Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: bump go version to 1.20 #35

Merged
merged 2 commits into from
Apr 9, 2023

Conversation

cyril-corbon
Copy link
Collaborator

@cyril-corbon cyril-corbon commented Apr 8, 2023

Description

  • bump go version to 1.20
  • bump go mod to fix some vulnerabilities.
manager (gobinary)

Total: 3 (UNKNOWN: 1, LOW: 0, MEDIUM: 1, HIGH: 1, CRITICAL: 0)

┌──────────────────┬─────────────────────┬──────────┬──────────────────────────────────────┬───────────────┬─────────────────────────────────────────────────────────────┐
│     Library      │    Vulnerability    │ Severity │          Installed Version           │ Fixed Version │                            Title                            │
├──────────────────┼─────────────────────┼──────────┼──────────────────────────────────────┼───────────────┼─────────────────────────────────────────────────────────────┤
│ golang.org/x/net │ CVE-2022-41723      │ HIGH     │ v0.3.1-0.20221206200815-1e63c2f08a10 │ 0.7.0         │ golang.org/x/net/http2: avoid quadratic complexity in HPACK │
│                  │                     │          │                                      │               │ decoding                                                    │
│                  │                     │          │                                      │               │ https://avd.aquasec.com/nvd/cve-2022-41723                  │
│                  ├─────────────────────┼──────────┤                                      ├───────────────┼─────────────────────────────────────────────────────────────┤
│                  │ CVE-2022-41717      │ MEDIUM   │                                      │ 0.4.0         │ golang: net/http: An attacker can cause excessive memory    │
│                  │                     │          │                                      │               │ growth in a Go...                                           │
│                  │                     │          │                                      │               │ https://avd.aquasec.com/nvd/cve-2022-41717                  │
│                  ├─────────────────────┼──────────┤                                      ├───────────────┼─────────────────────────────────────────────────────────────┤
│                  │ GHSA-vvpx-j8f3-3w6h │ UNKNOWN  │                                      │ 0.7.0         │ Uncontrolled Resource Consumption                           │
│                  │                     │          │                                      │               │ https://github.com/advisories/GHSA-vvpx-j8f3-3w6h           │
└──────────────────┴─────────────────────┴──────────┴──────────────────────────────────────┴───────────────┴─────────────────────────────────────────────────────────────┘

This PR has:

  • been tested on a real K8S cluster to ensure creation of a brand new Druid cluster works.
  • been tested for backward compatibility on a real K*S cluster by applying the changes introduced here on an existing Druid cluster. If there are any backward incompatible changes then they have been noted in the PR description.
  • added comments explaining the "why" and the intent of the code wherever would not be obvious for an unfamiliar reader.
  • added documentation for new or modified features or behaviors.

Key changed/added files in this PR
  • Dockerfile
  • go.mod

Signed-off-by: Cyril Corbon <cyril.corbon@dailymotion.com>
@cyril-corbon cyril-corbon changed the title chore: bump golang to 1.20 chore: bump go version to 1.20 Apr 8, 2023
Signed-off-by: Cyril Corbon <cyril.corbon@dailymotion.com>
@AdheipSingh
Copy link
Contributor

@cyril-corbon thanks, which tool did we use to get the vulnerability ?

@AdheipSingh AdheipSingh merged commit d85d3bb into datainfrahq:master Apr 9, 2023
@cyril-corbon
Copy link
Collaborator Author

@cyril-corbon thanks, which tool did we use to get the vulnerability ?

I used trivy
https://github.com/aquasecurity/trivy

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants