-run-all2/pull/98)

##### Commits

- Merge pull request
[#&#8203;105](https://redirect.github.com/bcomnes/npm-run-all2/issues/105)
from bcomnes/dependabot/npm_and_yarn/minimatch-8.0.2
[`cbf78c8`](https://redirect.github.com/bcomnes/npm-run-all2/commit/cbf78c8155365db9ec06cb8054bc821e057d06e2)
- Upgrade: Bump minimatch from 7.4.4 to 8.0.2
[`c90d02b`](https://redirect.github.com/bcomnes/npm-run-all2/commit/c90d02b02df6dd33cbab01caac44b9729e012bb9)
- Merge pull request
[#&#8203;101](https://redirect.github.com/bcomnes/npm-run-all2/issues/101)
from bcomnes/dependabot/npm_and_yarn/rimraf-4.0.4
[`d0d46a2`](https://redirect.github.com/bcomnes/npm-run-all2/commit/d0d46a2b0aa87a3c0c79b78a013415e7902c8324)

###
[`v6.0.4`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v604---2022-11-09)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.3...v6.0.4)

##### Merged

- When running through npx, use the npm that should be next to it.
[`#96`](https://redirect.github.com/bcomnes/npm-run-all2/pull/96)

###
[`v6.0.3`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v603---2022-11-09)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.2...v6.0.3)

##### Merged

- Upgrade: Bump jsdoc from 3.6.11 to 4.0.0
[`#95`](https://redirect.github.com/bcomnes/npm-run-all2/pull/95)
- Upgrade: Bump bcomnes/npm-bump from 2.0.2 to 2.1.0
[`#92`](https://redirect.github.com/bcomnes/npm-run-all2/pull/92)
- docs: update minimum supported Node version
[`#90`](https://redirect.github.com/bcomnes/npm-run-all2/pull/90)

##### Commits

- Merge pull request
[#&#8203;94](https://redirect.github.com/bcomnes/npm-run-all2/issues/94)
from MarmadileManteater/runjs-being-called-instead-of-npm-run
[`da913f9`](https://redirect.github.com/bcomnes/npm-run-all2/commit/da913f9481543907457bd2298ad17192a4420874)
- Use NPM_CLI_JS over npm_execpath
[`0224167`](https://redirect.github.com/bcomnes/npm-run-all2/commit/022416740f0d9cf8eae2f2e4ca4de8d09a6b67d8)
- Add a proper check for yarn
[`bb41ef6`](https://redirect.github.com/bcomnes/npm-run-all2/commit/bb41ef6fd85a803a4a22e8382f67ea9e3e235b7d)

###
[`v6.0.2`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v602---2022-08-16)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.1...v6.0.2)

##### Merged

- Update package shell quote
[`#89`](https://redirect.github.com/bcomnes/npm-run-all2/pull/89)

###
[`v6.0.1`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v601---2022-06-14)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v6.0.0...v6.0.1)

##### Commits

- Lower bound node engine to ^14.18.0 || >=16.0.0
[`fc2957f`](https://redirect.github.com/bcomnes/npm-run-all2/commit/fc2957f4814848b55bc29b0a0a1def8bfadda18b)

###
[`v6.0.0`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v600---2022-06-11)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v5.0.2...v6.0.0)

##### Merged

- Move support to node 16 and npm 8
[`#85`](https://redirect.github.com/bcomnes/npm-run-all2/pull/85)
- Upgrade: Bump pidtree from 0.5.0 to 0.6.0
[`#84`](https://redirect.github.com/bcomnes/npm-run-all2/pull/84)
- Upgrade: Bump mocha from 9.2.2 to 10.0.0
[`#83`](https://redirect.github.com/bcomnes/npm-run-all2/pull/83)
- Upgrade: Bump github/codeql-action from 1 to 2
[`#82`](https://redirect.github.com/bcomnes/npm-run-all2/pull/82)
- Upgrade: Bump fastify/github-action-merge-dependabot from 3.0.2 to 3.1
[`#78`](https://redirect.github.com/bcomnes/npm-run-all2/pull/78)
- Upgrade: Bump codecov/codecov-action from 2 to 3
[`#77`](https://redirect.github.com/bcomnes/npm-run-all2/pull/77)
- Upgrade: Bump actions/setup-node from 2 to 3
[`#75`](https://redirect.github.com/bcomnes/npm-run-all2/pull/75)
- Upgrade: Bump actions/checkout from 2 to 3
[`#76`](https://redirect.github.com/bcomnes/npm-run-all2/pull/76)
- Upgrade: Bump minimatch from 4.2.1 to 5.0.0
[`#74`](https://redirect.github.com/bcomnes/npm-run-all2/pull/74)
- Upgrade: Bump minimatch from 3.1.1 to 4.1.1
[`#73`](https://redirect.github.com/bcomnes/npm-run-all2/pull/73)
- Upgrade: Bump fastify/github-action-merge-dependabot from 2.7.1 to
3.0.2 [`#72`](https://redirect.github.com/bcomnes/npm-run-all2/pull/72)
- Upgrade: Bump fastify/github-action-merge-dependabot from 2.7.0 to
2.7.1 [`#71`](https://redirect.github.com/bcomnes/npm-run-all2/pull/71)
- Upgrade: Bump fastify/github-action-merge-dependabot from 2.6.0 to
2.7.0 [`#70`](https://redirect.github.com/bcomnes/npm-run-all2/pull/70)
- Upgrade: Bump fastify/github-action-merge-dependabot from 2.5.0 to
2.6.0 [`#69`](https://redirect.github.com/bcomnes/npm-run-all2/pull/69)
- Simplify npm scripts
[`#64`](https://redirect.github.com/bcomnes/npm-run-all2/pull/64)
- Update CI config
[`#62`](https://redirect.github.com/bcomnes/npm-run-all2/pull/62)
- Add CodeQL workflow
[`#65`](https://redirect.github.com/bcomnes/npm-run-all2/pull/65)
- Switch to c8 for coverage
[`#66`](https://redirect.github.com/bcomnes/npm-run-all2/pull/66)
- tests: switch to assert's strict mode
[`#67`](https://redirect.github.com/bcomnes/npm-run-all2/pull/67)
- Enforce LF in the repo.
[`#61`](https://redirect.github.com/bcomnes/npm-run-all2/pull/61)
- Upgrade: Bump actions/setup-node from 2.4.0 to 2.4.1
[`#59`](https://redirect.github.com/bcomnes/npm-run-all2/pull/59)
- Upgrade: Bump fastify/github-action-merge-dependabot from 2.4.0 to
2.5.0 [`#58`](https://redirect.github.com/bcomnes/npm-run-all2/pull/58)
- Upgrade: Bump codecov/codecov-action from 2.0.2 to 2.1.0
[`#57`](https://redirect.github.com/bcomnes/npm-run-all2/pull/57)
- Upgrade: Bump fastify/github-action-merge-dependabot from 2.2.0 to
2.4.0 [`#54`](https://redirect.github.com/bcomnes/npm-run-all2/pull/54)
- Upgrade: Bump actions/setup-node from 2.3.2 to 2.4.0
[`#53`](https://redirect.github.com/bcomnes/npm-run-all2/pull/53)
- Upgrade: Bump actions/setup-node from 2.3.1 to 2.3.2
[`#52`](https://redirect.github.com/bcomnes/npm-run-all2/pull/52)
- Upgrade: Bump actions/setup-node from 2.3.0 to 2.3.1
[`#51`](https://redirect.github.com/bcomnes/npm-run-all2/pull/51)
- Upgrade: Bump codecov/codecov-action from 2.0.1 to 2.0.2
[`#50`](https://redirect.github.com/bcomnes/npm-run-all2/pull/50)
- Upgrade: Bump actions/setup-node from 2.2.0 to 2.3.0
[`#49`](https://redirect.github.com/bcomnes/npm-run-all2/pull/49)
- Upgrade: Bump codecov/codecov-action from 1.5.2 to 2.0.1
[`#48`](https://redirect.github.com/bcomnes/npm-run-all2/pull/48)
- Upgrade: Bump fastify/github-action-merge-dependabot from 2.1.1 to
2.2.0 [`#47`](https://redirect.github.com/bcomnes/npm-run-all2/pull/47)
- Upgrade: Bump actions/setup-node from 2.1.5 to 2.2.0
[`#46`](https://redirect.github.com/bcomnes/npm-run-all2/pull/46)
- Upgrade: Bump codecov/codecov-action from 1.5.0 to 1.5.2
[`#44`](https://redirect.github.com/bcomnes/npm-run-all2/pull/44)
- Upgrade: Bump mocha from 8.4.0 to 9.0.0
[`#43`](https://redirect.github.com/bcomnes/npm-run-all2/pull/43)
- Upgrade: Bump fastify/github-action-merge-dependabot from 2.1.0 to
2.1.1 [`#42`](https://redirect.github.com/bcomnes/npm-run-all2/pull/42)
- Upgrade: Bump fastify/github-action-merge-dependabot from 2.0.0 to
2.1.0 [`#41`](https://redirect.github.com/bcomnes/npm-run-all2/pull/41)
- Upgrade: Bump gh-release from 5.0.2 to 6.0.0
[`#40`](https://redirect.github.com/bcomnes/npm-run-all2/pull/40)
- Upgrade: Bump codecov/codecov-action from 1 to 1.5.0
[`#39`](https://redirect.github.com/bcomnes/npm-run-all2/pull/39)
- Upgrade: Bump fs-extra from 9.1.0 to 10.0.0
[`#38`](https://redirect.github.com/bcomnes/npm-run-all2/pull/38)
- Upgrade: Bump fastify/github-action-merge-dependabot from v1.2.1 to
v2.0.0 [`#33`](https://redirect.github.com/bcomnes/npm-run-all2/pull/33)
- Upgrade: Bump fastify/github-action-merge-dependabot
[`#32`](https://redirect.github.com/bcomnes/npm-run-all2/pull/32)
- Upgrade: Bump fastify/github-action-merge-dependabot from v1.1.1 to
v1.2.0 [`#31`](https://redirect.github.com/bcomnes/npm-run-all2/pull/31)
- Upgrade: Bump actions/setup-node from v2.1.4 to v2.1.5
[`#30`](https://redirect.github.com/bcomnes/npm-run-all2/pull/30)
- Upgrade: Bump gh-release from 4.0.4 to 5.0.0
[`#29`](https://redirect.github.com/bcomnes/npm-run-all2/pull/29)
- Upgrade: Bump actions/setup-node from v2.1.3 to v2.1.4
[`#28`](https://redirect.github.com/bcomnes/npm-run-all2/pull/28)
- Upgrade: Bump actions/setup-node from v2.1.2 to v2.1.3
[`#27`](https://redirect.github.com/bcomnes/npm-run-all2/pull/27)

##### Fixed

- Disable override tests on > npm 7
[`#79`](https://redirect.github.com/bcomnes/npm-run-all2/issues/79)

##### Commits

- **Breaking change:** Bump engines to node 16 and npm 8
[`7d19dd4`](https://redirect.github.com/bcomnes/npm-run-all2/commit/7d19dd47ee70286878f380934d18823310355471)
- Add auto merge
[`e598066`](https://redirect.github.com/bcomnes/npm-run-all2/commit/e598066fea7478e0fce14b4f09d64fdf37b0420f)
- Update test.yml
[`96260d6`](https://redirect.github.com/bcomnes/npm-run-all2/commit/96260d6c088ce0aa2bd367ff0736d653f5b0b1f1)

###
[`v5.0.2`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v502---2020-12-08)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v5.0.1...v5.0.2)

##### Merged

- Upgrade: Bump ansi-styles from 4.3.0 to 5.0.0
[`#26`](https://redirect.github.com/bcomnes/npm-run-all2/pull/26)
- Upgrade: Bump actions/checkout from v2.3.3 to v2.3.4
[`#25`](https://redirect.github.com/bcomnes/npm-run-all2/pull/25)

###
[`v5.0.1`](https://redirect.github.com/bcomnes/npm-run-all2/blob/HEAD/CHANGELOG.md#v501---2020-10-24)

[Compare
Source](https://redirect.github.com/bcomnes/npm-run-all2/compare/v5.0.0...v5.0.1)

##### Commits

- Fix repo field to a valid format
[`00b88f8`](https://redirect.github.com/bcomnes/npm-run-all2/commit/00b88f8a399d45cb104a33357cf56015ab92a1c0)
- Remove duplicate repo field
[`a2d11ff`](https://redirect.github.com/bcomnes/npm-run-all2/commit/a2d11ff3f234812ba660be32f3a9a0aa45a510f6)
- Update FUNDING.yml
[`648a541`](https://redirect.github.com/bcomnes/npm-run-all2/commit/648a5418725b4330571e08e9e1300756c98edd76)

</details>

---

### Configuration

📅 **Schedule**: Branch creation - At any time (no schedule defined),
Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you
are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the
rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update
again.

---

- [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check
this box

---

This PR was generated by [Mend Renovate](https://mend.io/renovate/).
View the [repository job
log](https://developer.mend.io/github/settlemint/hyperledger-explorer).

<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzOS4xMjUuMSIsInVwZGF0ZWRJblZlciI6IjM5LjEyNS4xIiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6WyJkZXBlbmRlbmNpZXMiXX0=-->

Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate Bot force-pushed the renovate/go-github.com-containerd-containerd-vulnerability branch from d441465 to 3d3fbd8 Compare January 24, 2025 19:03
@renovate renovate Bot changed the title chore(deps): update module github.com/containerd/containerd to v1.5.18 [security] chore(deps): update module github.com/containerd/containerd to v1.6.26 [security] Jan 24, 2025
…6 [security]

Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate Bot force-pushed the renovate/go-github.com-containerd-containerd-vulnerability branch from 3d3fbd8 to 0c874cc Compare January 24, 2025 19:13
@renovate renovate Bot merged commit 7dba78c into main Jan 24, 2025
@renovate renovate Bot deleted the renovate/go-github.com-containerd-containerd-vulnerability branch January 24, 2025 22:18
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants