-
Notifications
You must be signed in to change notification settings - Fork 238
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update Go to 1.23.4, /x/net to v0.33.0, and /x/crypto to v0.31.0 #3509
Conversation
Signed-off-by: Marko Mudrinić <mudrinic.mare@gmail.com>
Skipping CI for Draft Pull Request. |
Signed-off-by: Marko Mudrinić <mudrinic.mare@gmail.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
LGTM label has been added. Git tree hash: 975fef6b00c7b6c3045b45dc51606ca3a502ec14
|
Signed-off-by: Marko Mudrinić <mudrinic.mare@gmail.com>
/test pull-kubeone-e2e-aws-default-install-containerd-external-v1.29 |
/cherrypick release/v1.9 |
@xmudrii: once the present PR merges, I will cherry-pick it on top of release/v1.9 in a new PR and assign it to you. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/test pull-kubeone-e2e-aws-default-install-containerd-external-v1.29 |
/approve |
LGTM label has been added. Git tree hash: f550d360729fcad199a33776e0c9b4f801eb47f5
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: kron4eg The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
@xmudrii: new pull request created: #3513 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What this PR does / why we need it:
golang.org/x/crypto
to v0.31.0 to pick up CVE fixesgolang.org/x/net
to v0.33.0 to pick up CVE fixesI disabled
gosec
G115 linter error because it has a lot of false positives that are not relevant to us, but that take significant amount of code to fix (and potentially an external dependency). See securego/gosec#1212 for more detailsWhat type of PR is this?
/kind chore
Does this PR introduce a user-facing change? Then add your Release Note here:
Documentation:
/assign @kron4eg