-
Notifications
You must be signed in to change notification settings - Fork 5.8k
Comparing changes
Open a pull request
base repository: docker/compose
base: v5.1.0
head repository: docker/compose
compare: v5.1.1
- 12 commits
- 10 files changed
- 4 contributors
Commits on Mar 4, 2026
-
fix: only pass ConsoleSize to ExecAttach when TTY is enabled
The moby/moby client (v0.2.2) validates that ConsoleSize is zero when TTY is disabled, returning "console size is only supported when TTY is enabled" otherwise. Previously, ConsoleSize was populated unconditionally from GetTtySize(), which returns real terminal dimensions when Compose is run interactively — causing post_start hooks to fail for services without `tty: true`. Fix by only reading and passing the console size when service.Tty is true. Signed-off-by: Michael Irwin <michael.irwin@docker.com> Resolves #13615
Configuration menu - View commit details
-
Copy full SHA for 4915b77 - Browse repository at this point
Copy the full SHA 4915b77View commit details
Commits on Mar 6, 2026
-
build(deps): bump github.com/moby/moby/api from 1.53.0 to 1.54.0
Bumps [github.com/moby/moby/api](https://github.com/moby/moby) from 1.53.0 to 1.54.0. - [Release notes](https://github.com/moby/moby/releases) - [Commits](moby/moby@api/v1.53.0...api/v1.54.0) --- updated-dependencies: - dependency-name: github.com/moby/moby/api dependency-version: 1.54.0 dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
Configuration menu - View commit details
-
Copy full SHA for ffa8576 - Browse repository at this point
Copy the full SHA ffa8576View commit details -
go1.25.8 (released 2026-03-05) includes security fixes to the html/template, net/url, and os packages, as well as bug fixes to the go command, the compiler, and the os package. See the Go 1.25.8 milestone on our issue tracker for details. - 1.25.8 https://github.com/golang/go/issues?q=milestone%3AGo1.25.8+label%3ACherryPickApproved - diff: golang/go@go1.25.7...go1.25.8 - 1.26.1 https://github.com/golang/go/issues?q=milestone%3AGo1.26.1+label%3ACherryPickApproved - diff: golang/go@go1.26.0...go1.26.1 --- We have just released Go versions 1.26.1 and 1.25.8, minor point releases. These releases include 5 security fixes following the security policy: crypto/x509: incorrect enforcement of email constraints - When verifying a certificate chain which contains a certificate containing multiple email address constraints (composed of the full email address) which share common local portions (the portion of the address before the '@' character) but different domain portions (the portion of the address after the '@' character), these constraints will not be properly applied, and only the last constraint will be considered. This can allow certificates in the chain containing email addresses which are either not permitted or excluded by the relevant constraints to be returned by calls to Certificate.Verify. Since the name constraint checks happen after chain building is complete, this only applies to certificate chains which chain to trusted roots (root certificates either in VerifyOptions.Roots or in the system root certificate pool), requiring a trusted CA to issue certificates containing either not permitted or excluded email addresses. This issue only affects Go 1.26. Thanks to Jakub Ciolek for reporting this issue. This is CVE-2026-27137 and Go issue https://go.dev/issue/77952. - crypto/x509: panic in name constraint checking for malformed certificates Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS. Since the name constraint checks happen after chain building is complete, this only applies to certificate chains which chain to trusted roots (root certificates either in VerifyOptions.Roots or in the system root certificate pool), requiring a trusted CA to issue certificates containing malformed DNS names. This issue only affects Go 1.26. Thanks to Jakub Ciolek for reporting this issue. This is CVE-2026-27138 and Go issue https://go.dev/issue/77953. - html/template: URLs in meta content attribute actions are not escaped Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0. This is CVE-2026-27142 and Go issue https://go.dev/issue/77954. - net/url: reject IPv6 literal not at start of host The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid. To prevent this behavior, net/url.Parse now rejects IPv6 literals that do not appear at the start of the host subcomponent of a URL. Thanks to Masaki Hara (https://github.com/qnighy) of Wantedly. This is CVE-2026-25679 and Go issue https://go.dev/issue/77578. - os: FileInfo can escape from a Root On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The contents of the FileInfo were populated using the lstat system call, which takes the path to the file as a parameter. If a component of the full path of the file described by the FileInfo is replaced with a symbolic link, the target of the lstat can be directed to another location on the filesystem. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem. This could be used to probe for the presence or absence of files as well as gleaning metadata like file sizes, but does not permit reading or writing files outside the root. The FileInfo is now populated using fstatat. Thank you to Miloslav Trmač of Red Hat for reporting this issue. This is CVE-2026-27139 and Go issue https://go.dev/issue/77827. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for d7ec1ec - Browse repository at this point
Copy the full SHA d7ec1ecView commit details
Commits on Mar 9, 2026
-
build(deps): bump golang.org/x/sys from 0.41.0 to 0.42.0
Bumps [golang.org/x/sys](https://github.com/golang/sys) from 0.41.0 to 0.42.0. - [Commits](golang/sys@v0.41.0...v0.42.0) --- updated-dependencies: - dependency-name: golang.org/x/sys dependency-version: 0.42.0 dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
Configuration menu - View commit details
-
Copy full SHA for 79d4fe3 - Browse repository at this point
Copy the full SHA 79d4fe3View commit details
Commits on Mar 11, 2026
-
build(deps): bump github.com/containerd/containerd/v2
Bumps [github.com/containerd/containerd/v2](https://github.com/containerd/containerd) from 2.2.1 to 2.2.2. - [Release notes](https://github.com/containerd/containerd/releases) - [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md) - [Commits](containerd/containerd@v2.2.1...v2.2.2) --- updated-dependencies: - dependency-name: github.com/containerd/containerd/v2 dependency-version: 2.2.2 dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
Configuration menu - View commit details
-
Copy full SHA for eb6afa8 - Browse repository at this point
Copy the full SHA eb6afa8View commit details
Commits on Mar 12, 2026
-
build(deps): bump golang.org/x/sync from 0.19.0 to 0.20.0
Bumps [golang.org/x/sync](https://github.com/golang/sync) from 0.19.0 to 0.20.0. - [Commits](golang/sync@v0.19.0...v0.20.0) --- updated-dependencies: - dependency-name: golang.org/x/sync dependency-version: 0.20.0 dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
Configuration menu - View commit details
-
Copy full SHA for 0ffb171 - Browse repository at this point
Copy the full SHA 0ffb171View commit details -
build(deps): bump github.com/moby/moby/client from 0.2.2 to 0.3.0
Bumps [github.com/moby/moby/client](https://github.com/moby/moby) from 0.2.2 to 0.3.0. - [Release notes](https://github.com/moby/moby/releases) - [Changelog](https://github.com/moby/moby/blob/v0.3.0/CHANGELOG.md) - [Commits](moby/moby@v0.2.2...v0.3.0) --- updated-dependencies: - dependency-name: github.com/moby/moby/client dependency-version: 0.3.0 dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
Configuration menu - View commit details
-
Copy full SHA for e8c2143 - Browse repository at this point
Copy the full SHA e8c2143View commit details
Commits on Mar 18, 2026
-
Fix deadlock in ttyWriter.Done()
Resolves race condition between main thread calling Done() and UI thread calling printWithDimensions(). The issue was that Done() held the mutex while sending to the done channel, but the UI thread needed the same mutex to process the done signal. Fixed by sending the done signal before acquiring the mutex, allowing the UI thread to receive the signal and release any held locks. Fixes #13639 Signed-off-by: maks2134 <maks210306@yandex.by>
Configuration menu - View commit details
-
Copy full SHA for 25b29d7 - Browse repository at this point
Copy the full SHA 25b29d7View commit details -
Signed-off-by: maks2134 <maks210306@yandex.by>
Configuration menu - View commit details
-
Copy full SHA for b7d1c62 - Browse repository at this point
Copy the full SHA b7d1c62View commit details -
Fix linting issues in tty_test.go
- Replace context.Background() with context.WithCancel() in test - Fix formatting issues (remove extra empty line) Signed-off-by: maks2134 <maks210306@yandex.by>
Configuration menu - View commit details
-
Copy full SHA for e3fcdb8 - Browse repository at this point
Copy the full SHA e3fcdb8View commit details -
- Replace context.Background() with t.Context() in TestDoneDeadlockFix - Ensures .idea files are not included in commit Signed-off-by: maks2134 <maks210306@yandex.by>
Configuration menu - View commit details
-
Copy full SHA for c7e8896 - Browse repository at this point
Copy the full SHA c7e8896View commit details -
Update docker/github-builder to v1.4.0
Fixes template validation error in CI by updating to latest stable version of docker/github-builder workflow. This resolves the JToken parsing error in bake.yml@v1 that was causing bin-image-test to fail. Signed-off-by: maks2134 <maks210306@yandex.by>
Configuration menu - View commit details
-
Copy full SHA for b043368 - Browse repository at this point
Copy the full SHA b043368View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v5.1.0...v5.1.1