Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency ipfs/kubo to v0.31.0 #7752

Merged
merged 1 commit into from
Oct 17, 2024

Conversation

uniget-bot
Copy link

This PR contains the following updates:

Package Update Change
ipfs/kubo minor 0.30.0 -> 0.31.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

ipfs/kubo (ipfs/kubo)

v0.31.0

Compare Source

This release was brought to you by the Shipyard team.

Overview

Release v0.31.0 issue #​10499

🗣 Discuss

If you have comments, questions, or feedback on this release, please post here.

If you experienced any bugs with the release, please post an issue.

🔦 Highlights
Experimental Pebble Datastore

Pebble provides a high-performance alternative to leveldb as the datastore, and provides a modern replacement for legacy badgerv1.

A fresh Kubo node can be initialized with pebbleds profile via ipfs init --profile pebbleds.

There are a number of parameters available for tuning pebble's performance to your specific needs. Default values are used for any parameters that are not configured or are set to their zero-value.
For a description of the available tuning parameters, see kubo/docs/datastores.md#pebbleds.

New metrics
lowpower profile no longer breaks DHT announcements

We've notices users were applying lowpower profile, and then reporting content routing issues. This was because lowpower disabled reprovider system and locally hosted data was no longer announced on Amino DHT.

This release changes lowpower profile to not change reprovider settings, ensuring the new users are not sabotaging themselves. It also adds annouce-on and announce-off profiles for controlling announcement settings separately.

[!IMPORTANT]
If you've ever applied the lowpower profile before, there is a high chance your node is not announcing to DHT anymore.
If you have Reprovider.Interval set to 0 you may want to wet it to 22h (or run ipfs config profile apply announce-on) to fix your system.

As a convenience, ipfs daemon will warn if reprovide system is disabled, creating oportinity to fix configuration if it was not intentional.

go 1.23, boxo 0.24 and go-libp2p 0.36.5

Various bugfixes. Please update.

📝 Changelog
Full Changelog
👨‍👩‍👧‍👦 Contributors
Contributor Commits Lines ± Files Changed
Will Scott 3 +731/-581 14
Daniel N 17 +1034/-191 33
Marco Munizaga 5 +721/-404 12
Andrew Gillis 9 +765/-266 35
Marcin Rataj 17 +568/-323 41
Daniel Norman 3 +232/-111 10
sukun 4 +93/-8 8
Jorropo 2 +48/-45 5
Marten Seemann 3 +19/-47 5
fengzie 1 +29/-26 5
Rod Vagg 7 +27/-11 9
gopherfarm 1 +14/-14 6
web3-bot 3 +13/-10 3
Michael Muré 2 +16/-5 4
i-norden 1 +9/-9 1
Elias Rad 1 +7/-7 4
Prithvi Shahi 1 +0/-11 2
Lucas Molas 1 +5/-4 1
elecbug 1 +6/-2 1
gammazero 2 +2/-2 2
chris erway 1 +2/-2 2
Russell Dempsey 1 +2/-1 1
guillaumemichel 1 +1/-1 1

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Copy link

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

Copy link

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/kubo:0.31.0

📦 Image Reference ghcr.io/uniget-org/tools/kubo:0.31.0
digestsha256:18107002e45089d2e4442405b524c6d495a4bba5b4cee684a334b700a6019875
vulnerabilitiescritical: 0 high: 0 medium: 2 low: 1
platformlinux/amd64
size47 MB
packages244
critical: 0 high: 0 medium: 1 low: 0 gopkg.in/square/go-jose.v2 2.5.1 (golang)

pkg:golang/gopkg.in/square/go-jose.v2@2.5.1

medium 4.3: CVE--2024--28180 Improper Handling of Highly Compressed Data (Data Amplification)

Affected range<=2.6.0
Fixed versionNot Fixed
CVSS Score4.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Description

Impact

An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). Thanks to Enze Wang@Alioth and Jianjun Chen@Zhongguancun Lab (@zer0yu and @chenjj) for reporting.

Patches

The problem is fixed in the following packages and versions:

  • github.com/go-jose/go-jose/v4 version 4.0.1
  • github.com/go-jose/go-jose/v3 version 3.0.3
  • gopkg.in/go-jose/go-jose.v2 version 2.6.3

The problem will not be fixed in the following package because the package is archived:

  • gopkg.in/square/go-jose.v2
critical: 0 high: 0 medium: 1 low: 0 github.com/rs/cors 1.10.1 (golang)

pkg:golang/github.com/rs/cors@1.10.1

medium : GHSA--mh55--gqvf--xfwm Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Affected range>=1.9.0
<1.11.0
Fixed version1.11.0
Description

Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.

critical: 0 high: 0 medium: 0 low: 1 google.golang.org/grpc 1.64.0 (golang)

pkg:golang/google.golang.org/grpc@1.64.0

low : GHSA--xr7q--jx4m--x55m Exposure of Sensitive Information to an Unauthorized Actor

Affected range>=1.64.0
<1.64.1
Fixed version1.64.1
Description

Impact

This issue represents a potential PII concern. If applications were printing or logging a context containing gRPC metadata, the affected versions will contain all the metadata, which may include private information.

Patches

The issue first appeared in 1.64.0 and is patched in 1.64.1 and 1.65.0

Workarounds

If using an affected version and upgrading is not possible, ensuring you do not log or print contexts will avoid the problem.

Copy link

Attempting automerge. See https://github.com/uniget-org/tools/actions/runs/11376957780.

Copy link

PR is clean and can be merged. See https://github.com/uniget-org/tools/actions/runs/11376957780.

@github-actions github-actions bot merged commit 22b74dc into main Oct 17, 2024
9 checks passed
@github-actions github-actions bot deleted the renovate/ipfs-kubo-0.x branch October 17, 2024 02:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants