Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade debian from latest to 11.5 #1900

Merged
merged 2 commits into from
Dec 14, 2022

Conversation

amitkanfer
Copy link
Contributor

This PR was automatically created by Snyk using the credentials of a real user.


Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • testing/environments/Dockerfile

We recommend upgrading to debian:11.5, as this image has only 43 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Issue Exploit Maturity
low severity CVE-2022-42898
SNYK-DEBIAN11-KRB5-3120880
No Known Exploit
low severity CVE-2022-42898
SNYK-DEBIAN11-KRB5-3120880
No Known Exploit
low severity CVE-2022-42898
SNYK-DEBIAN11-KRB5-3120880
No Known Exploit
low severity CVE-2022-42898
SNYK-DEBIAN11-KRB5-3120880
No Known Exploit
low severity Information Exposure
SNYK-DEBIAN11-UTILLINUX-2401081
No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

@amitkanfer amitkanfer requested a review from a team as a code owner December 7, 2022 01:15
@amitkanfer amitkanfer requested review from AndersonQ and michel-laterman and removed request for a team December 7, 2022 01:15
@cla-checker-service
Copy link

❌ Author of the following commits did not sign a Contributor Agreement:
7bfe7b0

Please, read and sign the above mentioned agreement if you want to contribute to this project

@mergify
Copy link
Contributor

mergify bot commented Dec 7, 2022

This pull request does not have a backport label. Could you fix it @amitkanfer? 🙏
To fixup this pull request, you need to add the backport labels for the needed
branches, such as:

  • backport-v./d./d./d is the label to automatically backport to the 8./d branch. /d is the digit

NOTE: backport-skip has been added to this pull request.

@elasticmachine
Copy link
Contributor

elasticmachine commented Dec 7, 2022

💚 Build Succeeded

the below badges are clickable and redirect to their specific view in the CI or DOCS
Pipeline View Test View Changes Artifacts preview preview

Expand to view the summary

Build stats

  • Start Time: 2022-12-12T18:29:38.127+0000

  • Duration: 19 min 23 sec

Test stats 🧪

Test Results
Failed 0
Passed 4665
Skipped 13
Total 4678

💚 Flaky test report

Tests succeeded.

🤖 GitHub comments

Expand to view the GitHub comments

To re-run your PR in the CI, just comment with:

  • /test : Re-trigger the build.

  • /package : Generate the packages.

  • run integration tests : Run the Elastic Agent Integration tests.

  • run end-to-end tests : Generate the packages and run the E2E Tests.

  • run elasticsearch-ci/docs : Re-trigger the docs validation. (use unformatted text in the comment!)

@elasticmachine
Copy link
Contributor

elasticmachine commented Dec 7, 2022

🌐 Coverage report

Name Metrics % (covered/total) Diff
Packages 98.333% (59/60) 👍
Files 69.082% (143/207) 👍
Classes 69.133% (271/392) 👍
Methods 53.983% (820/1519) 👍
Lines 39.131% (8875/22680) 👍 0.013
Conditionals 100.0% (0/0) 💚

Copy link
Contributor

@michel-laterman michel-laterman left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

do we care about the other dockerfiles (i.e.:

)

@AndersonQ
Copy link
Member

lgtm

do we care about the other dockerfiles (i.e.:

)

we should. Besides they're used on tests, it should not be a problem to update them

@sonarqubecloud
Copy link

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
No Duplication information No Duplication information

@jlind23 jlind23 merged commit b6b7ed8 into main Dec 14, 2022
@jlind23 jlind23 deleted the snyk-fix-1c23331200d6d678770b6d57bf1b8eb6 branch December 14, 2022 10:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants