fix(deps): vuln minor upgrades — 11 packages (minor: 7 · patch: 4) [server]#27
Conversation
Release Notesgoogle.golang.org/grpc (v1.66.1 → v1.80.0) — GitHub Releasev1.80.0Behavior Changes
Bug Fixes
New Features
Performance Improvements
(truncated) v1.79.3Security
v1.79.2Bug Fixes
v1.79.1Bug Fixes
v1.79.0API Changes
Behavior Changes
New Features
Bug Fixes
(truncated — see source for full notes) github.com/go-jose/go-jose/v4 (v4.0.5 → v4.1.4) — GitHub Releasev4.1.4What's ChangedFixes Panic in JWE decryption. See GHSA-78h2-9frx-2jm8 Full Changelog: go-jose/go-jose@v4.1.3...v4.1.4 v4.1.3This release drops Go 1.23 support as that Go release is no longer supported. With that, we can drop This release fixes a bug where a critical b64 header was ignored if in an unprotected header. It is now rejected instead of ignored. What's Changed
Full Changelog: go-jose/go-jose@v4.1.2...v4.1.3 v4.1.2What's Changedgo-jose v4.1.2 improves some documentation, errors, and removes the only 3rd-party dependency.
New Contributors
Full Changelog: go-jose/go-jose@v4.1.1...v4.1.2 v4.1.1What's Changed
New Contributors
Full Changelog: go-jose/go-jose@v4.1.0...v4.1.1 v4.1.0What's Changed
New Contributors
Full Changelog: go-jose/go-jose@v4.0.5...v4.1.0 github.com/coreos/go-oidc/v3 (v3.11.0 → v3.18.0) — GitHub Releasev3.18.0What's Changed
Full Changelog: coreos/go-oidc@v3.17.0...v3.18.0 v3.17.0What's Changed
Full Changelog: coreos/go-oidc@v3.16.0...v3.17.0 v3.16.0What's Changed
New Contributors
Full Changelog: coreos/go-oidc@v3.15.0...v3.16.0 v3.15.0What's Changed
Full Changelog: coreos/go-oidc@v3.14.1...v3.15.0 v3.14.1What's Changed
Full Changelog: coreos/go-oidc@v3.14.0...v3.14.1 v3.14.0What's Changed
Full Changelog: coreos/go-oidc@v3.13.0...v3.14.0 v3.13.0What's Changed
Full Changelog: coreos/go-oidc@v3.12.0...v3.13.0 v3.12.0What's Changed
Full Changelog: coreos/go-oidc@v3.11.0...v3.12.0 github.com/grpc-ecosystem/grpc-gateway/v2 (v2.22.0 → v2.29.0) — GitHub Releasev2.29.0What's Changed
New Contributors
Full Changelog: grpc-ecosystem/grpc-gateway@v2.28.0...v2.29.0 v2.28.0What's Changed
New Contributors
Full Changelog: grpc-ecosystem/grpc-gateway@v2.27.8...v2.28.0 v2.27.8What's Changed
New Contributors
Full Changelog: grpc-ecosystem/grpc-gateway@v2.27.7...v2.27.8 v2.27.7Re-release of v2.26.7 as v2.27.7 for correct semver ordering. v2.26.7What's Changed
Full Changelog: grpc-ecosystem/grpc-gateway@v2.27.6...v2.26.7 v2.27.6What's Changed
New Contributors
Full Changelog: grpc-ecosystem/grpc-gateway@v2.27.5...v2.27.6 v2.27.5What's Changed
New Contributors
Full Changelog: grpc-ecosystem/grpc-gateway@v2.27.4...v2.27.5 v2.27.4What's Changed
(truncated — see source for full notes) github.com/labstack/echo/v4 (v4.13.4 → v4.15.1) — GitHub Releasev4.15.0Security WARNING: If your application relies on cross-origin or same-site (same subdomain) requests do not blindly push this version to production The CSRF middleware now supports the Sec-Fetch-Site header as a modern, defense-in-depth approach to CSRF How it works: Modern browsers automatically send the
For browsers that don't send this header (older browsers), the middleware seamlessly falls back to New Configuration Options:
Example: e.Use(middleware.CSRFWithConfig(middleware.CSRFConfig{
// Allow OAuth callbacks from trusted provider
TrustedOrigins: []string{"https://oauth-provider.com"},
// Custom validation for same-site requests
AllowSecFetchSiteFunc: func(c echo.Context) (bool, error) {
// Your custom authorization logic here
return validateCustomAuth(c), nil
// return true, err // blocks r
_(truncated)_
### v4.14.0
`middleware.Logger()` has been deprecated. For request logging, use `middleware.RequestLogger()` or
`middleware.RequestLoggerWithConfig()`.
`middleware.RequestLogger()` replaces `middleware.Logger()`, offering comparable configuration while relying on the
Go standard library’s new `slog` logger.
The previous default output format was JSON. The new default follows the standard `slog` logger settings.
To continue emitting request logs in JSON, configure `slog` accordingly:
```go
slog.SetDefault(slog.New(slog.NewJSONHandler(os.Stdout, nil)))
e.Use(middleware.RequestLogger())If you are developing anything more substantial than a demo, use Security
What's Changed
(truncated) github.com/stretchr/testify (v1.10.0 → v1.11.1) — GitHub Releasev1.11.1This release fixes stretchr/testify#1785 introduced in v1.11.0 where expected argument values implementing the stringer interface ( What's Changed
Full Changelog: stretchr/testify@v1.11.0...v1.11.1 v1.11.0What's ChangedFunctional Changesv1.11.0 Includes a number of performance improvements.
Fixes
Documentation, Build & CI
(truncated) go.temporal.io/api (v1.62.2 → v1.62.9) — GitHub Releasev1.62.9Full Changelog: temporalio/api-go@v1.62.8...v1.62.9 v1.62.8What's Changed
Full Changelog: temporalio/api-go@v1.62.7...v1.62.8 v1.62.7What's Changed
New Contributors
Full Changelog: temporalio/api-go@v1.62.6...v1.62.7 v1.62.6What's Changed
New Contributors
Full Changelog: temporalio/api-go@v1.62.5...v1.62.6 v1.62.5Full Changelog: temporalio/api-go@v1.62.4...v1.62.5 v1.62.4Full Changelog: temporalio/api-go@v1.62.3...v1.62.4 v1.62.3What's Changed
New Contributors
Full Changelog: temporalio/api-go@v1.62.2...v1.62.3 google.golang.org/protobuf (v1.36.5 → v1.36.11) — GitHub Releasev1.36.11Full Changelog: protocolbuffers/protobuf-go@v1.36.10...v1.36.11 User-visible changes: Bug fixes: Maintenance: v1.36.10Full Changelog: protocolbuffers/protobuf-go@v1.36.9...v1.36.10 Bug fixes: Maintenance: v1.36.9Full Changelog: protocolbuffers/protobuf-go@v1.36.8...v1.36.9 User-visible changes: v1.36.8Maintenance: CL/696316: all: set Go language version to Go 1.23 v1.36.7Maintenance / optimizations: CL/683955: encoding/protowire: micro-optimize SizeVarint (-20% on Intel) v1.36.6Full Changelog: protocolbuffers/protobuf-go@v1.36.5...v1.36.6 User-visible changes: Maintenance: Generated by ADMS Sources: 8 GitHub Releases, 3 not available. |
|
Hey, sorry for the noise. This was caused by a bug in our automated dependency update system that incorrectly included upstream changelog content in PR comments, triggering notifications to external contributors. The feature flag has been turned off and we're working on a fix. Sorry about that again. |
Summary: Critical-severity security update — 11 packages upgraded (MINOR changes included)
Manifests changed:
server(go)✅ Action Required: Please review the changes below. If they look good, approve and merge this PR.
Updates
Packages marked with "-" are updated due to dependency constraints.
Security Details
🚨 Critical & High Severity (4 fixed)
v2.3.0v2.27.7server/go.modv2.0.0-20210331031555-b37d688a7fb0v2.0.1server/go.modReview Checklist
Standard review:
Update Mode: Vulnerability Remediation (Critical/High)
🤖 Generated by DataDog Automated Dependency Management System