-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update build dependencies and perform required maintenance + chore tasks for the upgrade to go-1.23 ---------------------------- build: bump containerd/containerd to 1.7.24 build: bump github.com/golang-jwt/jwt/v4 build: bump github.com/golang-jwt/jwt/v4 to v4.5.1 build: bump k8s.io/apiserver to v0.32.1 build: bump versions for github actions build: go module updates build: go.mod upgrade and update to 1.23 build: udpate go github action workflow build: udpate release github action workflow build: update .golangci.yml for deprecations build: update .nancy-ignore for unused packages build: update allowed compilers for 1.23 build: update for multiarchitecture builds and upx installation build: update github action workflow for go 1.23 build: update github.com/containerd/containerd v1.7.25 build: update github.com/containerd/imgcrypt build: update github.com/containerd/imgcrypt@v1.1.11 build: update golangci configuration build: update security workflow for go1.23 build: update tools for golangci-lint for github dependency matching fix: error check for fernet keygeneration output fix: rand.Seed deprecated fix: remove reference to SSL30 fix: update bundle-remapper example fix: update celPackageGetSecret with correct type fix: update golang version to 1.23.2 fix: update paseto transformer with required inputs ---------------------------- Signed-off-by: Ben Stickel <ben.stickel@elastic.co>
- Loading branch information
Showing
121 changed files
with
1,894 additions
and
4,642 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
* @Zenithar | ||
* @fin09pcap |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,36 +1,44 @@ | ||
# consul issues - can be ignore because consul is not actively used as a server | ||
CVE-2024-10086 | ||
CVE-2022-29153 | ||
# etcd issues - can be ignored because etcd is not used. | ||
CVE-2020-15114 | ||
CVE-2020-15136 | ||
CVE-2020-15115 | ||
# end | ||
# golang-jwt/jwt | ||
CVE-2024-51744 | ||
# end | ||
# go-jwt issues - can be ignored because not used | ||
CVE-2020-26160 | ||
# end | ||
# vault server indirect dependencies - false positive | ||
CVE-2024-2660 | ||
CVE-2019-5736 | ||
# end | ||
# kubernetes indirect dependencies - false positive | ||
CVE-2020-8558 | ||
CVE-2019-11248 | ||
CVE-2019-11247 | ||
CVE-2018-1002102 | ||
CVE-2019-100210 | ||
CVE-2019-1002100 | ||
CVE-2019-1002101 | ||
CVE-2019-11243 | ||
CVE-2021-25741 | ||
CVE-2019-9946 | ||
CVE-2020-8552 | ||
CVE-2019-11253 | ||
CVE-2020-8559 | ||
CVE-2021-25735 | ||
CVE-2019-11244 | ||
CVE-2019-11246 | ||
CVE-2019-11247 | ||
CVE-2019-11248 | ||
CVE-2019-11249 | ||
CVE-2019-11250 | ||
CVE-2019-11251 | ||
CVE-2019-11253 | ||
CVE-2019-11254 | ||
CVE-2019-11249 | ||
CVE-2019-11246 | ||
CVE-2019-100210 | ||
CVE-2019-9946 | ||
CVE-2020-8552 | ||
CVE-2020-8555 | ||
CVE-2019-11251 | ||
CVE-2019-1002101 | ||
CVE-2020-8563 | ||
CVE-2020-8557 | ||
CVE-2019-11244 | ||
CVE-2019-1002100 | ||
CVE-2018-1002102 | ||
CVE-2020-8558 | ||
CVE-2020-8559 | ||
CVE-2020-8561 | ||
CVE-2020-8563 | ||
CVE-2021-25735 | ||
CVE-2021-25741 | ||
# end |
Oops, something went wrong.