GitHub
02/13/2024, 12:04 PMGitHub
02/13/2024, 3:15 PM<https://github.com/jmpsec/osctrl/tree/main|main>
by javuto
<https://github.com/jmpsec/osctrl/commit/4f14d99ba4b0b55a10557666e68075087db19c0a|4f14d99b>
- Updates to actions and remove path for upload-artifacts
<https://github.com/jmpsec/osctrl/commit/c4352bbd07c9b83d259f648c461efee3f61ad21b|c4352bbd>
- Path parameter for action is required
<https://github.com/jmpsec/osctrl/commit/c4d50622e2dd989dbd053a0d8b0c9f777bd7ac39|c4d50622>
- Merge pull request #406 from jmpsec/bump-actions-updates
jmpsec/osctrlGitHub
02/13/2024, 7:00 PMGitHub
02/13/2024, 7:05 PM<https://github.com/jmpsec/osctrl/tree/main|main>
by javuto
<https://github.com/jmpsec/osctrl/commit/60d735010e07750abf32c9c885d024328f4efa9b|60d73501>
- Typos, updates to actions and fix
<https://github.com/jmpsec/osctrl/commit/12cc21a9cccc02e655719cec934ed0d1dbf5e232|12cc21a9>
- Merge pull request #407 from jmpsec/fix-typos-updates-actions
jmpsec/osctrlGitHub
02/13/2024, 7:28 PMGitHub
02/13/2024, 7:42 PM<https://github.com/jmpsec/osctrl/tree/main|main>
by javuto
<https://github.com/jmpsec/osctrl/commit/43235552322d98e4ce3e092229e93e0aed5444e6|43235552>
- Difference between tagged and not when creating DEB packages
<https://github.com/jmpsec/osctrl/commit/7f832647385afcedb3aca114742ad01027a751cc|7f832647>
- Merge pull request #408 from jmpsec/fix-create-deb-tagged-and-not
jmpsec/osctrlGitHub
02/13/2024, 9:13 PMDockerfile
was not copied from the generated artifact.
jmpsec/osctrl
✅ All checks have passed
30/30 successful checksGitHub
02/13/2024, 9:17 PM<https://github.com/jmpsec/osctrl/tree/main|main>
by javuto
<https://github.com/jmpsec/osctrl/commit/76ab51e42e0c4099530918dab29f5a723298802a|76ab51e4>
- Copied bin to expected file by Dockerfile
<https://github.com/jmpsec/osctrl/commit/e34604689e67553741c70850c89670d93a7c2d24|e3460468>
- Merge pull request #409 from jmpsec/fix-docker-bin-copied
jmpsec/osctrlRonald Cardoso
02/27/2024, 5:45 PMGitHub
03/02/2024, 7:08 PMOSCTRL_VERSION=0.3.4
OSQUERY_VERSION=5.10.2
NGINX_VERSION=1.21.1-alpine
POSTGRES_VERSION=13.5-alpine
POSTGRES_DB_NAME=osctrl
POSTGRES_DB_USERNAME=osctrl
POSTGRES_DB_PASSWORD=osctrl
REDIS_PASSWORD=osctrl
JWT_SECRET=2c98e9c283f55df5bc6c30ac5e35170c7a584552958da475ed7ff04b8ea1859f
OSCTRL_USER=admin
OSCTRL_PASS=1234655
REDIS_VERSION=6.2.6-alpine3.15
But after this when i run docker-compose up -d i got these errors
From "osctrl-admin" container
osctrl-admin | main.go:613: Initializing backend...
ubuntu-osquery_1 | 2023/11/21 11:32:52 ❌ Failed to execute - Failed to create backend - Failed to load DB configuration - Config File "config" Not Found in "[]"
ubuntu-osquery_1 | sleep: missing operand
ubuntu-osquery_1 | Try 'sleep --help' for more information.
ubuntu-osquery_1 | DB is not ready
osctrl-admin |
osctrl-admin | 2023/11/21 11:32:52 /home/runner/work/osctrl/osctrl/backend/backend.go:64
osctrl-admin | [error] failed to initialize database, got error failed to connect to `host=postgres user=osctrl database=osctrl`: dial error (dial tcp 172.23.0.3:5432: connect: connection refused)
osctrl-admin | main.go:621: Failed to connect to backend - Failed to get DB - failed to connect to `host=postgres user=osctrl database=osctrl`: dial error (dial tcp 172.23.0.3:5432: connect: connection refused)
ubuntu-osquery_
From osctrl-postgres container
2023-11-22 04:54:31.087 UTC [8899] FATAL: role "${POSTGRES_USER}" does not exist
2023-11-22 04:54:41.167 UTC [8907] FATAL: role "${POSTGRES_USER}" does not exist
2023-11-22 04:54:51.248 UTC [8915] FATAL: role "${POSTGRES_USER}" does not exist
2023-11-22 04:55:01.329 UTC [8922] FATAL: role "${POSTGRES_USER}" does not exist
2023-11-22 04:55:11.431 UTC [8930] FATAL: role "${POSTGRES_USER}" does not exist
2023-11-22 04:55:21.507 UTC [8937] FATAL: role "${POSTGRES_USER}" does not exist
2023-11-22 04:55:31.599 UTC [8944] FATAL: role "${POSTGRES_USER}" does not exist
2023-11-22 04:55:41.688 UTC [8952] FATAL: role "${POSTGRES_USER}" does not exist
2023-11-22 04:55:51.813 UTC [8959] FATAL: role "${POSTGRES_USER}" does not exist
Do you have any idea about to resolve this issue
jmpsec/osctrlGitHub
03/02/2024, 7:11 PMGitHub
03/02/2024, 7:12 PM./deploy/docker/dockerize.sh -u -b -f -J -D
[+] ROOTDIR=.
[+] DOCKERDIR=./deploy/docker
[+] Preparing certificates for osctrl
[+] Generating deploy/docker/conf/tls/osctrl.key and deploy/docker/conf/tls/osctrl.crt with OpenSSL
[+] Generated a 65 bytes JWT secret
OSCTRL_VERSION=0.3.1
OSQUERY_VERSION=5.6.0
NGINX_VERSION=1.21.1-alpine
POSTGRES_VERSION=10-alpine
POSTGRES_DB_NAME=osctrl
POSTGRES_DB_USERNAME=osctrl
POSTGRES_DB_PASSWORD=osctrl
REDIS_PASSWORD=osctrl
JWT_SECRET=
[+] Building containers from deploy/docker/docker-compose-dev.yml and using ./.env
postgres uses an image, skipping
Building osctrl-api
Sending build context to Docker daemon 7.362MB
Step 1/47 : FROM golang:latest AS osctrl-tls
---> 8295ad49803f
Step 2/47 : ENV GO111MODULE=on
---> Using cache
---> 6d8609b1626e
Step 3/47 : RUN apt-get update -y && apt-get install zip curl -y
---> Using cache
---> 366c516edee0
Step 4/47 : ARG POSTGRES_DB_NAME
---> Using cache
---> 7273ccf2cb69
Step 5/47 : ARG POSTGRES_DB_USERNAME
---> Using cache
---> 95e7d0334cd9
Step 6/47 : ARG POSTGRES_DB_PASSWORD
---> Using cache
---> 32f897bfb3bd
Step 7/47 : ARG JWT_SECRET
---> Using cache
---> 54f1464a540e
Step 8/47 : RUN useradd -ms /bin/bash osctrl-tls
---> Running in 85cfe40adc14
Removing intermediate container 85cfe40adc14
---> 5a897f7c6fae
Step 9/47 : RUN mkdir -p /opt/osctrl/
---> Running in 4228624a8af4
Removing intermediate container 4228624a8af4
---> 13d81ecd7c56
Step 10/47 : RUN mkdir -p /opt/osctrl/bin
---> Running in 8b71285c95a9
Removing intermediate container 8b71285c95a9
---> a1288275f202
Step 11/47 : RUN mkdir -p /opt/osctrl/config
---> Running in 8590ae5ca1db
Removing intermediate container 8590ae5ca1db
---> a474b1e8756f
Step 12/47 : RUN go build -o /opt/osctrl/bin/osctrl-tls tls/*.go
---> Running in 7586c50d3fad
malformed import path "tls/*.go": invalid char '*'
The command '/bin/sh -c go build -o /opt/osctrl/bin/osctrl-tls tls/*.go' returned a non-zero code: 1
ERROR: Service 'osctrl-api' failed to build : Build failed
make: *** [Makefile:170: docker_dev] Error 1
Any idea?
Thanks in advance !
jmpsec/osctrlGitHub
03/02/2024, 7:12 PMGitHub
03/02/2024, 7:16 PMprovision.sh
jmpsec/osctrl
✅ All checks have passed
30/30 successful checksGitHub
03/02/2024, 8:10 PM<https://github.com/jmpsec/osctrl/tree/main|main>
by javuto
<https://github.com/jmpsec/osctrl/commit/4eb345626e1fc8ba9a213e4a2186da40f7b853c8|4eb34562>
- Installing postgres 14 via provision.sh
<https://github.com/jmpsec/osctrl/commit/eee477318f28d4b04c7ce32ae62776b4c05ef13b|eee47731>
- Merge pull request #410 from jmpsec/upgrade-postgres-14
jmpsec/osctrlGitHub
03/03/2024, 2:30 PMScreen Shot 2022-05-26 at 12 53 53 AM▾
GitHub
03/03/2024, 2:38 PMosctrl-cli
jmpsec/osctrl
✅ All checks have passed
30/30 successful checksGitHub
03/03/2024, 2:44 PM<https://github.com/jmpsec/osctrl/tree/main|main>
by javuto
<https://github.com/jmpsec/osctrl/commit/db84565ede49568d77ae02a6352537baeb455ab4|db84565e>
- Small fixes in osctrl-cli for output messages
<https://github.com/jmpsec/osctrl/commit/14da7628cc3f8ae1eff1a68bf774b014d8e488aa|14da7628>
- Merge pull request #411 from jmpsec/small-issues-cli
jmpsec/osctrlGitHub
03/05/2024, 6:19 PMGitHub
03/07/2024, 9:00 PMGitHub
03/08/2024, 8:04 PM<https://github.com/jmpsec/osctrl/tree/main|main>
by javuto
<https://github.com/jmpsec/osctrl/commit/e4b8756127fcc28c7c122b26f3fc103fc888b863|e4b87561>
- Backend can be multiple versions of postgres
<https://github.com/jmpsec/osctrl/commit/770dce76e6ba8368d91c9bc1cf1d7986dc8baf0c|770dce76>
- Merge pull request #413 from jmpsec/improvements-backend-setup
jmpsec/osctrlGitHub
03/08/2024, 11:33 PMprovision.sh
to be able to deploy osctrl in Ubuntu 20.04 and Debian 12. Related with backend (postgres) and cache (redis).
jmpsec/osctrl
✅ All checks have passed
30/30 successful checksGitHub
03/08/2024, 11:37 PM<https://github.com/jmpsec/osctrl/tree/main|main>
by javuto
<https://github.com/jmpsec/osctrl/commit/f5fba01f2a0c14574dfe2c27dad4c7f69623f76f|f5fba01f>
- Fix for the provision script in Ubuntu 20 and Debian 12
<https://github.com/jmpsec/osctrl/commit/da1c1289354913541c209dd471445b54b7982688|da1c1289>
- Removal of motd script
<https://github.com/jmpsec/osctrl/commit/08315430edc09056805fe0a6b3360b8707f23546|08315430>
- Fix for debian check
<https://github.com/jmpsec/osctrl/commit/e7c1a17d6defde739006ae31a3872dd97050bf9d|e7c1a17d>
- Install redis in debian
<https://github.com/jmpsec/osctrl/commit/358efdc923450ac2356a29e6dd78391e6eac7627|358efdc9>
- Merge pull request #414 from jmpsec/improvements-backend-setup-fix
jmpsec/osctrlGitHub
03/09/2024, 12:04 AMprovision.sh
script.
jmpsec/osctrl
✅ All checks have passed
30/30 successful checksGitHub
03/09/2024, 12:11 AM<https://github.com/jmpsec/osctrl/tree/main|main>
by javuto
<https://github.com/jmpsec/osctrl/commit/b3548a1e7685332511f914526c4812cfef370068|b3548a1e>
- Removing metrics from the provision script
<https://github.com/jmpsec/osctrl/commit/c96451957a31d0e3047eff0bfceedd40810b5273|c9645195>
- Merge pull request #415 from jmpsec/remove-metrics-provision
jmpsec/osctrlGitHub
03/12/2024, 3:24 PM4.18.2 (March 4, 2024)
Fix CVE-2024-27289
SQL injection can occur when all of the following conditions are met:
1. The non-default simple protocol is used.
2. A placeholder for a numeric value must be immediately preceded by a minus.
3. There must be a second placeholder for a string value after the first placeholder; both must be on the same line.
4. Both parameter values must be user-controlled.
Thanks to Paul Gerste for reporting this issue.
Fix CVE-2024-27304
SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.
Thanks to Paul Gerste for reporting this issue.
• Fix *dbTx.Exec not checking if it is already closed
4.18.1 (February 27, 2023)
• Fix: Support pgx v4 and v5 stdlib in same program (Tomáš Procházka)
4.18.0 (February 11, 2023)
• Upgrade pgconn to v1.14.0
• Upgrade pgproto3 to v2.3.2
• Upgrade pgtype to v1.14.0
• Fix query sanitizer when query text contains Unicode replacement character
• Fix context with value in BeforeConnect (David Harju)
• Support pgx v4 and v5 stdlib in same program (Vitalii Solodilov)Commits • `14690df` Update changelog • `779548e` Update required Go version to 1.17 • `80e9662` Update github.com/jackc/pgconn to v1.14.3 • `0bf9ac3` Fix erroneous test case • `f94eb0e` Always wrap arguments in parentheses in the SQL sanitizer • `826a892` Fix SQL injection via line comment creation in simple protocol • `7d882f9` Fix *dbTx.Exec not checking if it is already closed • `1d07b8b` go mod tidy • `13468eb` Release v4.18.1 • `7fed69b` simplify duplicate
pgx
registration guard
• Additional commits viewable in compare view
Dependabot compatibility score
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
* * *
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
• @dependabot rebase
will rebase this PR
• @dependabot recreate
will recreate this PR, overwriting any edits that have been made to it
• @dependabot merge
will merge this PR after your CI passes on it
• @dependabot squash and merge
will squash and merge this PR after your CI passes on it
• @dependabot cancel merge
will cancel a previously requested merge and block automerging
• @dependabot reopen
will reopen this PR if it is closed
• @dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
• @dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency
• @dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
• @dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
• @dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.
jmpsec/osctrl
GitHub Actions: build_and_test (cli, windows, arm64)
GitHub Actions: build_and_test (cli, windows, amd64)
GitHub Actions: build_and_test (cli, darwin, arm64)
GitHub Actions: build_and_test (cli, darwin, amd64)
GitHub Actions: build_and_test (cli, linux, arm64)
GitHub Actions: build_and_test (cli, linux, amd64)
GitHub Actions: build_and_test (cli, windows, arm64)
GitHub Actions: build_and_test (cli, windows, amd64)
GitHub Actions: build_and_test (api, darwin, arm64)
GitHub Actions: build_and_test (cli, darwin, arm64)
GitHub Actions: build_and_test (api, darwin, amd64)
GitHub Actions: build_and_test (cli, darwin, amd64)
GitHub Actions: build_and_test (api, linux, arm64)
GitHub Actions: build_and_test (cli, linux, arm64)
GitHub Actions: build_and_test (api, linux, amd64)
GitHub Actions: build_and_test (cli, linux, amd64)
GitHub Actions: build_and_test (api, darwin, arm64)
GitHub Actions: build_and_test (admin, darwin, arm64)
GitHub Actions: build_and_test (api, darwin, amd64)
GitHub Actions: build_and_test (admin, darwin, amd64)
GitHub Actions: build_and_test (admin, linux, arm64)
GitHub Actions: build_and_test (api, linux, arm64)
GitHub Actions: build_and_test (api, linux, amd64)
GitHub Actions: build_and_test (admin, linux, amd64)
✅ 6 other checks have passed
6/30 successful checksGitHub
03/12/2024, 6:54 PM<https://github.com/jmpsec/osctrl/tree/main|main>
by javuto
<https://github.com/jmpsec/osctrl/commit/c81d653cf9ea689bf617a14f2e298a53718f1195|c81d653c>
- Bump github.com/jackc/pgx/v4 from 4.17.2 to 4.18.2 in /users
<https://github.com/jmpsec/osctrl/commit/1837002360e28c10c350c1d1b94e460a74d66521|18370023>
- Merge pull request #416 from jmpsec/dependabot/go_modules/users/github.com/jackc/pgx/v4-4.18.2
jmpsec/osctrlGitHub
03/14/2024, 9:46 PM5.5.4 (March 4, 2024)
Fix CVE-2024-27304
SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.
Thanks to Paul Gerste for reporting this issue.
• Fix behavior of CollectRows to return empty slice if Rows are empty (Felix)
• Fix simple protocol encoding of json.RawMessage
• Fix *Pipeline.getResults should close pipeline on error
• Fix panic in TryFindUnderlyingTypeScanPlan (David Kurman)
• Fix deallocation of invalidated cached statements in a transaction
• Handle invalid sslkey file
• Fix scan float4 into sql.Scanner
• Fix pgtype.Bits not making copy of data from read buffer. This would cause the data to be corrupted by future reads.
5.5.3 (February 3, 2024)
• Fix: prepared statement already exists
• Improve CopyFrom auto-conversion of text-ish values
• Add ltree type support (Florent Viel)
• Make some properties of Batch and QueuedQuery public (Pavlo Golub)
• Add AppendRows function (Edoardo Spadolini)
• Optimize convert UUID [16]byte to string (Kirill Malikov)
• Fix: LargeObject Read and Write of more than ~1GB at a time (Mitar)
5.5.2 (January 13, 2024)
• Allow NamedArgs to start with underscore
• pgproto3: Maximum message body length support (jeremy.spriet)
• Upgrade golang.org/x/crypto to v0.17.0
• Add snake_case support to RowToStructByName (Tikhon Fedulov)
• Fix: update description cache after exec prepare (James Hartig)
• Fix: pipeline checks if it is closed (James Hartig and Ryan Fowler)
• Fix: normalize timeout / context errors during TLS startup (Samuel Stauffer)
• Add OnPgError for easier centralized error handling (James Hartig)
5.5.1 (December 9, 2023)
• Add CopyFromFunc helper function. (robford)
• Add PgConn.Deallocate method that uses PostgreSQL protocol Close message.
• pgx uses new PgConn.Deallocate method. This allows deallocating statements to work in a failed transaction. This fixes a case where the prepared statement map could become invalid.
• Fix: Prefer driver.Valuer over json.Marshaler for json fields. (Jacopo)
• Fix: simple protocol SQL sanitizer previously panicked if an invalid $0 placeholder was used. This now returns an error instead. (maksymnevajdev)
• Add pgtype.Numeric.ScanScientific (Eshton Robateau)
5.5.0 (November 4, 2023)... (truncated) Commits • `da6f2c9` Update changelog • `c543134` SQL sanitizer wraps arguments in parentheses • `20344df` Check for overflow on uint16 sizes in pgproto3 • `adbb38f` Do not allow protocol messages larger than ~1GB • `c1b0a01` Fix behavior of CollectRows to return empty slice if Rows are empty • `88dfc22` Fix simple protocol encoding of json.RawMessage • `2e84dcc` *Pipeline.getResults should close pipeline on error • `d149d3f` Fix panic in TryFindUnderlyingTypeScanPlan • `046f497` deallocateInvalidatedCachedStatements now runs in transactions • `8896bd6` Handle invalid sslkey file • Additional commits viewable in compare view Dependabot compatibility score Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.
* * *
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
• @dependabot rebase
will rebase this PR
• @dependabot recreate
will recreate this PR, overwriting any edits that have been made to it
• @dependabot merge
will merge this PR after your CI passes on it
• @dependabot squash and merge
will squash and merge this PR after your CI passes on it
• @dependabot cancel merge
will cancel a previously requested merge and block automerging
• @dependabot reopen
will reopen this PR if it is closed
• @dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
• @dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency
• @dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
• @dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
• @dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.
jmpsec/osctrl
GitHub Actions: build_and_test (cli, windows, arm64)
GitHub Actions: build_and_test (cli, windows, amd64)
GitHub Actions: build_and_test (cli, darwin, arm64)
GitHub Actions: build_and_test (cli, darwin, amd64)
GitHub Actions: build_and_test (cli, windows, arm64)
GitHub Actions: build_and_test (cli, linux, arm64)
GitHub Actions: build_and_test (cli, windows, amd64)
GitHub Actions: build_and_test (cli, linux, amd64)
GitHub Actions: build_and_test (cli, darwin, arm64)
GitHub Actions: build_and_test (cli, darwin, amd64)
GitHub Actions: build_and_test (cli, linux, arm64)
GitHub Actions: build_and_test (api, darwin, arm64)
GitHub Actions: build_and_test (cli, linux, amd64)
GitHub Actions: build_and_test (api, darwin, amd64)
GitHub Actions: build_and_test (api, linux, arm64)
GitHub Actions: build_and_test (api, linux, amd64)
GitHub Actions: build_and_test (api, darwin, arm64)
GitHub Actions: build_and_test (api, darwin, amd64)
GitHub Actions: build_and_test (api, linux, arm64)
GitHub Actions: build_and_test (admin, darwin, arm64)
GitHub Actions: build_and_test (api, linux, amd64)
GitHub Actions: build_and_test (admin, darwin, amd64)
GitHub Actions: build_and_test (admin, linux, arm64)
✅ 7 other checks have passed
7/30 successful checksGitHub
03/14/2024, 9:49 PM<http://github.com/jackc/pgx/v5|github.com/jackc/pgx/v5>
from 5.2.0 to 5.5.4
Changelog
Sourced from github.com/jackc/pgx/v5's changelog.
5.5.4 (March 4, 2024)
Fix CVE-2024-27304
SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.
Thanks to Paul Gerste for reporting this issue.
• Fix behavior of CollectRows to return empty slice if Rows are empty (Felix)
• Fix simple protocol encoding of json.RawMessage
• Fix *Pipeline.getResults should close pipeline on error
• Fix panic in TryFindUnderlyingTypeScanPlan (David Kurman)
• Fix deallocation of invalidated cached statements in a transaction
• Handle invalid sslkey file
• Fix scan float4 into sql.Scanner
• Fix pgtype.Bits not making copy of data from read buffer. This would cause the data to be corrupted by future reads.
5.5.3 (February 3, 2024)
• Fix: prepared statement already exists
• Improve CopyFrom auto-conversion of text-ish values
• Add ltree type support (Florent Viel)
• Make some properties of Batch and QueuedQuery public (Pavlo Golub)
• Add AppendRows function (Edoardo Spadolini)
• Optimize convert UUID [16]byte to string (Kirill Malikov)
• Fix: LargeObject Read and Write of more than ~1GB at a time (Mitar)
5.5.2 (January 13, 2024)
• Allow NamedArgs to start with underscore
• pgproto3: Maximum message body length support (jeremy.spriet)
• Upgrade golang.org/x/crypto to v0.17.0
• Add snake_case support to RowToStructByName (Tikhon Fedulov)
• Fix: update description cache after exec prepare (James Hartig)
• Fix: pipeline checks if it is closed (James Hartig and Ryan Fowler)
• Fix: normalize timeout / context errors during TLS startup (Samuel Stauffer)
• Add OnPgError for easier centralized error handling (James Hartig)
5.5.1 (December 9, 2023)
• Add CopyFromFunc helper function. (robford)
• Add PgConn.Deallocate method that uses PostgreSQL protocol Close message.
• pgx uses new PgConn.Deallocate method. This allows deallocating statements to work in a failed transaction. This fixes a case where the prepared statement map could become invalid.
• Fix: Prefer driver.Valuer over json.Marshaler for json fields. (Jacopo)
• Fix: simple protocol SQL sanitizer previously panicked if an invalid $0 placeholder was used. This now returns an error instead. (maksymnevajdev)
• Add pgtype.Numeric.ScanScientific (Eshton Robateau)
5.5.0 (November 4, 2023)... (truncated) Commits • `da6f2c9` Update changelog • `c543134` SQL sanitizer wraps arguments in parentheses • `20344df` Check for overflow on uint16 sizes in pgproto3 • `adbb38f` Do not allow protocol messages larger than ~1GB • `c1b0a01` Fix behavior of CollectRows to return empty slice if Rows are empty • `88dfc22` Fix simple protocol encoding of json.RawMessage • `2e84dcc` *Pipeline.getResults should close pipeline on error • `d149d3f` Fix panic in TryFindUnderlyingTypeScanPlan • `046f497` deallocateInvalidatedCachedStatements now runs in transactions • `8896bd6` Handle invalid sslkey file • Additional commits viewable in compare view Dependabot compatibility score Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.
* * *
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
• @dependabot rebase
will rebase this PR
• @dependabot recreate
will recreate this PR, overwriting any edits that have been made to it
• @dependabot merge
will merge this PR after your CI passes on it
• @dependabot squash and merge
will squash and merge this PR after your CI passes on it
• @dependabot cancel merge
will cancel a previously requested merge and block automerging
• @dependabot reopen
will reopen this PR if it is closed
• @dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
• @dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency
• @dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
• @dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
• @dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
• @dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency
• @dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditions
You can disable automated security fix PRs for this repo from the Security Alerts page.
jmpsec/osctrl
GitHub Actions: build_and_test (cli, windows, arm64)
GitHub Actions: build_and_test (cli, windows, amd64)
GitHub Actions: build_and_test (cli, darwin, arm64)
GitHub Actions: build_and_test (cli, darwin, amd64)
GitHub Actions: build_and_test (cli, linux, arm64)
GitHub Actions: build_and_test (cli, windows, arm64)
GitHub Actions: build_and_test (cli, linux, amd64)
GitHub Actions: build_and_test (cli, windows, amd64)
GitHub Actions: build_and_test (cli, darwin, arm64)
GitHub Actions: build_and_test (cli, darwin, amd64)
GitHub Actions: build_and_test (api, darwin, arm64)
GitHub Actions: build_and_test (cli, linux, arm64)
GitHub Actions: build_and_test (api, darwin, amd64)
GitHub Actions: build_and_test (cli, linux, amd64)
GitHub Actions: build_and_test (api, linux, arm64)
GitHub Actions: build_and_test (api, linux, amd64)
GitHub Actions: build_and_test (api, darwin, arm64)
GitHub Actions: build_and_test (api, darwin, amd64)
GitHub Actions: build_and_test (admin, darwin, arm64)
GitHub Actions: build_and_test (api, linux, arm64)
GitHub Actions: build_and_test (admin, darwin, amd64)
GitHub Actions: build_and_test (api, linux, amd64)
GitHub Actions: build_and_test (admin, linux, arm64)
✅ 7 other checks have passed
7/30 successful checksGitHub
03/14/2024, 10:17 PM<http://github.com/jackc/pgx/v5|github.com/jackc/pgx/v5>
from 5.5.1 to 5.5.4
Changelog
Sourced from github.com/jackc/pgx/v5's changelog.
5.5.4 (March 4, 2024)
Fix CVE-2024-27304
SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.
Thanks to Paul Gerste for reporting this issue.
• Fix behavior of CollectRows to return empty slice if Rows are empty (Felix)
• Fix simple protocol encoding of json.RawMessage
• Fix *Pipeline.getResults should close pipeline on error
• Fix panic in TryFindUnderlyingTypeScanPlan (David Kurman)
• Fix deallocation of invalidated cached statements in a transaction
• Handle invalid sslkey file
• Fix scan float4 into sql.Scanner
• Fix pgtype.Bits not making copy of data from read buffer. This would cause the data to be corrupted by future reads.
5.5.3 (February 3, 2024)
• Fix: prepared statement already exists
• Improve CopyFrom auto-conversion of text-ish values
• Add ltree type support (Florent Viel)
• Make some properties of Batch and QueuedQuery public (Pavlo Golub)
• Add AppendRows function (Edoardo Spadolini)
• Optimize convert UUID [16]byte to string (Kirill Malikov)
• Fix: LargeObject Read and Write of more than ~1GB at a time (Mitar)
5.5.2 (January 13, 2024)
• Allow NamedArgs to start with underscore
• pgproto3: Maximum message body length support (jeremy.spriet)
• Upgrade golang.org/x/crypto to v0.17.0
• Add snake_case support to RowToStructByName (Tikhon Fedulov)
• Fix: update description cache after exec prepare (James Hartig)
• Fix: pipeline checks if it is closed (James Hartig and Ryan Fowler)
• Fix: normalize timeout / context errors during TLS startup (Samuel Stauffer)
• Add OnPgError for easier centralized error handling (James Hartig)Commits • `da6f2c9` Update changelog • `c543134` SQL sanitizer wraps arguments in parentheses • `20344df` Check for overflow on uint16 sizes in pgproto3 • `adbb38f` Do not allow protocol messages larger than ~1GB • `c1b0a01` Fix behavior of CollectRows to return empty slice if Rows are empty • `88dfc22` Fix simple protocol encoding of json.RawMessage • `2e84dcc` *Pipeline.getResults should close pipeline on error • `d149d3f` Fix panic in TryFindUnderlyingTypeScanPlan • `046f497` deallocateInvalidatedCachedStatements now runs in transactions • `8896bd6` Handle invalid sslkey file • Additional commits viewable in compare view Updates
<http://github.com/jackc/pgx/v5|github.com/jackc/pgx/v5>
from 5.5.0 to 5.5.4
Changelog
Sourced from github.com/jackc/pgx/v5's changelog.
5.5.4 (March 4, 2024)
Fix CVE-2024-27304
SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.
Thanks to Paul Gerste for reporting this issue.
• Fix behavior of CollectRows to return empty slice if Rows are empty (Felix)
• Fix simple protocol encoding of json.RawMessage
• Fix *Pipeline.getResults should close pipeline on error
• Fix panic in TryFindUnderlyingTypeScanPlan (David Kurman)
• Fix deallocation of invalidated cached statements in a transaction
• Handle invalid sslkey file
• Fix scan float4 into sql.Scanner
• Fix pgtype.Bits not making copy of data from read buffer. This would cause the data to be corrupted by future reads.
5.5.3 (February 3, 2024)
• Fix: prepared statement already exists
• Improve CopyFrom auto-conversion of text-ish values
• Add ltree type support (Florent Viel)
• Make some properties of Batch and QueuedQuery public (Pavlo Golub)
• Add AppendRows function (Edoardo Spadolini)
• Optimize convert UUID [16]byte to string (Kirill Malikov)
• Fix: LargeObject Read and Write of more than ~1GB at a time (Mitar)
5.5.2 (January 13, 2024)
• Allow NamedArgs to start with underscore
• pgproto3: Maximum message body length support (jeremy.spriet)
• Upgrade golang.org/x/crypto to v0.17.0
• Add snake_case support to RowToStructByName (Tikhon Fedulov)
• Fix: update description cache after exec prepare (James Hartig)
• Fix: pipeline checks if it is closed (James Hartig and Ryan Fowler)
• Fix: normalize timeout / context errors during TLS startup (Samuel Stauffer)
• Add OnPgError for easier centralized error handling (James Hartig)Commits • `da6f2c9` Update changelog • `c543134` SQL sanitizer wraps arguments in parentheses • `20344df` Check for overflow on uint16 sizes in pgproto3 • `adbb38f` Do not allow protocol messages larger than ~1GB • `c1b0a01` Fix behavior of CollectRows to return empty slice if Rows are empty • `88dfc22` Fix simple protocol encoding of json.RawMessage • `2e84dcc` *Pipeline.getResults should close pipeline on error • `d149d3f` Fix panic in TryFindUnderlyingTypeScanPlan • `046f497` deallocateInvalidatedCachedStatements now runs in transaction… jmpsec/osctrl ✅ All checks have passed 30/30 successful checks