Releases: kubescape/prometheus-exporter
Release v0.2.18
Summary by CodeRabbit
- Chores
- Updated multiple dependencies to their latest stable versions, including logging, telemetry, cryptography, and network libraries for improved security and performance.
Release v0.2.17
Bumps go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp from 0.10.0 to 0.19.0.
Release notes
Sourced from go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp's releases.
Release v0.19.0
Added
- Added
Marshalerconfig option tootlphttpto enable otlp over json or protobufs. (#1586)- A
ForceFlushmethod to the"go.opentelemetry.io/otel/sdk/trace".TracerProviderto flush all registeredSpanProcessors. (#1608)- Added
WithSamplerandWithSpanLimitsto tracer provider. (#1633, #1702)"go.opentelemetry.io/otel/trace".SpanContextnow has aremoteproperty, andIsRemote()predicate, that is true when theSpanContexthas been extracted from remote context data. (#1701)- A
Validmethod to the"go.opentelemetry.io/otel/attribute".KeyValuetype. (#1703)Changed
trace.SpanContextis now immutable and has no exported fields. (#1573)
trace.NewSpanContext()can be used in conjunction with thetrace.SpanContextConfigstruct to initialize a newSpanContextwhere all values are known.- Update the
ForceFlushmethod signature to the"go.opentelemetry.io/otel/sdk/trace".SpanProcessorto accept acontext.Contextand return an error. (#1608)- Update the
Shutdownmethod to the"go.opentelemetry.io/otel/sdk/trace".TracerProviderreturn an error on shutdown failure. (#1608)- The SimpleSpanProcessor will now shut down the enclosed
SpanExporterand gracefully ignore subsequent calls toOnEndafterShutdownis called. (#1612)"go.opentelemetry.io/sdk/metric/controller.basic".WithPusheris replaced withWithExporterto provide consistent naming across project. (#1656)- Added non-empty string check for trace
Attributekeys. (#1659)- Add
descriptionto SpanStatus only whenStatusCodeis set to error. (#1662)- Jaeger exporter falls back to
resource.Default'sservice.nameif the exported Span does not have one. (#1673)- Jaeger exporter populates Jaeger's Span Process from Resource. (#1673)
- Renamed the
LabelSetmethod of"go.opentelemetry.io/otel/sdk/resource".ResourcetoSet. (#1692)- Changed
WithSDKtoWithSDKOptionsto accept variadic arguments ofTracerProviderOptiontype ingo.opentelemetry.io/otel/exporters/trace/jaegerpackage. (#1693)- Changed
WithSDKtoWithSDKOptionsto accept variadic arguments ofTracerProviderOptiontype ingo.opentelemetry.io/otel/exporters/trace/zipkinpackage. (#1693)"go.opentelemetry.io/otel/sdk/resource".NewWithAttributeswill now drop any invalid attributes passed. (#1703)"go.opentelemetry.io/otel/sdk/resource".StringDetectorwill now error if the produced attribute is invalid. (#1703)Removed
- Removed
serviceNameparameter from Zipkin exporter and uses resource instead. (#1549)- Removed
WithConfigfrom tracer provider to avoid overriding configuration. (#1633)- Removed the exported
SimpleSpanProcessorandBatchSpanProcessorstructs. These are now returned as a SpanProcessor interface from their respective constructors. (#1638)- Removed
WithRecord()fromtrace.SpanOptionwhen creating a span. (#1660)- Removed setting status to
Errorwhile recording an error as a span event inRecordError. (#1663)- Removed
jaeger.WithProcessconfiguration option. (#1673)- Removed
ApplyConfigmethod from"go.opentelemetry.io/otel/sdk/trace".TracerProviderand the now unneededConfigstruct. (#1693)Fixed
- Jaeger Exporter: Ensure mapping between OTEL and Jaeger span data complies with the specification. (#1626)
SamplingResult.TraceStateis correctly propagated to a newly created span'sSpanContext. (#1655)- The
otel-collectorexample now correctly flushes metric events prior to shutting down the exporter. (#1678)- Do not set span status message in
SpanStatusFromHTTPStatusCodeif it can be inferred fromhttp.status_code. (#1681)- Synchronization issues in global trace delegate implementation. (#1686)
- Reduced excess memory usage by global
TracerProvider. (#1687)
Raw changes made between v0.18.0 and v0.19.0
... (truncated)
Changelog
Sourced from go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp's changelog.
[1.43.0/0.65.0/0.19.0] 2026-04-02
Added
- Add
IsRandomandWithRandomonTraceFlags, andIsRandomonSpanContextingo.opentelemetry.io/otel/tracefor W3C Trace Context Level 2 Random Trace ID Flag support. (#8012)- Add service detection with
WithServiceingo.opentelemetry.io/otel/sdk/resource. (#7642)- Add
DefaultWithContextandEnvironmentWithContextingo.opentelemetry.io/otel/sdk/resourceto support plumbingcontext.Contextthrough default and environment detectors. (#8051)- Support attributes with empty value (
attribute.EMPTY) ingo.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc. (#8038)- Support attributes with empty value (
attribute.EMPTY) ingo.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc. (
Release v0.2.13
Bumps google.golang.org/grpc from 1.70.0 to 1.79.3.
Release notes
Sourced from google.golang.org/grpc's releases.
Release 1.79.3
Security
- server: fix an authorization bypass where malformed :path headers (missing the leading slash) could bypass path-based restricted "deny" rules in interceptors like
grpc/authz. Any request with a non-canonical path is now immediately rejected with anUnimplementederror. (#8981)Release 1.79.2
Bug Fixes
- stats: Prevent redundant error logging in health/ORCA producers by skipping stats/tracing processing when no stats handler is configured. (grpc/grpc-go#8874)
Release 1.79.1
Bug Fixes
- grpc: Remove the
-devsuffix from the User-Agent header. (grpc/grpc-go#8902)Release 1.79.0
API Changes
- mem: Add experimental API
SetDefaultBufferPoolto change the default buffer pool. (#8806)
- Special Thanks:
@vanja-p- experimental/stats: Update
MetricsRecorderto require embedding the newUnimplementedMetricsRecorder(a no-op struct) in all implementations for forward compatibility. (#8780)Behavior Changes
- balancer/weightedtarget: Remove handling of
Addressesand only handleEndpointsin resolver updates. (#8841)New Features
- experimental/stats: Add support for asynchronous gauge metrics through the new
AsyncMetricReporterandRegisterAsyncReporterAPIs. (#8780)- pickfirst: Add support for weighted random shuffling of endpoints, as described in gRFC A113.
- This is enabled by default, and can be turned off using the environment variable
GRPC_EXPERIMENTAL_PF_WEIGHTED_SHUFFLING. (#8864)- xds: Implement
:authorityrewriting, as specified in gRFC A81. (#8779)- balancer/randomsubsetting: Implement the
random_subsettingLB policy, as specified in gRFC A68. (#8650)
- Special Thanks:
@marek-szewsBug Fixes
- credentials/tls: Fix a bug where the port was not stripped from the authority override before validation. (#8726)
- Special Thanks:
@Atul1710- xds/priority: Fix a bug causing delayed failover to lower-priority clusters when a higher-priority cluster is stuck in
CONNECTINGstate. (#8813)- health: Fix a bug where health checks failed for clients using legacy compression options (
WithDecompressororRPCDecompressor). (#8765)
- Special Thanks:
@sanki92- transport: Fix an issue where the HTTP/2 server could skip header size checks when terminating a stream early. (#8769)
- Special Thanks:
@joybestourous- server: Propagate status detail headers, if available, when terminating a stream during request header processing. (#8754)
- Special Thanks:
@joybestourousPerformance Improvements
... (truncated)
Commits
dda86dbChange version to 1.79.3 (#8983)72186f1grpc: enforce strict path checking for incoming requests on the server (#8981)97ca352Changing version to 1.79.3-dev (#8954)8902ab6Change the version to release 1.79.2 (#8947)a928670Cherry-pick #8874 to v1.79.x (#8904)06df363Change version to 1.79.2-dev (#8903)782f2deChange version to 1.79.1 (#8902)850eccbChange version to 1.79.1-dev (#8851)765ff05Change version to 1.79.0 (#8850)68804beCherry pick #8864 to v1.79.x (#8896)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.
Release v0.2.12
Bumps go.opentelemetry.io/otel/sdk from 1.34.0 to 1.40.0.
Changelog
Sourced from go.opentelemetry.io/otel/sdk's changelog.
[1.40.0/0.62.0/0.16.0] 2026-02-02
Added
- Add
AlwaysRecordsampler ingo.opentelemetry.io/otel/sdk/trace. (#7724)- Add
Enabledmethod to all synchronous instrument interfaces (Float64Counter,Float64UpDownCounter,Float64Histogram,Float64Gauge,Int64Counter,Int64UpDownCounter,Int64Histogram,Int64Gauge,) ingo.opentelemetry.io/otel/metric. This stabilizes the synchronous instrument enabled feature, allowing users to check if an instrument will process measurements before performing computationally expensive operations. (#7763)- Add
go.opentelemetry.io/otel/semconv/v1.39.0package. The package contains semantic conventions from thev1.39.0version of the OpenTelemetry Semantic Conventions. See the migration documentation for information on how to upgrade fromgo.opentelemetry.io/otel/semconv/v1.38.0.(#7783, #7789)Changed
- Improve the concurrent performance of
HistogramReservoiringo.opentelemetry.io/otel/sdk/metric/exemplarby 4x. (#7443)- Improve the concurrent performance of
FixedSizeReservoiringo.opentelemetry.io/otel/sdk/metric/exemplar. (#7447)- Improve performance of concurrent histogram measurements in
go.opentelemetry.io/otel/sdk/metric. (#7474)- Improve performance of concurrent synchronous gauge measurements in
go.opentelemetry.io/otel/sdk/metric. (#7478)- Add experimental observability metrics in
go.opentelemetry.io/otel/exporters/stdout/stdoutmetric. (#7492)Exporteringo.opentelemetry.io/otel/exporters/prometheusignores metrics with the scopego.opentelemetry.io/contrib/bridges/prometheus. This prevents scrape failures when the Prometheus exporter is misconfigured to get data from the Prometheus bridge. (#7688)- Improve performance of concurrent exponential histogram measurements in
go.opentelemetry.io/otel/sdk/metric. (#7702)- The
rpc.grpc.status_codeattribute in the experimental metrics emitted fromgo.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcis replaced with therpc.response.status_codeattribute to align with the semantic conventions. (#7854)- The
rpc.grpc.status_codeattribute in the experimental metrics emitted fromgo.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpcis replaced with therpc.response.status_codeattribute to align with the semantic conventions. (#7854)Fixed
- Fix bad log message when key-value pairs are dropped because of key duplication in
go.opentelemetry.io/otel/sdk/log. (#7662)- Fix
DroppedAttributesonRecordingo.opentelemetry.io/otel/sdk/logto not count the non-attribute key-value pairs dropped because of key duplication. (#7662)- Fix
SetAttributesonRecordingo.opentelemetry.io/otel/sdk/logto not log that attributes are dropped when they are actually not dropped. (#7662)- Fix missing
request.GetBodyingo.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttpto correctly handle HTTP/2GOAWAYframe. (#7794)WithHostIDdetector ingo.opentelemetry.io/otel/sdk/resourceto use full path forioregcommand on Darwin (macOS). (#7818)Deprecated
- Deprecate
go.opentelemetry.io/otel/exporters/zipkin. For more information, see the OTel blog post deprecating the Zipkin exporter. (#7670)[1.39.0/0.61.0/0.15.0/0.0.14] 2025-12-05
Added
- Greatly reduce the cost of recording metrics in
go.opentelemetry.io/otel/sdk/metricusing hashing for map keys. (#7175)- Add
WithInstrumentationAttributeSetoption togo.opentelemetry.io/otel/log,go.opentelemetry.io/otel/metric, andgo.opentelemetry.io/otel/tracepackages. This provides a concurrent-safe and performant alternative toWithInstrumentationAttributesby accepting a pre-constructedattribute.Set. (#7287)- Add experimental observability for the Prometheus exporter in
go.opentelemetry.io/otel/exporters/prometheus. Check thego.opentelemetry.io/otel/exporters/prometheus/internal/xpackage documentation for more information. (#7345)- Add experimental observability metrics in
go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpc. (#7353)- Add temporality selector functions
DeltaTemporalitySelector,CumulativeTemporalitySelector,LowMemoryTemporalitySelectortogo.opentelemetry.io/otel/sdk/metric. (#7434)- Add experimental observability metrics for simple log processor in
go.opentelemetry.io/otel/sdk/log. (#7548)- Add experimental observability metrics in
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc. (#7459)
... (truncated)
Commits
a3a5317Release v1.40.0 (#7859)77785dachore(deps): update github/codeql-action action to v4.32.1 (#7858)56fa1c2chore(deps): update module github.com/clipperhouse/uax29/v2 to v2.5.0 (#7857)298cbedUpgrade semconv use to v1.39.0 (#7854)3264bf1refactor: modernize code (#7850)fd5d030chore(deps): update module github.com/grpc-ecosystem/grpc-gateway/v2 to v2.27...
Release v0.2.11
Bumps golang.org/x/crypto from 0.40.0 to 0.45.0.
Commits
4e0068cgo.mod: update golang.org/x dependenciese79546essh: curb GSSAPI DoS risk by limiting number of specified OIDsf91f7a7ssh/agent: prevent panic on malformed constraint2df4153acme/autocert: let automatic renewal work with short lifetime certsbcf6a84acme: pass context to requestb4f2b62ssh: fix error message on unsupported cipher79ec3a5ssh: allow to bind to a hostname in remote forwarding122a78fgo.mod: update golang.org/x dependenciesc0531f9all: eliminate vet diagnostics0997000all: fix some comments- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.
Release v0.2.10
Merge pull request #38 from kubescape/bump Bump github.com/ulikunitz/xz from v0.5.14 to v0.5.15
Release v0.2.9
Bumps github.com/containerd/containerd from 1.7.27 to 1.7.29.
Release notes
Sourced from github.com/containerd/containerd's releases.
containerd 1.7.29
Welcome to the v1.7.29 release of containerd!
The twenty-ninth patch release for containerd 1.7 contains various fixes and updates including security patches.
Security Updates
containerd
runc
Highlights
Image Distribution
- Update differ to handle zstd media types (#12018)
Runtime
Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.
Contributors
- Derek McGowan
- Akihiro Suda
- Phil Estes
- Austin Vazquez
- Sebastiaan van Stijn
- ningmingxiao
- Maksym Pavlenko
- StepSecurity Bot
- wheat2018
Changes
... (truncated)
Commits
442cb34Merge commit from forke5cb6ddMerge commit from fork9772966Merge pull request #12486 from dmcgowan/prepare-v1.7.291fc2daaPrepare release notes for v1.7.2993f710aMerge pull request #12480 from k8s-infra-cherrypick-robot/cherry-pick-12475-t...68d04beMerge pull request #12471 from austinvazquez/1_7_update_ci_go_and_images3f5f9f8runc: Update runc binary to v1.3.3667409fci: bump Go 1.24.9, 1.25.3294f8c0Update GHA runners to use latest images for basic binaries buildcf66b41Update GHA runners to use latest image for most jobs- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.
Release v0.2.8
Bumps github.com/ulikunitz/xz from 0.5.12 to 0.5.14.
Commits
7184815Preparation of release v0.5.1488ddf1dAddress Security Issue GHSA-jc7w-c686-c4v9c8314b8Add new package xio with WriteCloserStack- See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.
Release v0.2.7
Bumps github.com/docker/docker from 27.1.1+incompatible to 28.0.0+incompatible.
Release notes
Sourced from github.com/docker/docker's releases.
v28.0.0
28.0.0
For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:
- docker/cli, 28.0.0 milestone
- moby/moby, 28.0.0 milestone
- Deprecated and removed features, see Deprecated Features.
- Changes to the Engine API, see API version history.
New
- Add ability to mount an image inside a container via
--mount type=image. moby/moby#48798
- You can also specify
--mount type=image,image-subpath=[subpath],...option to mount a specific path from the image. docker/cli#5755docker images --treenow shows metadata badges. docker/cli#5744docker load,docker save, anddocker historynow support a--platformflag allowing you to choose a specific platform for single-platform operations on multi-platform images. docker/cli#5331- Add
OOMScoreAdjtodocker service createanddocker stack. docker/cli#5145docker buildx prunenow supportsreserved-space,max-used-space,min-free-spaceandkeep-bytesfilters. moby/moby#48720- Windows: Add support for running containerd as a child process of the daemon, instead of using a system-installed containerd. moby/moby#47955
Networking
- The
docker-proxybinary has been updated, older versions will not work with the updateddockerd. moby/moby#48132
- Close a window in which the userland proxy (
docker-proxy) could accept TCP connections, that would then fail afteriptablesNAT rules were set up.- The executable
rootlesskit-docker-proxyis no longer used, it has been removed from the build and distribution.- DNS nameservers read from the host's
/etc/resolv.confare now always accessed from the host's network namespace. moby/moby#48290
- When the host's
/etc/resolv.confcontains no nameservers and there are no--dnsoverrides, Google's DNS servers are no longer used, apart from by the default bridge network and in build containers.- Container interfaces in bridge and macvlan networks now use randomly generated MAC addresses. moby/moby#48808
- Gratuitous ARP / Neighbour Advertisement messages will be sent when the interfaces are started so that, when IP addresses are reused, they're associated with the newly generated MAC address.
- IPv6 addresses in the default bridge network are now IPAM-assigned, rather than being derived from the MAC address.
- The deprecated OCI
prestarthook is now only used by build containers. For other containers, network interfaces are added to the network namespace after task creation is complete, before the container task is started. moby/moby#47406- Add a new
gw-priorityoption todocker run,docker container create, anddocker network connect. This option will be used by the Engine to determine which network provides the default gateway for a container. Ondocker run, this option is only available through the extended--networksyntax. docker/cli#5664- Add a new netlabel
com.docker.network.endpoint.ifnameto customize the interface name used when connecting a container to a network. It's supported by all built-in network drivers on Linux. moby/moby#49155
- When a container is created with multiple networks specified, there's no guarantee on the order networks will be connected to the container. So, if a custom interface name uses the same prefix as the auto-generated names, for example
eth, the container might fail to start.- The recommended practice is to use a different prefix, for example
en0, or a numerical suffix high enough to never collide, for exampleeth100.- This label can be specified on
docker network connectvia the--driver-optflag, for exampledocker network connect --driver-opt=com.docker.network.endpoint.ifname=foobar ….- Or via the long-form
--networkflag ondocker run, for exampledocker run --network=name=bridge,driver-opt=com.docker.network.endpoint.ifname=foobar …- If a custom network driver reports capability
GwAllocCheckerthen, before a network is created, it will get aGwAllocCheckerRequestwith the network's options. The custom driver may then reply that no gateway IP address should be allocated. moby/moby#49372Port publishing in bridge networks
dockerdnow requiresipsetsupport in the Linux kernel. moby/moby#48596
- The
iptablesandip6tablesrules used to implement port publishing and network isolation have been extensively modified. This enables some of the following functional changes, and is a first step in refactoring to enable nativenftablessupport in a future release. moby/moby#48815- If it becomes necessary to downgrade to an earlier version of the daemon, some manual cleanup of the new rules will be necessary. The simplest and surest approach is to reboot the host, or use
iptables -Fandip6tables -Fto flush all existingiptablesrules from thefiltertable before starting the older version of the daemon. When that is not possible, run the following commands as root:
iptables -D FORWARD -m set --match-set docker-ext-bridges-v4 dst -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT; ip6tables -D FORWARD -m set --match-set docker-ext-bridges-v6 dst -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPTiptables -D FORWARD -m set --match-set docker-ext-bridges-v4 dst -j DOCKER; ip6tables -D FORWARD -m set --match-set docker-ext-bridges-v6 dst -j DOCKER- If you were previously running with the iptables filter-FORWARD policy set to
ACCEPTand need to restore access to unpublished ports, also delete per-bridge-network rules from theDOCKERchains. For example,iptables -D DOCKER ! -i docker0 -o docker0 -j DROP.- Fix a security issue that was allowing remote hosts to connect directly to a container on its published ports. moby/moby#49325
- Fix a security issue that was allowing neighbor hosts to connect to ports mapped on a loopback address. moby/moby#49325
... (truncated)
Commits
af898abMerge pull request #49495 from vvoland/update-buildkitd67f035vendor: github.com/moby/buildkit v0.20.000ab386Merge pull request #49491 from vvoland/update-buildkit1fde8c4builder-next: fix cdi managercde9f07vendor: github.com/moby/buildkit v0.20.0-rc389e1429Merge pull request #49490 from thaJeztah/dockerfile_linting
Release v0.2.5
Bumps golang.org/x/oauth2 from 0.25.0 to 0.27.0.
Commits
681b4d8jws: split token into fixed number of parts3f78298all: upgrade go directive to at least 1.23.0 [generated]109dabfendpoints: add links/provider for Discordac571faoauth2: fix docs for Config.DeviceAuth314ee5bendpoints: add patreon endpointb9c813bgoogle: add warning about externally-provided credentials- See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.