Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[pull] master from kserve:master #162

Merged
merged 10 commits into from
Jan 15, 2024
Merged

Conversation

pull[bot]
Copy link

@pull pull bot commented Jan 6, 2024

See Commits and Changes for more details.


Created by pull[bot]

Can you help keep this open source service alive? 💖 Please sponsor : )

* Handles s3 download for object name starts with folder name.

Signed-off-by: Andrews Arokiam <andrews.arokiam@ideas2it.com>

* Fix storage test.

Signed-off-by: Andrews Arokiam <andrews.arokiam@ideas2it.com>

* Added s3 storage test.

Signed-off-by: Andrews Arokiam <andrews.arokiam@ideas2it.com>

* Simplified logic

Signed-off-by: Andrews Arokiam <andrews.arokiam@ideas2it.com>

---------

Signed-off-by: Andrews Arokiam <andrews.arokiam@ideas2it.com>
Copy link

openshift-ci bot commented Jan 6, 2024

Hi @pull[bot]. Thanks for your PR.

I'm waiting for a opendatahub-io member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

terrytangyuan and others added 4 commits January 9, 2024 03:36
* fix: Add missing --timeout flag in batcher

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* removal

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

---------

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>
* ci: Automate release process

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* Update changes to release branch

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* update

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* Push tag

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* udpate

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* Split wf

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* monitor tags

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* fix

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* Use softprops/action-gh-release

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* Update automated-release.yml

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

---------

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>
fixes critical vulnerabiolities on ray

chore: 	fix the following CVEs
	- [CVE-2023-6019](https://www.cve.org/CVERecord?id=CVE-2023-6019): Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
	- [CVE-2023-6020](https://www.cve.org/CVERecord?id=CVE-2023-6020): Use of GET Request Method With Sensitive Query Strings

There are no fix for [CVE-2023-48023](https://www.cve.org/CVERecord?id=CVE-2023-48023) yet

Signed-off-by: Spolti <fspolti@redhat.com>
* Bump versions

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

* Bump versions

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>

---------

Signed-off-by: Yuan Tang <terrytangyuan@gmail.com>
@spolti
Copy link
Member

spolti commented Jan 9, 2024

/approve

@openshift-ci openshift-ci bot added the approved label Jan 9, 2024
Copy link

openshift-ci bot commented Jan 9, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: pull[bot], spolti

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Signed-off-by: Pitos <contact@gawsoft.com>
@openshift-ci openshift-ci bot removed the lgtm label Jan 10, 2024
Copy link

openshift-ci bot commented Jan 10, 2024

New changes are detected. LGTM label has been removed.

* Fixes CVE-2023-48795

chore: Fixes [CVE-2023-48795](https://www.cve.org/CVERecord?id=CVE-2023-48795) - golang.org/x/crypto Authentication Bypass by Capture-replay

Signed-off-by: Spolti <fspolti@redhat.com>

* review - run go mod tidy

Signed-off-by: Spolti <fspolti@redhat.com>

---------

Signed-off-by: Spolti <fspolti@redhat.com>
Fix Stack-based Buffer Overflow on protobuf

chore: Fix Stack-based Buffer Overflow on protobuf on protobuf
- https://security.snyk.io/vuln/SNYK-GOLANG-GOOGLEGOLANGORGPROTOBUFENCODINGPROTOJSON-6137908

Signed-off-by: Spolti <fspolti@redhat.com>
chore:	The purpose of this pull request is to addres [this](https://security.snyk.io/vuln/SNYK-GOLANG-KNATIVEDEVSERVINGPKGAUTOSCALERMETRICS-6091906) vulnerability.
	In the Snyk report it says that the version 0.39.3 still affected, however it seems to be a false positive, since the fix can be found merged
	as this [commit](knative/serving@fff40ef) shows.

Signed-off-by: Spolti <fspolti@redhat.com>
chore: Fixes the following vulnerabilities in the go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp dependency:
- [CVE-2022-21698](https://www.cve.org/CVERecord?id=CVE-2022-21698) / [CVE-2023-45142](https://www.cve.org/CVERecord?id=CVE-2023-45142): Allocation of Resources Without Limits or Throttling

Signed-off-by: Spolti <fspolti@redhat.com>
@israel-hdez
Copy link

/ok-to-test

@spolti
Copy link
Member

spolti commented Jan 15, 2024

/retest

1 similar comment
@israel-hdez
Copy link

/retest

@spolti
Copy link
Member

spolti commented Jan 15, 2024

Manually merging due the "Trusted App Pipeline" blocking the auto-merge.

@spolti spolti merged commit 8cf7c6c into opendatahub-io:master Jan 15, 2024
25 of 27 checks passed
israel-hdez pushed a commit to israel-hdez/kserve that referenced this pull request Mar 8, 2024
…p/component-updates/kserve-controller-28

Update kserve-controller-28 to 5a22f4a
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

5 participants