Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🤖 Bump github.com/pocketbase/pocketbase from 0.22.4 to 0.22.5 in /kubelab-backend #72

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Mar 22, 2024

Bumps github.com/pocketbase/pocketbase from 0.22.4 to 0.22.5.

Release notes

Sourced from github.com/pocketbase/pocketbase's releases.

v0.22.5 Release

To update the prebuilt executable you can run ./pocketbase update.

  • Minor test helpers fixes (#4600):

    • Call the OnTerminate hook on TestApp.Cleanup().
    • Automatically run the DB migrations on initializing the test app with tests.NewTestApp().
  • Added more elaborate warning message when restoring a backup explaining how the operation works.

  • Skip irregular files (symbolic links, sockets, etc.) when restoring a backup zip from the Admin UI or calling archive.Extract(src, dst) because they come with too many edge cases and ambiguities.

    This was initially reported as security issue (thanks Harvey Spec) but in the PocketBase context it is not something that can be exploited without an admin intervention and since the general expectations are that the PocketBase admins can do anything and they are the one who manage their server, this should be treated with the same diligence when using scp/rsync/rclone/etc. with untrusted file sources.

    It is not possible (or at least I'm not aware how to do that easily) to perform virus/malicious content scanning on the uploaded backup archive files and some caution is always required when using the Admin UI or running shell commands, hence the backup-restore warning text.

    Or in other words, if someone sends you a file and tells you to upload it to your server (either as backup zip or manually via scp) obviously you shouldn't do that unless you really trust them.

    PocketBase is like any other regular application that you run on your server and there is no builtin "sandbox" for what the PocketBase process can execute. This is left to the developers to restrict on application or OS level depending on their needs. If you are self-hosting PocketBase you usually don't have to do that, but if you are offering PocketBase as a service and allow strangers to run their own PocketBase instances on your server then you'll need to implement the isolation mechanisms on your own.

Changelog

Sourced from github.com/pocketbase/pocketbase's changelog.

v0.22.5

  • Minor test helpers fixes (#4600):

    • Call the OnTerminate hook on TestApp.Cleanup().
    • Automatically run the DB migrations on initializing the test app with tests.NewTestApp().
  • Added more elaborate warning message when restoring a backup explaining how the operation works.

  • Skip irregular files (symbolic links, sockets, etc.) when restoring a backup zip from the Admin UI or calling archive.Extract(src, dst) because they come with too many edge cases and ambiguities.

    This was initially reported as security issue (thanks Harvey Spec) but in the PocketBase context it is not something that can be exploited without an admin intervention and since the general expectations are that the PocketBase admins can do anything and they are the one who manage their server, this should be treated with the same diligence when using scp/rsync/rclone/etc. with untrusted file sources.

    It is not possible (or at least I'm not aware how to do that easily) to perform virus/malicious content scanning on the uploaded backup archive files and some caution is always required when using the Admin UI or running shell commands, hence the backup-restore warning text.

    Or in other words, if someone sends you a file and tell you to upload it to your server (either as backup zip or manually via scp) obviously you shouldn't do that unless you really trust them.

    PocketBase is like any other regular application that you run on your server and there is no builtin "sandbox" for what the PocketBase process can execute. This is left to the developers to restrict on application or OS level depending on their needs. If you are self-hosting PocketBase you usually don't have to do that, but if you are offering PocketBase as a service and allow strangers to run their own PocketBase instances on your server then you'll need to implement the isolation mechanisms on your own.

Commits
  • b596bbd updated go deps
  • 0492717 updated backup restore message
  • 98ba003 added done channel for the cron ticker
  • 309c4fe call TestApp.ResetBootstrap as finalizer of the test OnTerminate hook
  • 03cec9a #4600 autorun migrations for the test app and call the OnTerminate hook on ...
  • 48153d4 updated restore backup warning message and changed archive.Extract to ignore ...
  • be40803 updated security.Encrypt and security.Decrypt docs
  • a5eff39 #4566 fixed JSVM routerUse() example
  • See full diff in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/pocketbase/pocketbase](https://github.com/pocketbase/pocketbase) from 0.22.4 to 0.22.5.
- [Release notes](https://github.com/pocketbase/pocketbase/releases)
- [Changelog](https://github.com/pocketbase/pocketbase/blob/master/CHANGELOG.md)
- [Commits](pocketbase/pocketbase@v0.22.4...v0.22.5)

---
updated-dependencies:
- dependency-name: github.com/pocketbase/pocketbase
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot requested a review from janlauber as a code owner March 22, 2024 21:34
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Mar 22, 2024
@dependabot dependabot bot requested a review from svengerber as a code owner March 22, 2024 21:34
@dependabot dependabot bot added the go Pull requests that update Go code label Mar 22, 2024
Copy link
Contributor Author

dependabot bot commented on behalf of github Mar 24, 2024

Superseded by #79.

@dependabot dependabot bot closed this Mar 24, 2024
@dependabot dependabot bot deleted the dependabot/go_modules/kubelab-backend/github.com/pocketbase/pocketbase-0.22.5 branch March 24, 2024 13:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants