- Oct 07, 2024
-
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
- Oct 05, 2024
-
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
- Sep 03, 2024
-
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
- Aug 31, 2024
-
-
Jan Grant authored
This applies a small refactor to the e2e tests to ensure that the newer provisioner is capable of siting helper pods correctly to clean up PVs with "legacy" affinity constraints. The kind cluster itself is reconfigured to ensure that all nodes have `metadata.name` != `metadata.labels["kubernetes.io/hostname"]`, which is an assumption that does not hold for many cloud providers.
-
Jan Grant authored
As per https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#built-in-node-labels [[[ Note: The value of these labels is cloud provider specific and is not guaranteed to be reliable. For example, the value of kubernetes.io/hostname may be the same as the node name in some environments and a different value in other environments. ]]]
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
- Aug 30, 2024
-
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
Robert Rose authored
This also requires to update the minimun go version from 1.21 to 1.22.0, as sig-storage-lib-external-provisioner requires at least go 1.22.0. Additionally, sig-storage-lib-external-provisioner now uses patch to modify finalizers on PersistentVolumes, meaning that external provisioners now need permission rules to patch PersistentVolumes. https://github.com/kubernetes-sigs/sig-storage-lib-external-provisioner/releases/tag/v10.0.0 https://github.com/kubernetes-sigs/sig-storage-lib-external-provisioner/releases/tag/v10.0.1 Signed-off-by: Robert Rose <robert.rose@mailbox.org>
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
- Jul 31, 2024
-
-
Reinhard Nägele authored
Here's a result from a Trivy scan. This change fixes these CVEs. Total: 13 (UNKNOWN: 0, LOW: 0, MEDIUM: 11, HIGH: 1, CRITICAL: 1) ┌────────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────┬──────────────────────────────────────────────────────────────┐ │ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │ ├────────────────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────┼──────────────────────────────────────────────────────────────┤ │ golang.org/x/crypto │ CVE-2023-48795 │ MEDIUM │ fixed │ v0.14.0 │ 0.17.0 │ ssh: Prefix truncation attack on Binary Packet Protocol │ │ │ │ │ │ │ │ (BPP) │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-48795 │ ├────────────────────────────┼────────────────┤ │ ├───────────────────┼─────────────────┼──────────────────────────────────────────────────────────────┤ │ golang.org/x/net │ CVE-2023-45288 │ │ │ v0.17.0 │ 0.23.0 │ golang: net/http, x/net/http2: unlimited number of │ │ │ │ │ │ │ │ CONTINUATION frames causes DoS │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45288 │ ├────────────────────────────┼────────────────┤ │ ├───────────────────┼─────────────────┼──────────────────────────────────────────────────────────────┤ │ google.golang.org/protobuf │ CVE-2024-24786 │ │ │ v1.31.0 │ 1.33.0 │ golang-protobuf: encoding/protojson, internal/encoding/json: │ │ │ │ │ │ │ │ infinite loop in protojson.Unmarshal when unmarshaling │ │ │ │ │ │ │ │ certain forms of... │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-24786 │ ├────────────────────────────┼────────────────┼──────────┤ ├───────────────────┼─────────────────┼──────────────────────────────────────────────────────────────┤ │ stdlib │ CVE-2024-24790 │ CRITICAL │ │ 1.21.4 │ 1.21.11, 1.22.4 │ golang: net/netip: Unexpected behavior from Is methods for │ │ │ │ │ │ │ │ IPv4-mapped IPv6 addresses │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-24790 │ │ ├────────────────┼──────────┤ │ ├─────────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2023-45288 │ HIGH │ │ │ 1.21.9, 1.22.2 │ golang: net/http, x/net/http2: unlimited number of │ │ │ │ │ │ │ │ CONTINUATION frames causes DoS │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45288 │ │ ├────────────────┼──────────┤ │ ├─────────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2023-39326 │ MEDIUM │ │ │ 1.20.12, 1.21.5 │ golang: net/http/internal: Denial of Service (DoS) via │ │ │ │ │ │ │ │ Resource Consumption via HTTP requests... │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-39326 │ │ ├────────────────┤ │ │ ├─────────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2023-45289 │ │ │ │ 1.21.8, 1.22.1 │ golang: net/http/cookiejar: incorrect forwarding of │ │ │ │ │ │ │ │ sensitive headers and cookies on HTTP redirect... │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45289 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2023-45290 │ │ │ │ │ golang: net/http: memory exhaustion in │ │ │ │ │ │ │ │ Request.ParseMultipartForm │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45290 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2024-24783 │ │ │ │ │ golang: crypto/x509: Verify panics on certificates with an │ │ │ │ │ │ │ │ unknown public key algorithm... │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-24783 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2024-24784 │ │ │ │ │ golang: net/mail: comments in display names are incorrectly │ │ │ │ │ │ │ │ handled │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-24784 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2024-24785 │ │ │ │ │ golang: html/template: errors returned from MarshalJSON │ │ │ │ │ │ │ │ methods may break template escaping │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-24785 │ │ ├────────────────┤ │ │ ├─────────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2024-24789 │ │ │ │ 1.21.11, 1.22.4 │ golang: archive/zip: Incorrect handling of certain ZIP files │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-24789 │ │ ├────────────────┤ │ │ ├─────────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2024-24791 │ │ │ │ 1.21.12, 1.22.5 │ net/http: Denial of service due to improper 100-continue │ │ │ │ │ │ │ │ handling in net/http │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-24791 │ └────────────────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────┴──────────────────────────────────────────────────────────────┘
-
- Jun 19, 2024
-
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
- Jun 18, 2024
-
-
JustusBunsi authored
Signed-off-by: justusbunsi <61625851+justusbunsi@users.noreply.github.com>
-
- Jun 14, 2024
-
-
Derek Su authored
Temporarily disable the flaky test case and fix it later Signed-off-by: Derek Su <derek.su@suse.com>
-
Derek Su authored
This reverts commit c4dc309a. Signed-off-by: Derek Su <derek.su@suse.com>
-
- May 30, 2024
-
-
James Lu authored
Signed-off-by: James Lu <james.lu@suse.com>
-
James Lu authored
Signed-off-by: James Lu <james.lu@suse.com>
-
James Lu authored
Signed-off-by: James Lu <james.lu@suse.com>
-
- May 29, 2024
-
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
- May 27, 2024
-
-
Derek Su authored
Retain will make the condition check in pod_test.go failed. Signed-off-by: Derek Su <derek.su@suse.com>
-
JustusBunsi authored
Signed-off-by: justusbunsi <61625851+justusbunsi@users.noreply.github.com>
-
JustusBunsi authored
Signed-off-by: justusbunsi <61625851+justusbunsi@users.noreply.github.com>
-
Derek Su authored
drone env is somehow broken. Before moving CI to GitHub Actions, disable the e2e temporarily. Signed-off-by: Derek Su <derek.su@suse.com>
-
Mohammad authored
add local-path-provisioner to ./deploy/chart in helm command
-
galal-hussein authored
Signed-off-by: galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
Derek Su authored
Signed-off-by: Derek Su <derek.su@suse.com>
-
Sebastian Ohl authored
-
Alban Bedel authored
Add the `pathPattern` parameter to the storage class values so it can also be configured from the helm chart. Signed-off-by: Alban Bedel <alban.bedel@aerq.com>
-
Alban Bedel authored
Add support for the `pathPattern` parameter, if set it is expanded as a go template with the PV name and PVC metadata as input. This allow configuring the provisioner to use predictable paths so volumes can be prefilled externally or re-used. Signed-off-by: Alban Bedel <alban.bedel@aerq.com>
-
- May 26, 2024
-
-
Jeremy Scott authored
-
Jeremy Scott authored
-
Jeremy Scott authored
-
- May 16, 2024