-
Notifications
You must be signed in to change notification settings - Fork 114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade sigs.k8s.io/controller-runtime to 0.15.x version #481
Comments
I would go the quick and easy path right away to give us more time to work on the bigger upgrade. i.e. add a required block for "indirect" dependencies that we forcefully upgrade to fix CVEs // pull some of the indeirect dependency directly to get newer versions with fixed CVEs
require (
k8s.io/apimachinery v0.27.0 //indirect
)
|
The dependency updated will be addressed by kserve/rest-proxy#30. @ckadner what do you think to keep this issue open to track the major controller-runtime update? |
Sounds good 👍🏻 |
Affected repositories:
|
This will be done when we / along with the update to KServe v0.12.0 and Go 1.21 |
modelmesh-serving is ready to go. |
For tracking, #497 includes an upgrade of |
We came across a vulnerability where the
controller-runtime
pulls, as part of the[email protected]
, a dependency that has the following high vulnerability:As we can see in the dependency graph,
apimachinery
brings this vulnerable version of go proxy:To address this, we have 2 options, first and easier:
go.mod
by including thegoproxy
there:controller-runtime
to 0.15.0.goproxy
� dependency was removed from[email protected]
:However, this is a very large upgrade and have a lot of breaking changes that can be found here: https://github.com/kubernetes-sigs/controller-runtime/releases/tag/v0.15.0
Update.
The update to address the described vulnerability is done, however we will keep this issue open to track the
controller-runtime
update, as it is a large one and will require more tests.I'm opening this issue to start a discussion around this and how can we proceed with this CVE fix at this moment.
The text was updated successfully, but these errors were encountered: