-
Notifications
You must be signed in to change notification settings - Fork 417
aws-cli-2/2.28.6 package update #62060
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
octo-sts
bot
commented
Aug 8, 2025
🩹 Build Failed: Patch Application Failed
Build Details
Root Cause Analysis 🔍The patch file GHSA-5rjg-fvgr-3xxf.patch failed to apply to requirements/download-deps/bootstrap-win-lock.txt. This is likely due to the patch being created against a different version of the file or the target file having been modified in a way that makes the patch incompatible. The patch system was unable to find the expected context lines at line 14 of the bootstrap-win-lock.txt file. 🔍 Build failure fix suggestionsFound similar build failures that have been fixed in the past and analyzed them to suggest a fix: Similar PRs with fixes
Suggested ChangesFile: aws-cli-2.yaml
Replacement: Content:
Replacement: Content:
Content: Click to expand fix analysisAnalysisBased on the similar fixed build failures, there's a clear pattern: when patches fail to apply cleanly (typically with "Hunk #1 FAILED" errors), the most effective solution is to update the package to a newer version that already includes the security fixes, then remove the patch entirely. In all three examples, the fixes involved: 1) Updating package version to a newer release, 2) Updating the expected-commit hash, and 3) Removing the failing patch from the pipeline. This approach works because newer upstream versions often already incorporate the security fixes that were being applied via patches. Click to expand fix explanationExplanationThis fix should work because the pattern from all similar failures shows that when security patches fail to apply, it's typically because the target codebase has changed significantly from when the patch was created. The most reliable solution is to update to a newer upstream version that already incorporates the security fix (GHSA-5rjg-fvgr-3xxf). AWS CLI follows semantic versioning and regularly releases updates that include security fixes. Version 2.29.0 or later would likely include the fix for GHSA-5rjg-fvgr-3xxf, making the manual patch unnecessary. This approach eliminates the patch application failure while maintaining security by using the upstream-integrated fix. Click to expand alternative approachesAlternative Approaches
Was this comment helpful? Please use 👍 or 👎 reactions on this comment. |
Signed-off-by: wolfi-bot <[email protected]>
970f464 to
07b12c0
Compare
|
superseded by #62797 |
Pull request was closed