Update Go version and dependencies#291
Update Go version and dependencies#291micahhausler wants to merge 2 commits intokubernetes-csi:masterfrom
Conversation
Signed-off-by: Micah Hausler <mhausler@amazon.com>
Signed-off-by: Micah Hausler <mhausler@amazon.com>
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: micahhausler The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Welcome @micahhausler! |
|
Hi @micahhausler. Thanks for your PR. I'm waiting for a kubernetes-csi member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
Closing in favor of #289 |
What type of PR is this?
/kind cleanup
What this PR does / why we need it:
Prior to this change, building csi-proxy included known vulnerabilities in
golang.org/x/net,net/http, and go runtime.I updated the Go runtime to 1.20, and package dependencies to non-vulnerable versions.
original govulncheck findings
After this change,
govulncheckreports no issuesgovulncheck output
Using govulncheck@v1.0.0 with vulnerability data from https://vuln.go.dev (last modified 2023-07-24 16:24:24 +0000 UTC). Scanning your binary for known vulnerabilities... No vulnerabilities found. Share feedback at https://go.dev/s/govulncheck-feedback.Which issue(s) this PR fixes:
N/A
Special notes for your reviewer:
I made one commit with updates to
go.mod,go.sumandrelease-tools/prow.sh. The second commit is after runninggo mod vendorto update vendored dependencies.Does this PR introduce a user-facing change?: