Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 2281619: build: update go mod #649

Open
wants to merge 1 commit into
base: release-4.15
Choose a base branch
from

Conversation

parth-gr
Copy link
Member

updated golang.org/x/net and other related
dependencies
This will fix the govulncheck CI
and also resolves the security issue
https://pkg.go.dev/vuln/GO-2024-2687

Checklist:

  • Commit Message Formatting: Commit titles and messages follow guidelines in the developer guide.
  • Reviewed the developer guide on Submitting a Pull Request
  • Pending release notes updated with breaking and/or notable changes for the next minor release.
  • Documentation has been updated, if necessary.
  • Unit tests have been added, if necessary.
  • Integration tests have been added, if necessary.

Copy link

openshift-ci bot commented May 14, 2024

@parth-gr: No Bugzilla bug is referenced in the title of this pull request.
To reference a bug, add 'Bug XXX:' to the title of this pull request and request another bug refresh with /bugzilla refresh.

In response to this:

build: update go mod

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Copy link

openshift-ci bot commented May 14, 2024

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: parth-gr
Once this PR has been reviewed and has the lgtm label, please assign subhamkrai for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@parth-gr parth-gr marked this pull request as draft May 14, 2024 15:38
@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 14, 2024
@parth-gr parth-gr marked this pull request as ready for review May 15, 2024 13:20
@openshift-ci openshift-ci bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 15, 2024
@@ -11,6 +11,8 @@
limitations under the License.
"""

# pylint: disable=E0606

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is E0606? This isn't disabled in the master branch. What is causing it to need disabled here?

Also, please be sure to comment what rule is being disabled and why alongside linter directives like these so they can be inspected more easily in the future as things change.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is recently disabled by this rook#14203

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I see that the target = None change is present here (https://github.com/rook/rook/pull/14204/files) but not in this PR. Would it make more sense to use cherry-pick -x to include that commit here instead of copying only one part of its change?

@parth-gr parth-gr force-pushed the govulncheck branch 4 times, most recently from d974282 to 72c5f5a Compare May 16, 2024 13:45
updated golang.org/x/net and other related
dependencies
This will fix the govulncheck CI
and also resolves the security issue
 https://pkg.go.dev/vuln/GO-2024-2687

Signed-off-by: parth-gr <partharora1010@gmail.com>
go-version: "1.21.5"
go-version: "1.21.9"

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's nice that we can update the z-version from .5 to .9 and don't have to change the .21 y-version.

We could potentially fix future changes also by using go-version: "1.21" here without the z-version . We did a similar thing recently in Rook upstream here: https://github.com/rook/rook/pull/14175/files

@parth-gr parth-gr changed the title build: update go mod Bug 2281619: build: update go mod May 20, 2024
@openshift-ci openshift-ci bot added bugzilla/severity-unspecified Referenced Bugzilla bug's severity is unspecified for the PR. bugzilla/invalid-bug Indicates that a referenced Bugzilla bug is invalid for the branch this PR is targeting. labels May 20, 2024
Copy link

openshift-ci bot commented May 20, 2024

@parth-gr: This pull request references Bugzilla bug 2281619, which is invalid:

  • expected the bug to target the "ODF 4.15.3" release, but it targets "---" instead

Comment /bugzilla refresh to re-evaluate validity if changes to the Bugzilla bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

Bug 2281619: build: update go mod

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@parth-gr
Copy link
Member Author

@travisn ready to merge, we do got the QA ACKs

@travisn
Copy link

travisn commented May 20, 2024

/bugzilla refresh

Copy link

openshift-ci bot commented May 20, 2024

@travisn: This pull request references Bugzilla bug 2281619, which is invalid:

  • expected the bug to target the "ODF 4.15.3" release, but it targets "---" instead

Comment /bugzilla refresh to re-evaluate validity if changes to the Bugzilla bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

/bugzilla refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bugzilla/invalid-bug Indicates that a referenced Bugzilla bug is invalid for the branch this PR is targeting. bugzilla/severity-unspecified Referenced Bugzilla bug's severity is unspecified for the PR.
Projects
None yet
3 participants