Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update alpine to 3.16, switch from bzr to breezy, resolve all vulnerabilities #429

Merged
merged 2 commits into from
May 4, 2023

Conversation

kinghrothgar
Copy link
Contributor

@kinghrothgar kinghrothgar commented Jul 1, 2022

What kind of change does this PR introduce? (check at least one)

  • Bugfix
  • Feature
  • Code style update
  • Refactor
  • Build-related changes
  • Other, please describe:

The PR fulfills these requirements:

  • All tests are passing?
  • New/updated tests are included?
  • If any static assets have been updated, has ui/bindata.go been regenerated?
  • Are there doc blocks for functions that I updated/created?

If adding a new feature, the PR's description includes:

  • A convincing reason for adding this feature (to avoid wasting your time, it's best to open a suggestion issue first and wait for approval before working on it)

Vulnerabilities:
The current image has lots of vulnerabilities:

docker scan before upgrade (20 vulnerabilities)
Testing hound...

✗ Low severity vulnerability found in openssl/libcrypto1.1
  Description: Inadequate Encryption Strength
  Info: https://snyk.io/vuln/SNYK-ALPINE311-OPENSSL-1075739
  Introduced through: openssl/[email protected], openssl/[email protected], apk-tools/[email protected], apr-util/[email protected], libtls-standalone/[email protected], python2/[email protected], ca-certificates/ca-certificates@20191127-r2, curl/[email protected], python3/[email protected], openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, serf/[email protected]
  From: openssl/[email protected]
  From: openssl/[email protected] > openssl/[email protected]
  From: apk-tools/[email protected] > openssl/[email protected]
  and 19 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.1.1j-r0

✗ Medium severity vulnerability found in openssl/libcrypto1.1
  Description: NULL Pointer Dereference
  Info: https://snyk.io/vuln/SNYK-ALPINE311-OPENSSL-1075737
  Introduced through: openssl/[email protected], openssl/[email protected], apk-tools/[email protected], apr-util/[email protected], libtls-standalone/[email protected], python2/[email protected], ca-certificates/ca-certificates@20191127-r2, curl/[email protected], python3/[email protected], openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, serf/[email protected]
  From: openssl/[email protected]
  From: openssl/[email protected] > openssl/[email protected]
  From: apk-tools/[email protected] > openssl/[email protected]
  and 19 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.1.1j-r0

✗ Medium severity vulnerability found in openssl/libcrypto1.1
  Description: NULL Pointer Dereference
  Info: https://snyk.io/vuln/SNYK-ALPINE311-OPENSSL-1089241
  Introduced through: openssl/[email protected], openssl/[email protected], apk-tools/[email protected], apr-util/[email protected], libtls-standalone/[email protected], python2/[email protected], ca-certificates/ca-certificates@20191127-r2, curl/[email protected], python3/[email protected], openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, serf/[email protected]
  From: openssl/[email protected]
  From: openssl/[email protected] > openssl/[email protected]
  From: apk-tools/[email protected] > openssl/[email protected]
  and 19 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.1.1k-r0

✗ Medium severity vulnerability found in busybox/busybox
  Description: Out-of-bounds Read
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1920721
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r11

✗ High severity vulnerability found in openssl/libcrypto1.1
  Description: Integer Overflow or Wraparound
  Info: https://snyk.io/vuln/SNYK-ALPINE311-OPENSSL-1075738
  Introduced through: openssl/[email protected], openssl/[email protected], apk-tools/[email protected], apr-util/[email protected], libtls-standalone/[email protected], python2/[email protected], ca-certificates/ca-certificates@20191127-r2, curl/[email protected], python3/[email protected], openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, serf/[email protected]
  From: openssl/[email protected]
  From: openssl/[email protected] > openssl/[email protected]
  From: apk-tools/[email protected] > openssl/[email protected]
  and 19 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.1.1j-r0

✗ High severity vulnerability found in openssl/libcrypto1.1
  Description: Improper Certificate Validation
  Info: https://snyk.io/vuln/SNYK-ALPINE311-OPENSSL-1089242
  Introduced through: openssl/[email protected], openssl/[email protected], apk-tools/[email protected], apr-util/[email protected], libtls-standalone/[email protected], python2/[email protected], ca-certificates/ca-certificates@20191127-r2, curl/[email protected], python3/[email protected], openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, serf/[email protected]
  From: openssl/[email protected]
  From: openssl/[email protected] > openssl/[email protected]
  From: apk-tools/[email protected] > openssl/[email protected]
  and 19 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.1.1k-r0

✗ High severity vulnerability found in openssl/libcrypto1.1
  Description: Out-of-bounds Read
  Info: https://snyk.io/vuln/SNYK-ALPINE311-OPENSSL-1569447
  Introduced through: openssl/[email protected], openssl/[email protected], apk-tools/[email protected], apr-util/[email protected], libtls-standalone/[email protected], python2/[email protected], ca-certificates/ca-certificates@20191127-r2, curl/[email protected], python3/[email protected], openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, serf/[email protected]
  From: openssl/[email protected]
  From: openssl/[email protected] > openssl/[email protected]
  From: apk-tools/[email protected] > openssl/[email protected]
  and 19 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.1.1l-r0

✗ High severity vulnerability found in busybox/busybox
  Description: Improper Handling of Exceptional Conditions
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1090152
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r10

✗ High severity vulnerability found in busybox/busybox
  Description: Use After Free
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1920714
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r11

✗ High severity vulnerability found in busybox/busybox
  Description: Use After Free
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1920716
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r11

✗ High severity vulnerability found in busybox/busybox
  Description: Use After Free
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1920723
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r11

✗ High severity vulnerability found in busybox/busybox
  Description: Use After Free
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1920724
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r11

✗ High severity vulnerability found in busybox/busybox
  Description: Use After Free
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1920740
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r11

✗ High severity vulnerability found in busybox/busybox
  Description: Use After Free
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1920741
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r11

✗ High severity vulnerability found in busybox/busybox
  Description: Use After Free
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1920749
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r11

✗ High severity vulnerability found in busybox/busybox
  Description: Use After Free
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1920753
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r11

✗ High severity vulnerability found in busybox/busybox
  Description: Use After Free
  Info: https://snyk.io/vuln/SNYK-ALPINE311-BUSYBOX-1920756
  Introduced through: busybox/[email protected], alpine-baselayout/[email protected], ca-certificates/ca-certificates@20191127-r2, subversion/[email protected], busybox/[email protected]
  From: busybox/[email protected]
  From: alpine-baselayout/[email protected] > busybox/[email protected]
  From: ca-certificates/ca-certificates@20191127-r2 > busybox/[email protected]
  and 2 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.31.1-r11

✗ High severity vulnerability found in apk-tools/apk-tools
  Description: Out-of-bounds Read
  Info: https://snyk.io/vuln/SNYK-ALPINE311-APKTOOLS-1246343
  Introduced through: apk-tools/[email protected]
  From: apk-tools/[email protected]
  Image layer: Introduced by your base image (alpine:3.11.7)
  Fixed in: 2.10.6-r0

✗ Critical severity vulnerability found in openssl/libcrypto1.1
  Description: Buffer Overflow
  Info: https://snyk.io/vuln/SNYK-ALPINE311-OPENSSL-1569451
  Introduced through: openssl/[email protected], openssl/[email protected], apk-tools/[email protected], apr-util/[email protected], libtls-standalone/[email protected], python2/[email protected], ca-certificates/ca-certificates@20191127-r2, curl/[email protected], python3/[email protected], openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, openssh/[email protected]_p1-r1, serf/[email protected]
  From: openssl/[email protected]
  From: openssl/[email protected] > openssl/[email protected]
  From: apk-tools/[email protected] > openssl/[email protected]
  and 19 more...
  Image layer: 'apk add go git subversion libc-dev mercurial bzr openssh tini'
  Fixed in: 1.1.1l-r0

✗ Critical severity vulnerability found in apk-tools/apk-tools
  Description: Out-of-bounds Read
  Info: https://snyk.io/vuln/SNYK-ALPINE311-APKTOOLS-1534687
  Introduced through: apk-tools/[email protected]
  From: apk-tools/[email protected]
  Image layer: Introduced by your base image (alpine:3.11.7)
  Fixed in: 2.10.7-r0



Package manager:   apk
Project name:      docker-image|hound
Docker image:      hound
Platform:          linux/amd64
Base image:        alpine:3.11.7

Tested 52 dependencies for known vulnerabilities, found 20 vulnerabilities.

Base Image     Vulnerabilities  Severity
alpine:3.11.7  20               2 critical, 14 high, 3 medium, 1 low

Recommendations for base image upgrade:

Minor upgrades
Base Image      Vulnerabilities  Severity
alpine:3.12.12  0                0 critical, 0 high, 0 medium, 0 low

Alpine 3.11.7 is no longer supported by the Alpine maintainers. Vulnerability detection may be affected by a lack of security updates.

For more free scans that keep your images secure, sign up to Snyk at https://dockr.ly/3ePqVcp

-------------------------------------------------------

Testing hound...

Package manager:   npm
Target file:       /go/src/github.com/hound-search/hound/package.json
Project name:      hound
Docker image:      hound

✔ Tested hound for known vulnerabilities, no vulnerable paths found.

For more free scans that keep your images secure, sign up to Snyk at https://dockr.ly/3ePqVcp


Tested 2 projects, 1 contained vulnerable paths.

This upgrade handles all vulnerabilities found by Snyk in the container:

`docker scan` after upgrade (0 vulnerabilities)
Testing hound...

Package manager:   apk
Project name:      docker-image|hound
Docker image:      hound
Platform:          linux/amd64
Base image:        alpine:3.16.0

✔ Tested 61 dependencies for known vulnerabilities, no vulnerable paths found.

According to our scan, you are currently using the most secure version of the selected base image

For more free scans that keep your images secure, sign up to Snyk at https://dockr.ly/3ePqVcp

-------------------------------------------------------

Testing hound...

Package manager:   npm
Target file:       /go/src/github.com/hound-search/hound/package.json
Project name:      hound
Docker image:      hound

✔ Tested hound for known vulnerabilities, no vulnerable paths found.

For more free scans that keep your images secure, sign up to Snyk at https://dockr.ly/3ePqVcp


Tested 2 projects, no vulnerable paths were found.

Overview:
This updates the container to a supported version of Alpine. It also drops the patch version hardcoding from the alpine version so that non breaking security fixes will get built in automatically without risking breaking changes.

Switching from package bzr to breezy is a drop in and required by the upgrade. The command path and usage does not change between packages.

This has the added benefit that currently if you try to build the docker image on arm64 you get a gcc error. This PR also fixes that.

@kinghrothgar kinghrothgar changed the title Update alpine to 3.16 and switch from bzr to breezy Update alpine to 3.16, switch from bzr to breezy, resolve all vulnerabilities Jul 1, 2022
@dschott68 dschott68 self-requested a review May 4, 2023 23:54
Copy link
Contributor

@dschott68 dschott68 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

tested Docker using local docker build. all working. Thank you so much for this PR

@dschott68
Copy link
Contributor

okay with the Create docker image check failure as should be able to push from this PR

#13 ERROR: failed to push ghcr.io/hound-search/hound:latest: unexpected status: 403 Forbidden
------
 > exporting to image:
------
ERROR: failed to solve: failed to push ghcr.io/hound-search/hound:latest: unexpected status: 403 Forbidden
Error: buildx failed with: ERROR: failed to solve: failed to push ghcr.io/hound-search/hound:latest: unexpected status: 403 Forbidden

@dschott68 dschott68 merged commit 6b38958 into hound-search:main May 4, 2023
rwtnorton added a commit to EasyPost/hound that referenced this pull request Dec 2, 2024
Summary:
Merge pull request hound-search#387 from corbosman/main

Adds support for Github webhooks, so that committing to a repository sends a webhook request to hound, which then re-indexes the repository. Per contributor @corbosman, this enabled his org to use Hound with thousands of repos and keep indexes fresh.

Omit ports in constructed URL (hound-search#383)

Improve accessibility (hound-search#398)

* Resolve WCAG2AA.Principle3.Guideline3_1.3_1_1.H57.2

* Resolve WCAG2AA.Principle4.Guideline4_1.4_1_2.H91.InputText.Name

* Resolve WCAG2AA.Principle4.Guideline4_1.4_1_2.H91.Button.Name

* Improve stats contrast

* Improve advanced text contrast

* Improve repo title contrast

* Improve contrast in advanced section

* Improve line number contrast

* Improve excluded files contrast

* Improve "load all" button contrast

Automatically build docker image and publish to ghcr.io (hound-search#401)

* Feat: Use goreleaser

* Feat: Add docker build, remove goreleaser

* Fix: Add image name

* Feat: Use ghcr.io and build-push-action@2

* We try again

* Trying yet again

* Fix: Use actor and GITHUB_TOKEN

* Fix: Use github.actor in image tag path

* Fix: use github.repository_owner instead of github.actor

When you have an organisation, github.actor != github.repository_owner

Co-authored-by: Jone Marius Vignes <[email protected]>

Update default-config.json (hound-search#391)

* Update default-config.json

* Update default-config.json (ref: main)

Add hyperlinks to repository root (hound-search#396)

Add literal search option (hound-search#397)

* Add literal search option

* Pull EscapeRegExp into common.js

* Add db/ to Jest ignore patterns

* Test EscapeRegExp() matches its input

* Test vacuous EscapeRegExp

Give repo links a target of blank (hound-search#404)

Add rel="noopener noreferrer" to _blank links

Adding pull request template

Update README to use ghcr.io

Currently, the README suggests running an outdated version of hound. There's been a lot of good work done in the past [3 years](https://hub.docker.com/r/etsy/hound/tags).

The container registry was updated in hound-search#401

Add latest tag

Fix typo

Remove default branch warning

It's been almost a year since we renamed the default branch to `main`. The warning can probably be taken out.

ui: collapse and expand files Fixes hound-search#182

Fix the linter, update golang versions. (hound-search#422)

* golangci to v3 per https://stackoverflow.com/questions/71758856/github-action-for-golangci-lint-fails-with-cant-load-fmt

* add with latest

* add setup-go and specific version

* update version

* Use only one actions/checkout, previous version of go linter

The linter (`golangci`) and the action that runs the linter (`golangci/golangci-lint-action`) are separate. The linter seems to be running but finding new errors, so this change might be enough to temporarily squash those.

* Drop go 1.12 and 1.13,  add 1.17 and 1.18

There's a new golang version every 6 months. The latest two golang versions are supported officially. I'm keeping 1.14 around for now since it was previously the latest supported version.

* Only run linter on 1.17

The 1.18 linter has import issues that we'll investigate later.

* update version

* nolint

* nolint

* nolint

* nolint

* update lint to go 1.18

Co-authored-by: David Schott <[email protected]>

chore: Bump version const

Otherwise, `houndd -version` spits out the wrong version.
Anticipating the patch release that this commit will go out with.

Add config.json to .gitignore

Add .dockerignore

Adding the setup-qemu-action to enable multiplatform docker builds from github actions

Attempt auto-generated files

Add badge

refactor to use filenames and no regex

add config override

add some docs

add config test

Update version for release

Update Makefile to reflect the move to a go module.

Convert Signal to es6 class. (hound-search#440)

Upgrade all devDependencies in webpack build. (hound-search#439)

Corrected a typo in readme.md

chore: add manual install option (hound-search#446)

* chore: add another option to install hound

* chore: format

* chore: add $GOPATH/bin in installation

* fix indentation for bulleted list

---------

Co-authored-by: dschott <[email protected]>

kick off for pull requests (hound-search#448)

Add my name to the README

change Advanced options div ID

Merge pull request hound-search#449 from hound-search/jswensen-bug-385

[Issue 385] change Advanced options div ID

Update list of maintainers with additional volunteers (hound-search#451)

Add `display-name` option to customize/disambiguate output (hound-search#454)

Rebuild ui/bindata.go

It seems that ui/bindata.go has got out of sync; the changes from
d25b221 aren't applying and the
advanced dialog box is always showing, as the div doesn't match.

Regenerating this seems to make things work

Closes: hound-search#453

bump the version (hound-search#457)

Update alpine to 3.16 and switch from bzr to breezy (hound-search#429)

Co-authored-by: David Schott <[email protected]>

Add support for manually setting a limit on results

* Added a query parameter to allow user to specify max results, rather
  than a hard limit at 5000, for each index.
* Added support for a default max result limit in the config.  If unset,
  it remains at the former default of 5000 results per index.
* Fixed issue where no results would be returned if the limit was
  exceeded - now it simply returns the results up to the limit.

Add tests for parse min/max bounds

Merge pull request hound-search#464 from hound-search/AlexTalks/tests

Add support for manually setting a limit on results(copy)

Another attempt to replace go-bindata with //go:embed (hound-search#460)

* switch from go-bindata to embed

Signed-off-by: moson-mo <[email protected]>

* bump semver dependency to v4

Signed-off-by: moson-mo <[email protected]>

* amend workflow jobs for go-embed switch

Signed-off-by: moson-mo <[email protected]>

---------

Signed-off-by: moson-mo <[email protected]>

Remove jquery from hound

Merge pull request hound-search#465 from hound-search/iagu/remove-jquery

Remove jquery from hound

Add fake source

Copy with rsync

fake: Do not copy, use a symlink

Rebase on the latest version

Replace tar hashing with golang.org/x/mod and add options

Rename vcs driver from "fake" to "local"

Rename "detect-changes" to "watch-changes"

Update the README

Clarify a few things in the comments

Suppress the linting error

Prevent line numbers from being copied in search results

Merge remote-tracking branch 'mainline/main' into sync_with_mainline

support phab repo links

Reviewers: #risk_assessment_framework!

Subscribers: #risk_assessment_framework

Differential Revision: https://phab.easypo.net/D61327
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants