-
Notifications
You must be signed in to change notification settings - Fork 377
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump up opentelemetry to avoid scanner CVE warnings #5703
Conversation
06c33e8
to
6815fce
Compare
/test-conformance |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is it typical to bump up indirect dependencies directly? Could it be overwriten when the direct dependency requiring it upgrades in the future?
cc @antoninbas
@tnqn This is fine. If a direct dependency upgrades and starts requiring a minimum version that > to the one we have in the go.mod, the indirect entry in our go.mod will be automatically updated to that new minimum version. Typically the main concern is that you should not upgrade to a new major version, as that new major version may not be compatible with your direct dependency. The same concern can apply for pre-v1 minor version updates, if backward compatibility is broken. However, even though we have some major version updates here, it seems that everything still builds fine. In theory, it's possible to have some broken functionality, in case of a behavior change of the library. But we don't really leverage OTEL in the Antrea apiservers, and we don't provide a way to enable tracing:
When we upgrade our K8s dependencies in the future, maybe it will make more sense to revert these changes and let K8s choose OTEL module versions. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is fine by me. However, the commit message and PR description should make it clear that this is only to make CVE scanners happy, as these CVEs don't affect Antrea, including prior versions of Antrea. The current title, with the use of "fix", kind of implies that Antrea was affected by these CVEs. See #5602 (may be a good idea to reference the issue in the commit message as well).
We probably do not need to backport this to supported Antrea versions either. I know that K8s is not back-porting their PR (kubernetes/kubernetes#121338), as per their policy: https://github.com/kubernetes/community/blob/master/contributors/devel/sig-release/cherry-picks.md
…and CVE-2023-45142 Refer to issue antrea-io#5602, these CVEs don't affect Antrea, including prior versions of Antrea. This patch only removes warning from CVE scanners. Signed-off-by: Bin Liu <biliu@vmware.com>
6815fce
to
f342b3b
Compare
/test-all |
/skip-e2e |
Got it, thanks for explanation. |
We re-apply antrea-io#5703. When updating K8s dependencies in antrea-io#5843, the change was reverted and we went back to using an older version of opentelemetry which is affected by a CVE. The CVE doesn't affect Antrea, the patch is meant to avoid warnings from CVE scanners. Co-authored-by: Antonin Bas <antonin.bas@broadcom.com> Signed-off-by: Bin Liu <biliu@vmware.com> Signed-off-by: Antonin Bas <antonin.bas@broadcom.com>
We re-apply #5703. When updating K8s dependencies in #5843, the change was reverted and we went back to using an older version of opentelemetry which is affected by a CVE. The CVE doesn't affect Antrea, the patch is meant to avoid warnings from CVE scanners. Signed-off-by: Bin Liu <biliu@vmware.com> Signed-off-by: Antonin Bas <antonin.bas@broadcom.com> Co-authored-by: Bin Liu <biliu@vmware.com>
For CVE-2023-47108 and CVE-2023-45142.
These CVEs don't affect Antrea, including prior versions of Antrea.
This patch is only meant to avoid warnings from CVE scanners.
See also #5602
Signed-off-by: Bin Liu biliu@vmware.com