-
Notifications
You must be signed in to change notification settings - Fork 3.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Upgraded docker distribution go package to v2.8.2 for fixing a high vulnerability #11554
Conversation
Signed-off-by: Jonsy13 <vedant.shrotria@harness.io>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Thanks. I'll include this in #11552 |
Could you do a scan of |
Sure @terrytangyuan Will do!! Thanks! |
Signed-off-by: Jonsy13 <vedant.shrotria@harness.io>
Head branch was pushed to by a user without write access
Dockerfile
Outdated
@@ -78,6 +78,8 @@ RUN --mount=type=cache,target=/go/pkg/mod --mount=type=cache,target=/root/.cache | |||
|
|||
FROM gcr.io/distroless/static as argoexec | |||
|
|||
USER 8737 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Need some eyes on this
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure, let me know if you think this will take time, I can remove this change from this PR & have it in a separate one. Don't want to make it release blocker for you! 😄
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's remove it for now
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done thanks!!
Scanned v3.4.9, There was only one more -
But this is already fixed in Line 46 in cb1713d
|
Signed-off-by: Jonsy13 <vedant.shrotria@harness.io>
…igh vulnerability (#11554) Signed-off-by: Jonsy13 <vedant.shrotria@harness.io>
…igh vulnerability (argoproj#11554) Signed-off-by: Jonsy13 <vedant.shrotria@harness.io> Signed-off-by: Dillen Padhiar <dillen_padhiar@intuit.com>
Motivation
Here from LitmusChaos Again!!
After our last PR - #11538 got merged, we scanned the latest images again, we found one more vulnerability in both workflow-controller and argoexec which may have been missed earlier -
and also there was one compliance issue (only in argoexec but not in workflow-controller), on checking Dockerfile, we found that argoexec container doesn't have a USER set like other containers (workflow-controller, UI,etc) -
Modifications
Have updated the docker distribution go package to 2.8.2 & also added USER instruction
USER 8737
in argoexec build stage just like workflow-controller.NOTE - Do let us know if USER instruction is not required, will remove it again! Thanks!!
Verification