-
Notifications
You must be signed in to change notification settings - Fork 284
🐛 Address CVE-2022-21698 #1182
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🐛 Address CVE-2022-21698 #1182
Conversation
✅ Deploy Preview for kubernetes-sigs-cluster-api-openstack ready!
To edit notification comments on pull requests, go to your Netlify site settings. |
|
Hi @pierreprinetti. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/ok-to-test thanks @pierreprinetti 🙂 |
|
/retest-required |
Upgrade the Prometheus client to v1.11.1. This commit is the result of running: ``` go get github.com/prometheus/[email protected] \ && go mod tidy ``` See GHSA-cg3q-j54f-5p7p
440277b to
0ceab04
Compare
|
@tobiasgiese Do you perhaps know why don't the unit tests love me? |
Unfortunately, I don't have time to debug further. I have to leave early and I'm out-of-office (vacationing) until April 3rd 🌴 |
|
The same linting errors have happened in all other CI runs today, and are probably linked to the Go 1.18 upgrade for the test infrastructure. See this discussion in slack for details and #1184 for a potential fix. |
Enjoy! :)
Kk thanks for the heads up @apricote ! |
|
/lgtm the change make sense, re-run the test after that PR merged then we are good to go |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jichenjc, pierreprinetti The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Let's see if the tests run against a rebased version of the PR :) |
Upgrade the Prometheus client to v1.11.1.
This commit is the result of running:
See GHSA-cg3q-j54f-5p7p
What this PR does / why we need it:
Upgrades
github.com/prometheus/client_golangto v1.11.1, where the vulnerability has been fixed.Which issue(s) this PR fixes:
Fixes #1181
Special notes for your reviewer:
One handy way to check that the version of
client_goused for compiling contains the security patch, is to rungo mod vendorand check that theInstrumentRoundTripperCountermethod contains a variadicoptionsargument.TODOs: