Skip to content

Releases: mccutchen/go-httpbin

v2.19.0

01 Nov 10:06
cab8b3d

Choose a tag to compare

Warning

Potential Breaking Change

Pre-built docker images provided on Docker Hub and GitHub Container Registry now run as non-root by default, which may necessitate additional configuration for deployments that use both privileged ports and host networking. See Configuring non-root docker images in the README and #224 for more details.

What's Changed

New Contributors

Full Changelog: v2.18.3...v2.19.0

v2.18.3

14 Jun 02:55
d2a914c

Choose a tag to compare

What's Changed

Full Changelog: v2.18.2...v2.18.3

v2.18.2

11 Jun 03:47
3110dab

Choose a tag to compare

What's Changed

Full Changelog: v2.18.1...v2.18.2

v2.18.1

04 Apr 11:26
1379030

Choose a tag to compare

What's Changed

  • fix: /response-headers does not need escaping by default by @mccutchen in #208

Full Changelog: v2.18.0...v2.18.1

v2.18.0

20 Mar 21:55
0decfd1

Choose a tag to compare

🔐 Security fix 🔐

This release fixes a reflected XSS vulnerability (GHSA-528q-4pgm-wvg2) in the following endpoints:

  • /base64/{payload} and /base64/decode/{payload}
  • /response-headers

When a request to any of those endpoints included a content-type query parameter set to a dangerous value (e.g. ?content-type=text/html).

Warning

Potential Breaking Change

The affected endpoints now HTML-escape their response bodies only if the incoming request explicitly overrides the known-safe content types. The default behavior is unchanged.

If a go-httpbin deployment depends on the previous, vulnerable behavior and reflected XSS is either not a concern or there are other mitigations in place, the previous behavior may be re-enabled via the -unsafe-allow-dangerous-responses/UNSAFE_ALLOW_DANGEROUS_RESPONSES=1 configuration options.

Important

The publicly available go-httpbin instance at https://httpbingo.org has been updated and is no longer vulnerable. All users are encouraged to upgrade to v2.18.0.

🙌 Thanks 🙌

Many thanks to @AyushXtha for responsibly reporting the vulnerability (GHSA-528q-4pgm-wvg2) according to go-httpbin's security policy and collaborating on the fix!

What's Changed

Full Changelog: v2.17.1...v2.18.0

v2.17.1

08 Mar 20:10
ae8a6ed

Choose a tag to compare

What's Changed

Full Changelog: v2.17.0...v2.17.1

v2.17.0

08 Mar 19:25
37e9998

Choose a tag to compare

What's Changed

  • feat: allow configuration of underlying http.Server by @mccutchen in #199
  • ci: push to ghcr.io in addition to docker hub by @mccutchen in #200

Full Changelog: v2.16.1...v2.17.0

v2.16.1

04 Mar 11:22
3cdcb35

Choose a tag to compare

What's Changed

  • feat: allow specifying content-type for /base64 responses by @mccutchen in #198

Full Changelog: v2.16.0...v2.16.1

v2.16.0

27 Jan 03:20
ce8d747

Choose a tag to compare

What's Changed

  • feat: add /env endpoint to allow exposing operator-controlled info from the server by @mloskot in #189

New Contributors

Full Changelog: v2.15.0...v2.16.0

v2.15.0

17 Sep 04:51
34a21a3

Choose a tag to compare

Summary

  • ⚠️ Minimum Go version is now 1.22 ⚠️ due to use of new stdlib router enhancements
  • New /trailers endpoint added
  • Server-Timings headers/trailers added to endpoints with client-controlled response times

What's Changed

Full Changelog: v2.14.1...v2.15.0