-
-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update prometheus and docker libraries. fixes multiple security issues #1716
Conversation
Thank you for your contribution. unfortunately, one or more of your commits are missing the required "Signed-off-by:" statement. Signing off is part of the Developer Certificate of Origin (DCO) which is used by this project. Read the DCO and project contributing guide carefully, and amend your commits using the git CLI. Note that this does not require any cryptography, keys or special steps to be taken. 💡 Shall we fix this?This will only take a few moments. First, clone your fork and checkout this branch using the git CLI. Next, set up your real name and email address:
Finally, run one of these commands to add the "Signed-off-by" line to your commits. If you only have one commit so far then run: Check that the message has been added properly by running "git log". |
@alexellis please have a look at this as soon as you can. Also, you said that you were willing to merge openfaas/of-watchdog#134 even though without functional tests... when are you expecting to do it? |
Hi, Thanks for your contribution. A similar PR will be required for the classic watchdog
Pinning of container images is a best practice, I'm not sure what you're suggesting as an alternative, but using the Does alpine:3.15 not contain the fix for If that's true, then only a rebuild is required to get the latest updates for the openssl package. Regards, Alex |
Yes exactly. You are right about the version pinning and all that. It's what I tried to say. All the other vulnerabilities are automatically fixed just by building the container again because the I was not suggesting any modification regarding to that. I was pointing out that it does fixes the other vulnerabilities. |
Please see the video for instructions on how to either squash or rebase your commits so that both of them are signed-off, Derek linked you to a video for this: https://www.youtube.com/watch?v=8j0H6urZ-bU |
update docker/distribution lib Signed-off-by: Hilário Coelho <[email protected]>
done |
I've checked out the code and ran |
Related to this PR
Current prometheus client golang lib being used by of-watchod contains a vulnerability that has been fixed on v1.11.1 here
Description
As you can see, the generated docker container of gateway contains multiple vulnerabilities as reported by grype:
After updating
github.com/prometheus/client_golang
andgithub.com/docker/distribution
libraries, and simply recreate the container runningmake build-gateway
almost all vulnerabilities are fixed. This is due to those libraries update and the use of a new Alpine image (since the dockerfile is pinning the minor version3.15
as you can see here):Motivation and Context
Fix security vulnerabilities.
Prometheus vulnerability is IMO the most concerning issue as discussed on the above referred PR.
To any concerned user, @Jack64 did a great risk assessment of Prometheus vulnerability here
How Has This Been Tested?
Using grype
Checked both changelogs (Prometheus and Docker libraries) and none include breaking changes.
Types of changes
Checklist:
git commit -s