Skip to content

Conversation

J12934
Copy link
Member

@J12934 J12934 commented Jan 7, 2022

This resolves all potential vulnerabilities reported you get when you scan the lurker or operator with trivy (see: trivy securecodebox/lurker:3.6.0 or trivy securecodebox/operator:3.6.0).

Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
@J12934 J12934 added dependencies Pull requests that update a dependency file maintenance labels Jan 7, 2022
@J12934 J12934 self-assigned this Jan 7, 2022
@J12934 J12934 marked this pull request as draft January 7, 2022 16:05
@J12934
Copy link
Member Author

J12934 commented Jan 7, 2022

I guess I'll have to update the operator and lurker in one step as their go versions are linked in the ci setup

J12934 added 4 commits January 7, 2022 17:14
Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
Note: Hash value has changed because the crds now include more fields due to the k8s client update, these new field have caused the hash values to be different then before.
Signed-off-by: Jannik Hollenbach <jannik.hollenbach@iteratec.com>
@J12934 J12934 changed the title Update Lurker Go Version and Lurker Dependencies Update Operators & Lurkers Go Version and Go Dependencies Jan 7, 2022
@J12934 J12934 marked this pull request as ready for review January 7, 2022 16:54
Copy link
Member

@Ilyesbdlala Ilyesbdlala left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file maintenance
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants