Skip to content

Release 0.6.4#1488

Closed
adombeck wants to merge 16 commits intostablefrom
release-0.6.4
Closed

Release 0.6.4#1488
adombeck wants to merge 16 commits intostablefrom
release-0.6.4

Conversation

@adombeck
Copy link
Copy Markdown
Contributor

  * Update Go dependencies:
    - toolchain go1.25.9
    - github.com/mattn/go-sqlite3 v1.14.42
    - golang.org/x/sys v0.43.0
    - golang.org/x/term v0.42.0

nooreldeenmansour and others added 16 commits April 23, 2026 13:49
`UpdateUser` unconditionally reset the user record's primary GID to the user's UID on every login, silently reverting GID changes made via `authctl group set-gid`. The group record itself kept the correct GID, causing `getent passwd` and `getent group` to diverge.
We've seen cases in e2e-tests where device auth took longer than 2
minutes to complete. When it finally succeeds, the login fails because
the subsequent SetData(authenticationBrokerIDKey, ...) call fails:

  failed to call com.ubuntu.authd.pam.SetData: dbus: connection closed by user
  LOGIN: exiting with error System error: dbus: connection closed by user

We don't to enforce a timeout for the login procedure here. If there
should be a timeout, it should be the caller who enforces it - similar
to the behavior of `login`which is configured via LOGIN_TIMEOUT in
/etc/login.defs.
Currently, Ctrl-D has no effect when authd-pam is used.

Usually, when typing Ctrl-D in a terminal, the input buffer to the
reading process is flushed, and, if the buffer is empty, EOF is sent.
With sudo the expected behavior is that it doesn't ask for a password
again if an empty password was submitted via Ctrl-D.

This commit implements that behavior.
On 32-bit architectures, math.MaxInt32 + 1 is larger than the int type,
so it causes the test to fail with

  cmd/authctl/group/set-gid_test.go:52:65: cannot use math.MaxInt32 + 1 (untyped int constant 2147483648) as int value in argument to strconv.Itoa (overflows)

The fix is to use an int64 instead.

refs: https://bugs.launchpad.net/ubuntu/+source/authd/+bug/2148363
Bumps the minor-updates group with 1 update: [github.com/mattn/go-sqlite3](https://github.com/mattn/go-sqlite3).


Updates `github.com/mattn/go-sqlite3` from 1.14.38 to 1.14.41
- [Release notes](https://github.com/mattn/go-sqlite3/releases)
- [Commits](mattn/go-sqlite3@v1.14.38...v1.14.41)

---
updated-dependencies:
- dependency-name: github.com/mattn/go-sqlite3
  dependency-version: 1.14.41
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: minor-updates
...

Signed-off-by: dependabot[bot] <support@github.com>
govulncheck reports the following vulnerabilities in go1.25.8:

Vulnerability #1: GO-2026-4947
    Unexpected work during chain building in crypto/x509
  More info: https://pkg.go.dev/vuln/GO-2026-4947
  Standard library
    Found in: crypto/x509@go1.25.8
    Fixed in: crypto/x509@go1.25.9
    Example traces found:
Error:       #1: cmd/authd-oidc/daemon/daemon_test.go:211:18: daemon_test.TestAppCanSigHupWithoutExecute calls io.Copy, which eventually calls x509.Certificate.Verify

Vulnerability #2: GO-2026-4946
    Inefficient policy validation in crypto/x509
  More info: https://pkg.go.dev/vuln/GO-2026-4946
  Standard library
    Found in: crypto/x509@go1.25.8
    Fixed in: crypto/x509@go1.25.9
    Example traces found:
Error:       #1: cmd/authd-oidc/daemon/daemon_test.go:211:18: daemon_test.TestAppCanSigHupWithoutExecute calls io.Copy, which eventually calls x509.Certificate.Verify

Vulnerability #3: GO-2026-4870
    Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection
    retention and DoS in crypto/tls
  More info: https://pkg.go.dev/vuln/GO-2026-4870
  Standard library
    Found in: crypto/tls@go1.25.8
    Fixed in: crypto/tls@go1.25.9
    Example traces found:
Error:       #1: internal/testutils/provider.go:104:14: testutils.StartMockProviderServer calls httptest.Server.Start, which eventually calls tls.Conn.HandshakeContext
Error:       #2: cmd/authd-oidc/daemon/daemon_test.go:211:18: daemon_test.TestAppCanSigHupWithoutExecute calls io.Copy, which eventually calls tls.Conn.Read
Error:       #3: cmd/authd-oidc/daemon/daemon_test.go:399:14: daemon_test.TestMain calls fmt.Fprintf, which calls tls.Conn.Write
Error:       #4: internal/broker/broker.go:483:51: broker.Broker.generateUILayout calls oauth2.Config.DeviceAuth, which eventually calls tls.Dialer.DialContext

Vulnerability #4: GO-2026-4865
    JsBraceDepth Context Tracking Bugs (XSS) in html/template
  More info: https://pkg.go.dev/vuln/GO-2026-4865
  Standard library
    Found in: html/template@go1.25.8
    Fixed in: html/template@go1.25.9
    Example traces found:
Error:       #1: internal/broker/broker.go:138:44: broker.New calls template.Error.Error
Error:       #2: internal/broker/config.go:306:21: broker.userConfig.registerOwner calls template.Template.Execute
Error:       #3: internal/broker/config.go:295:46: broker.userConfig.registerOwner calls template.Template.ParseFS
Error:       #4: internal/providers/msentraid/msentraid.go:417:21: msentraid.Provider.VerifyUsername calls fmt.Sprintf, which eventually calls template.context.String
Bumps the minor-updates group with 2 updates: [github.com/mattn/go-sqlite3](https://github.com/mattn/go-sqlite3) and [golang.org/x/sys](https://github.com/golang/sys).


Updates `github.com/mattn/go-sqlite3` from 1.14.41 to 1.14.42
- [Release notes](https://github.com/mattn/go-sqlite3/releases)
- [Commits](mattn/go-sqlite3@v1.14.41...v1.14.42)

Updates `golang.org/x/sys` from 0.42.0 to 0.43.0
- [Commits](golang/sys@v0.42.0...v0.43.0)

---
updated-dependencies:
- dependency-name: github.com/mattn/go-sqlite3
  dependency-version: 1.14.42
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: minor-updates
- dependency-name: golang.org/x/sys
  dependency-version: 0.43.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor-updates
...

Signed-off-by: dependabot[bot] <support@github.com>
Bumps the minor-updates group with 1 update: [golang.org/x/term](https://github.com/golang/term).


Updates `golang.org/x/term` from 0.41.0 to 0.42.0
- [Commits](golang/term@v0.41.0...v0.42.0)

---
updated-dependencies:
- dependency-name: golang.org/x/term
  dependency-version: 0.42.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: minor-updates
...

Signed-off-by: dependabot[bot] <support@github.com>
@codecov
Copy link
Copy Markdown

codecov Bot commented Apr 23, 2026

Codecov Report

❌ Patch coverage is 94.44444% with 1 line in your changes missing coverage. Please review.
✅ Project coverage is 85.63%. Comparing base (ca1a1cb) to head (cc4ac73).
⚠️ Report is 1 commits behind head on stable.

Files with missing lines Patch % Lines
authd-oidc-brokers/internal/broker/broker.go 85.71% 1 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##           stable    #1488      +/-   ##
==========================================
+ Coverage   85.56%   85.63%   +0.07%     
==========================================
  Files         119      119              
  Lines        7674     7681       +7     
  Branches      111      111              
==========================================
+ Hits         6566     6578      +12     
+ Misses       1052     1047       -5     
  Partials       56       56              

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@adombeck adombeck closed this Apr 23, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants