-
Notifications
You must be signed in to change notification settings - Fork 1.2k
Bump prometheus/client_golang to v1.11.1 #12653
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump prometheus/client_golang to v1.11.1 #12653
Conversation
Welcome @qu1queee! It looks like this is your first PR to knative/serving 🎉 |
Hi @qu1queee. Thanks for your PR. I'm waiting for a knative member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hey few things - after bumping the dependency in Secondly you'll want to sign the CLA to contribute - https://cla.developers.google.com/clas Let me know if you're blocked on those things and I can bump this dependency for you. |
It looks like the string (I was misled by VSCode in my initial search) |
In order to address CVE CVE-2022-21698 See more information in GHSA-cg3q-j54f-5p7p
9b133de
to
089ee52
Compare
/ok-to-test |
Thanks for the hint @dprotaso . As a side note, the update-deps.sh uses a /assign @dprotaso |
@evankanderson thanks for the information. My rational on this PR was that for tooling such as Whitesource(OS security tool), a vulnerability will be raised when using this project as a dependency, due to the indirect one to the |
Codecov Report
@@ Coverage Diff @@
## main #12653 +/- ##
==========================================
- Coverage 87.52% 87.47% -0.05%
==========================================
Files 195 195
Lines 9712 9712
==========================================
- Hits 8500 8496 -4
- Misses 929 931 +2
- Partials 283 285 +2
Continue to review full report at Codecov.
|
I think it's fine to propose the bump. It was flagged as a Knative vulnerability, and I wanted to be clear that it was a false-positive. |
/retest |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dprotaso, qu1queee The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
thanks @qu1queee re: the warning - yeah I believe it's a known issue |
Made an issue about favouring |
known flake |
In order to address CVE-2022-21698 , bump the prometheus/client_golang to v1.11.1.
See more information in GHSA-cg3q-j54f-5p7p
Proposed Changes
Release Note