-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GitHub-release tag (v1.2) vs. Go module version of github.com/elazarl/goproxy (like v0.0.0-202412xxx) #599
Comments
The cause of the specified CVE was an old Now in the master branch we've updated it, so this problem is not present neither in v1.2 nor in the pseudoversion. The v1.2 tag is the first stable release after a while and contains all the updates of the last years in an official release. The pseudoversion contains additional fixes released in the last week (we also added a linter, btw). What do you think? From your experience the versioning should be handled differently? Should I add this explaination in the readme? |
And for the question 3., yes, the latest available version is the v0.0-......., it represents the latest commit in the master branch. |
Added a section to the readme to explain this, by the way |
Hi @ErikPelli - Thanks a lot for your useful PR and the detailed information - That helped a lot (you was faster than me with closing this issue). Today, I can the command again:
Now, it's start using the offical (GitHub)-release-tags. Also the https://pkg.go.dev/github.com/elazarl/goproxy?tab=versions started using the offical release-versions: So, goproxy now using real release-tags and a release-changelog ❤️ - Great! |
Hi @rgoltz, since your issue I started to publish new versions for each commit, to comply with the semantic version standard. What do you think? |
In the last days I had some time to dedicate to this project, because I'm not finding clients to collaborate with as a freelancer... 🫠 By the way, if you are using this library in one of your projects or in your company, you can submit us a case study, as explained in the readme: it's absolutely not mandatory but it's always good to know how people are using our public work! |
Sounds great (using the semantic versions + having a 2nd update of README)! - Once everything is done, I think we can also close this old (open) issue here: #394 |
Yeah, we're still evaluating it (as you see, our release section is now full of releases). |
Summary of the Issue
I'd like to understand the correlation between the release-tag (e.g.
v1.2
) here at GitHub and the go module version ofgithub.com/elazarl/goproxy
(e.g.v0.0.0-20241224112848-b717bebf1f4e
). Some vulnerability-databases/vulnerability-vendors now expecting a version likev1.2.0
while checking go.mod/go.sum files.Additional Information/Context
Some vulnerability-databases reporting (most likely falsely) the version
v0.0.0-20240726154733-8b0c20506380
as affected by the fixed/old vulnerability CVE-2023-37788 / GHSA-4r8x-2p26-976p. Following the GitHub Advisory Database (Link), let's fixed in versionv0.0.0-20230731152917-f99041a5c027
(and subsequent pseudoversions) - Screenshot from GitHub Advisory Database:Now, some SBOM based vulnerability-databases checking for a version v1.2.0 (which the scanner expect to solve the CVE).
Screenshot from SBOM report (here from AWS) . They now expact a version called
v1.2.0
:Reproduction Steps
If I'm running the command
go get github.com/elazarl/goproxy@latest
, I'm getting:So, latest is (as expected while checking pkg.go.dev/github.com/elazarl/goproxy) version
v0.0.0-20241224112848-b717bebf1f4e
:Questions
Thanks a lot :-)
The text was updated successfully, but these errors were encountered: