THREESCALE-10280 Bump dependencies to address otelhttp CVE#956
Merged
carlkyrillos merged 1 commit into3scale:masterfrom Mar 29, 2024
Merged
THREESCALE-10280 Bump dependencies to address otelhttp CVE#956carlkyrillos merged 1 commit into3scale:masterfrom
carlkyrillos merged 1 commit into3scale:masterfrom
Conversation
Contributor
Author
|
Putting on a hold on this PR until #948 is merged /hold |
2bc276a to
db82ed8
Compare
Contributor
Author
|
Removing the hold since #948 was merged |
db82ed8 to
93ceec3
Compare
Contributor
Author
|
/test test-e2e |
Contributor
|
/lgtm |
MStokluska
approved these changes
Mar 29, 2024
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Issue Link
JIRA: THREESCALE-10280
What
This PR bumps
k8s.io/*to v0.29.0,controller-runtimeto v0.17.2, andgithub.com/RHsyseng/operator-utilsto v1.4.13 to in order to bring theopentelemetry-gosubdepdency to v0.44.0 which addresses CVE-2023-45142.Verification Steps
Passing prow checks and eye review