Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump to kine/v0.13.8 etcd/v3.5.18 #11687

Merged
merged 2 commits into from
Jan 31, 2025
Merged

Bump to kine/v0.13.8 etcd/v3.5.18 #11687

merged 2 commits into from
Jan 31, 2025

Conversation

brandond
Copy link
Member

@brandond brandond commented Jan 29, 2025

Proposed Changes

Bump kine to v0.13.8
Bump etcd to v3.5.18

Types of Changes

version bump

Verification

check kine version in go.mod

Testing

Linked Issues

User-Facing Change

Further Comments

Signed-off-by: Brad Davidson <[email protected]>
@brandond brandond requested a review from a team as a code owner January 29, 2025 20:27
Signed-off-by: Brad Davidson <[email protected]>
@brandond brandond changed the title Bump kine to v0.13.8 Bump to kine/v0.13.8 etcd/v3.5.18 Jan 29, 2025
Copy link

codecov bot commented Jan 29, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 47.56%. Comparing base (0d028a2) to head (2e708cf).
Report is 4 commits behind head on master.

Additional details and impacted files
@@            Coverage Diff             @@
##           master   #11687      +/-   ##
==========================================
- Coverage   49.90%   47.56%   -2.34%     
==========================================
  Files         185      185              
  Lines       19353    19353              
==========================================
- Hits         9658     9206     -452     
- Misses       8302     8809     +507     
+ Partials     1393     1338      -55     
Flag Coverage Δ
e2etests 40.29% <ø> (-3.83%) ⬇️
inttests 35.01% <ø> (-0.05%) ⬇️
unittests 17.03% <ø> (-0.01%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@cwayne18
Copy link
Member

/trivy

Copy link
Contributor


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://aquasecurity.github.io/trivy/v0.57/docs/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


bin/containerd-shim-runc-v2 (gobinary)
======================================
Total: 0 (HIGH: 0, CRITICAL: 0)


Suppressed Vulnerabilities (Total: 1)
=====================================
┌──────────────────┬────────────────┬──────────┬──────────────┬─────────────────────────────┬──────────────────────┐
│     Library      │ Vulnerability  │ Severity │    Status    │          Statement          │        Source        │
├──────────────────┼────────────────┼──────────┼──────────────┼─────────────────────────────┼──────────────────────┤
│ golang.org/x/net │ CVE-2024-45338 │ HIGH     │ not_affected │ vulnerable_code_not_present │ rancher.openvex.json │
└──────────────────┴────────────────┴──────────┴──────────────┴─────────────────────────────┴──────────────────────┘

bin/k3s (gobinary)
==================
Total: 0 (HIGH: 0, CRITICAL: 0)


Suppressed Vulnerabilities (Total: 2)
=====================================
┌─────────────────────┬────────────────┬──────────┬──────────────┬─────────────────────────────────────┬──────────────────────┐
│       Library       │ Vulnerability  │ Severity │    Status    │              Statement              │        Source        │
├─────────────────────┼────────────────┼──────────┼──────────────┼─────────────────────────────────────┼──────────────────────┤
│ golang.org/x/crypto │ CVE-2024-45337 │ CRITICAL │ not_affected │ vulnerable_code_not_present         │ rancher.openvex.json │
├─────────────────────┼────────────────┼──────────┤              ├─────────────────────────────────────┤                      │
│ golang.org/x/net    │ CVE-2024-45338 │ HIGH     │              │ vulnerable_code_not_in_execute_path │                      │
└─────────────────────┴────────────────┴──────────┴──────────────┴─────────────────────────────────────┴──────────────────────┘

bin/runc (gobinary)
===================
Total: 0 (HIGH: 0, CRITICAL: 0)


Suppressed Vulnerabilities (Total: 1)
=====================================
┌──────────────────┬────────────────┬──────────┬──────────────┬─────────────────────────────┬──────────────────────┐
│     Library      │ Vulnerability  │ Severity │    Status    │          Statement          │        Source        │
├──────────────────┼────────────────┼──────────┼──────────────┼─────────────────────────────┼──────────────────────┤
│ golang.org/x/net │ CVE-2024-45338 │ HIGH     │ not_affected │ vulnerable_code_not_present │ rancher.openvex.json │
└──────────────────┴────────────────┴──────────┴──────────────┴─────────────────────────────┴──────────────────────┘

@brandond brandond merged commit eec2a53 into k3s-io:master Jan 31, 2025
40 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants