Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: docker/compose
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v5.1.0
Choose a base ref
...
head repository: docker/compose
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v5.1.1
Choose a head ref
  • 12 commits
  • 10 files changed
  • 4 contributors

Commits on Mar 4, 2026

  1. fix: only pass ConsoleSize to ExecAttach when TTY is enabled

    The moby/moby client (v0.2.2) validates that ConsoleSize is zero when
    TTY is disabled, returning "console size is only supported when TTY is
    enabled" otherwise. Previously, ConsoleSize was populated unconditionally
    from GetTtySize(), which returns real terminal dimensions when Compose is
    run interactively — causing post_start hooks to fail for services without
    `tty: true`.
    
    Fix by only reading and passing the console size when service.Tty is true.
    
    Signed-off-by: Michael Irwin <michael.irwin@docker.com>
    
    Resolves #13615
    mikesir87 authored and ndeloof committed Mar 4, 2026
    Configuration menu
    Copy the full SHA
    4915b77 View commit details
    Browse the repository at this point in the history

Commits on Mar 6, 2026

  1. build(deps): bump github.com/moby/moby/api from 1.53.0 to 1.54.0

    Bumps [github.com/moby/moby/api](https://github.com/moby/moby) from 1.53.0 to 1.54.0.
    - [Release notes](https://github.com/moby/moby/releases)
    - [Commits](moby/moby@api/v1.53.0...api/v1.54.0)
    
    ---
    updated-dependencies:
    - dependency-name: github.com/moby/moby/api
      dependency-version: 1.54.0
      dependency-type: direct:production
      update-type: version-update:semver-minor
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    dependabot[bot] authored and ndeloof committed Mar 6, 2026
    Configuration menu
    Copy the full SHA
    ffa8576 View commit details
    Browse the repository at this point in the history
  2. update to go1.25.8

    go1.25.8 (released 2026-03-05) includes security fixes to the html/template,
    net/url, and os packages, as well as bug fixes to the go command, the compiler,
    and the os package. See the Go 1.25.8 milestone on our issue tracker for details.
    
    - 1.25.8 https://github.com/golang/go/issues?q=milestone%3AGo1.25.8+label%3ACherryPickApproved
    - diff: golang/go@go1.25.7...go1.25.8
    - 1.26.1 https://github.com/golang/go/issues?q=milestone%3AGo1.26.1+label%3ACherryPickApproved
    - diff: golang/go@go1.26.0...go1.26.1
    
    ---
    
    We have just released Go versions 1.26.1 and 1.25.8, minor point releases.
    
    These releases include 5 security fixes following the security policy:
    
    crypto/x509: incorrect enforcement of email constraints
    
    - When verifying a certificate chain which contains a certificate containing
      multiple email address constraints (composed of the full email address) which
      share common local portions (the portion of the address before the '@'
      character) but different domain portions (the portion of the address after the
      '@' character), these constraints will not be properly applied, and only the
      last constraint will be considered.
    
      This can allow certificates in the chain containing email addresses which are
      either not permitted or excluded by the relevant constraints to be returned by
      calls to Certificate.Verify. Since the name constraint checks happen after chain
      building is complete, this only applies to certificate chains which chain to
      trusted roots (root certificates either in VerifyOptions.Roots or in the system
      root certificate pool), requiring a trusted CA to issue certificates containing
      either not permitted or excluded email addresses.
    
      This issue only affects Go 1.26.
    
      Thanks to Jakub Ciolek for reporting this issue.
    
      This is CVE-2026-27137 and Go issue https://go.dev/issue/77952.
    
    - crypto/x509: panic in name constraint checking for malformed certificates
    
      Certificate verification can panic when a certificate in the chain has an empty
      DNS name and another certificate in the chain has excluded name constraints.
      This can crash programs that are either directly verifying X.509 certificate
      chains, or those that use TLS.
    
      Since the name constraint checks happen after chain building is complete, this
      only applies to certificate chains which chain to trusted roots (root
      certificates either in VerifyOptions.Roots or in the system root certificate
      pool), requiring a trusted CA to issue certificates containing malformed DNS
      names.
    
      This issue only affects Go 1.26.
    
      Thanks to Jakub Ciolek for reporting this issue.
    
      This is CVE-2026-27138 and Go issue https://go.dev/issue/77953.
    
    - html/template: URLs in meta content attribute actions are not escaped
    
      Actions which insert URLs into the content attribute of HTML meta tags are not
      escaped. This can allow XSS if the meta tag also has an http-equiv attribute
      with the value "refresh".
    
      A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be
      used to disable escaping URLs in actions in the meta content attribute which
      follow "url=" by setting htmlmetacontenturlescape=0.
    
      This is CVE-2026-27142 and Go issue https://go.dev/issue/77954.
    
    - net/url: reject IPv6 literal not at start of host
    
      The Go standard library function net/url.Parse insufficiently
      validated the host/authority component and accepted some invalid URLs
      by effectively treating garbage before an IP-literal as ignorable.
      The function should have rejected this as invalid.
    
      To prevent this behavior, net/url.Parse now rejects IPv6 literals
      that do not appear at the start of the host subcomponent of a URL.
    
      Thanks to Masaki Hara (https://github.com/qnighy) of Wantedly.
    
      This is CVE-2026-25679 and Go issue https://go.dev/issue/77578.
    
    - os: FileInfo can escape from a Root
    
      On Unix platforms, when listing the contents of a directory using
      File.ReadDir or File.Readdir the returned FileInfo could reference
      a file outside of the Root in which the File was opened.
    
      The contents of the FileInfo were populated using the lstat system
      call, which takes the path to the file as a parameter. If a component
      of the full path of the file described by the FileInfo is replaced with
      a symbolic link, the target of the lstat can be directed to another
      location on the filesystem.
    
      The impact of this escape is limited to reading metadata provided by
      lstat from arbitrary locations on the filesystem. This could be used
      to probe for the presence or absence of files as well as gleaning
      metadata like file sizes, but does not permit reading or writing files
      outside the root.
    
      The FileInfo is now populated using fstatat.
    
      Thank you to Miloslav Trmač of Red Hat for reporting this issue.
    
      This is CVE-2026-27139 and Go issue https://go.dev/issue/77827.
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah authored and ndeloof committed Mar 6, 2026
    Configuration menu
    Copy the full SHA
    d7ec1ec View commit details
    Browse the repository at this point in the history

Commits on Mar 9, 2026

  1. build(deps): bump golang.org/x/sys from 0.41.0 to 0.42.0

    Bumps [golang.org/x/sys](https://github.com/golang/sys) from 0.41.0 to 0.42.0.
    - [Commits](golang/sys@v0.41.0...v0.42.0)
    
    ---
    updated-dependencies:
    - dependency-name: golang.org/x/sys
      dependency-version: 0.42.0
      dependency-type: direct:production
      update-type: version-update:semver-minor
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    dependabot[bot] authored and ndeloof committed Mar 9, 2026
    Configuration menu
    Copy the full SHA
    79d4fe3 View commit details
    Browse the repository at this point in the history

Commits on Mar 11, 2026

  1. build(deps): bump github.com/containerd/containerd/v2

    Bumps [github.com/containerd/containerd/v2](https://github.com/containerd/containerd) from 2.2.1 to 2.2.2.
    - [Release notes](https://github.com/containerd/containerd/releases)
    - [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md)
    - [Commits](containerd/containerd@v2.2.1...v2.2.2)
    
    ---
    updated-dependencies:
    - dependency-name: github.com/containerd/containerd/v2
      dependency-version: 2.2.2
      dependency-type: direct:production
      update-type: version-update:semver-patch
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    dependabot[bot] authored and glours committed Mar 11, 2026
    Configuration menu
    Copy the full SHA
    eb6afa8 View commit details
    Browse the repository at this point in the history

Commits on Mar 12, 2026

  1. build(deps): bump golang.org/x/sync from 0.19.0 to 0.20.0

    Bumps [golang.org/x/sync](https://github.com/golang/sync) from 0.19.0 to 0.20.0.
    - [Commits](golang/sync@v0.19.0...v0.20.0)
    
    ---
    updated-dependencies:
    - dependency-name: golang.org/x/sync
      dependency-version: 0.20.0
      dependency-type: direct:production
      update-type: version-update:semver-minor
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    dependabot[bot] authored and ndeloof committed Mar 12, 2026
    Configuration menu
    Copy the full SHA
    0ffb171 View commit details
    Browse the repository at this point in the history
  2. build(deps): bump github.com/moby/moby/client from 0.2.2 to 0.3.0

    Bumps [github.com/moby/moby/client](https://github.com/moby/moby) from 0.2.2 to 0.3.0.
    - [Release notes](https://github.com/moby/moby/releases)
    - [Changelog](https://github.com/moby/moby/blob/v0.3.0/CHANGELOG.md)
    - [Commits](moby/moby@v0.2.2...v0.3.0)
    
    ---
    updated-dependencies:
    - dependency-name: github.com/moby/moby/client
      dependency-version: 0.3.0
      dependency-type: direct:production
      update-type: version-update:semver-minor
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    dependabot[bot] authored and ndeloof committed Mar 12, 2026
    Configuration menu
    Copy the full SHA
    e8c2143 View commit details
    Browse the repository at this point in the history

Commits on Mar 18, 2026

  1. Fix deadlock in ttyWriter.Done()

    Resolves race condition between main thread calling Done() and UI thread
    calling printWithDimensions(). The issue was that Done() held the mutex
    while sending to the done channel, but the UI thread needed the same
    mutex to process the done signal.
    
    Fixed by sending the done signal before acquiring the mutex, allowing
    the UI thread to receive the signal and release any held locks.
    
    Fixes #13639
    
    Signed-off-by: maks2134 <maks210306@yandex.by>
    maks2134 authored and ndeloof committed Mar 18, 2026
    Configuration menu
    Copy the full SHA
    25b29d7 View commit details
    Browse the repository at this point in the history
  2. exclude .idea from git commit

    Signed-off-by: maks2134 <maks210306@yandex.by>
    maks2134 authored and ndeloof committed Mar 18, 2026
    Configuration menu
    Copy the full SHA
    b7d1c62 View commit details
    Browse the repository at this point in the history
  3. Fix linting issues in tty_test.go

    - Replace context.Background() with context.WithCancel() in test
    - Fix formatting issues (remove extra empty line)
    
    Signed-off-by: maks2134 <maks210306@yandex.by>
    maks2134 authored and ndeloof committed Mar 18, 2026
    Configuration menu
    Copy the full SHA
    e3fcdb8 View commit details
    Browse the repository at this point in the history
  4. Fix forbidigo linting error

    - Replace context.Background() with t.Context() in TestDoneDeadlockFix
    - Ensures .idea files are not included in commit
    
    Signed-off-by: maks2134 <maks210306@yandex.by>
    maks2134 authored and ndeloof committed Mar 18, 2026
    Configuration menu
    Copy the full SHA
    c7e8896 View commit details
    Browse the repository at this point in the history
  5. Update docker/github-builder to v1.4.0

    Fixes template validation error in CI by updating to latest stable version
    of docker/github-builder workflow. This resolves the JToken parsing error
    in bake.yml@v1 that was causing bin-image-test to fail.
    
    Signed-off-by: maks2134 <maks210306@yandex.by>
    maks2134 authored and ndeloof committed Mar 18, 2026
    Configuration menu
    Copy the full SHA
    b043368 View commit details
    Browse the repository at this point in the history
Loading