-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: port CVE fixes #8743
Closed
Closed
fix: port CVE fixes #8743
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
dgraph-bot
added
area/bulk-loader
Issues related to bulk loading.
area/core
internal mechanisms
area/documentation
Documentation related issues.
area/enterprise
Related to proprietary features
area/enterprise/acl
Related to Access Control Lists
area/enterprise/backup
Related to binary backups
area/graphql
Issues related to GraphQL support on Dgraph.
area/integrations
Related to integrations with other projects.
area/live-loader
Issues related to live loading.
area/schema
Issues related to the schema language and capabilities.
area/testing
Testing related issues
go
Pull requests that update Go code
labels
Mar 9, 2023
skrdgraph
requested review from
akon-dey,
darkn3rd,
meghalims,
matthewmcneely and
billprovince
as code owners
March 9, 2023 19:12
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is the large diff in go.sum expected?
go.sum is autogenerated |
Closing this in favor of #8760 |
skrdgraph
added a commit
that referenced
this pull request
Mar 17, 2023
Similar to #8743 but two changes. - github.com/dgraph-io/graphql-transport-ws did not have any CVE's, see #8624: - Bumping google.golang.org/[email protected] to v1.52.0 caused issues, but this was not a CVE fix. See #8655 We now have parity with main branch (i.e. equal number and same CVE's on main and slash). --------- Co-authored-by: skrdgraph <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
area/bulk-loader
Issues related to bulk loading.
area/core
internal mechanisms
area/documentation
Documentation related issues.
area/enterprise/acl
Related to Access Control Lists
area/enterprise/backup
Related to binary backups
area/enterprise
Related to proprietary features
area/graphql
Issues related to GraphQL support on Dgraph.
area/integrations
Related to integrations with other projects.
area/live-loader
Issues related to live loading.
area/schema
Issues related to the schema language and capabilities.
area/testing
Testing related issues
go
Pull requests that update Go code
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Problem
need cve fixes on top of 21.03-slash
Solution
port fixes from main