Commit Graph

142 Commits

Author SHA1 Message Date
Ashley Davis
12e0e0a9eb
bump golang.org/x/net version to fix trivy vulns
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-20 11:57:39 +00:00
Luca Comellini
bb252356a2
Update controller-runtime to v0.14.0
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-14 21:53:42 -08:00
Luca Comellini
c99c147059
Bump k8s.io deps to v0.26.0
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-12-14 21:53:42 -08:00
Ashley Davis
a099eb306a
bump dep versions to fix trivy-reported vulns
```text
{
  "VulnerabilityID": "CVE-2022-41717",
  "PkgName": "golang.org/x/net",
  "InstalledVersion": "v0.0.0-20220921155015-db77216a4ee9",
  "FixedVersion": "0.4.0",
  "Layer": {
    "DiffID": "sha256:629212d4fb1b47585329d1c630cb91f919ddcd6168031a07121953d6c6dbd438"
  },
  "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-41717",
  "DataSource": {
    "ID": "go-vulndb",
    "Name": "The Go Vulnerability Database",
    "URL": "https://github.com/golang/vulndb"
  },
  "Title": "An attacker can cause excessive memory growth in a Go server accepting ...",
  "Description": "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.",
  "Severity": "UNKNOWN",
  "References": [
    "https://go.dev/cl/455635",
    "https://go.dev/cl/455717",
    "https://go.dev/issue/56350",
    "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ",
    "https://pkg.go.dev/vuln/GO-2022-1144"
  ],
  "PublishedDate": "2022-12-08T20:15:00Z",
  "LastModifiedDate": "2022-12-08T22:30:00Z"
}
```

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-12-12 11:12:33 +00:00
Ashley Davis
b8e51bc24c
fix x/text vuln and ignore AWS vuln
Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-11-07 13:32:31 +00:00
Luca Comellini
4498b7cc47
Bump Go to 1.19
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-09-27 11:38:51 -07:00
Tim Ramlot
39fa9f51b4 upgrade dependencies
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-09-26 11:43:12 +02:00
Luca Comellini
97fbe24a74
Bump k8s.io dependencies
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-09-23 10:52:44 -07:00
Tim Ramlot
836793e7e3 upgrade gateway api to v0.5.0
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-08-08 08:52:59 +00:00
Tim Ramlot
9897f2355c upgrade ginkgo to v2
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
2022-08-04 10:16:29 +00:00
Ashley Davis
2636a638bf
replace go-restful version with patched version
for details, see the comment on the `replace` directive

see also this slack thread:

https://kubernetes.slack.com/archives/CDEQJ0Q8M/p1659536441504649?thread_ts=1659532155.184479&cid=CDEQJ0Q8M

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-08-03 15:33:54 +01:00
Ashley Davis
6985cd5e5a
update containerd dependency to fix CVE
CVE-2022-31030 and GHSA-5ffw-gxpp-mxpf

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-08-03 15:25:05 +01:00
Ashley Davis
01d8994f38
remove replacement for /x/net and update /x/net + /x/sys
the replaced version had several CVEs as reported by Trivy:

CVE-2021-44716 - golang.org/x/net:
golang: net/http: limit growth of header canonicalization cache

CVE-2021-31525 - golang.org/x/net:
golang: net/http: panic in ReadRequest and ReadResponse when reading a
very large header

CVE-2022-29526 - golang.org/x/sys:
golang: syscall: faccessat checks wrong group

this commit fixes those reported CVEs

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2022-08-03 14:44:06 +01:00
irbekrm
a93e028a75 Downgrade kube-openapi
As the later version has a breaking change (bumps github.com/emicklei/go-restful -> github.com/emicklei/go-restful/v3)

Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-07-01 19:16:43 +01:00
irbekrm
cb86bdfce7 Bump Helm dependency
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-07-01 19:16:16 +01:00
Luca Comellini
aaa513de00
Bump k8s.io dependencies
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-06-30 15:16:14 -07:00
Alessandro Vermeulen
1da01211ee Feature gated support for using literal subjects in Certificates
Signed-off-by: Alessandro Vermeulen <alessandro.vermeulen@ing.com>
2022-06-08 20:50:00 +02:00
Luca Comellini
091549620b
Bump Go to 1.18
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-06-02 15:50:13 -07:00
Irbe Krumina
1d917ef311 Revert "Use Apply instead of Update to modify resources in tests"
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-05-03 11:31:47 +01:00
irbekrm
46233e5012 ./hack/update-all.sh
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-04-28 14:51:44 +01:00
Luca Comellini
931adfb493
Bump golang.org/x/crypto to v0.0.0-20220411220226-7b82a4e95df4
Signed-off-by: Luca Comellini <luca.com@gmail.com>
2022-04-26 16:47:10 +02:00
jetstack-bot
dc24503939
Merge pull request #4958 from irbekrm/tsig_provider
Use our own implementation of miekg/dns.TsigProvider interface
2022-03-22 12:18:51 +00:00
irbekrm
4c901aefab Code review comments
Adds test conditions to certs via patch API call instead of update to avoid conflicts

Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-03-21 07:33:51 +00:00
irbekrm
3a21f961ca Use our own implementation of github.com/miekg/dns.TsigProvider interface
To allow us to both upgrade the upstream library and keep supporting HMACMD5 as RFC2136 TSIG algorithm although it was deprecated in the upstream library

Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-03-21 07:09:29 +00:00
irbekrm
587e02cee9 Replaces dns v0.41 -> v0.34
This is so as to avoid dropping support for HMacMD5 value for issuer.spec.acme.solvers.dns01.rfc2136.tsigAlgorithm

Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-03-17 20:14:55 +00:00
irbekrm
ad746fae10 Bumps a bunch of deps
Signed-off-by: irbekrm <irbekrm@gmail.com>
2022-03-17 20:14:55 +00:00
Joakim Ahrlin
eb64e6494c
update deps and BUILD files
Signed-off-by: Joakim Ahrlin <joakim.ahrlin@gmail.com>
2022-03-01 15:05:18 +00:00
Jake Sanders
c96d91d586
Update the sig-network Gateway API support to v1alpha2
Co-authored-by: Joakim Ahrlin <joakim.ahrlin@gmail.com>
Signed-off-by: Jake Sanders <i@am.so-aweso.me>
2022-03-01 15:05:17 +00:00
Richard Wall
4de29a9eb8 Upgrade containerd
To address https://github.com/advisories/GHSA-mvff-h3cj-wj9c

Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2022-01-20 15:09:09 +00:00
James Munnelly
8f1fb874ed Run update-codegen in module mode
Signed-off-by: James Munnelly <jmunnelly@apple.com>
2021-12-17 18:13:44 +00:00
James Munnelly
81f22fd49c Upgrade k8s.io dependencies to v0.23.1
Signed-off-by: James Munnelly <jmunnelly@apple.com>
2021-12-17 16:27:47 +00:00
James Munnelly
2041994b12 Update runc dependency to 1.0.3
Signed-off-by: James Munnelly <jmunnelly@apple.com>
2021-12-16 15:45:25 +00:00
Jake Sanders
53b4a0e491
Update helm, opencontainers, containerd.
This includes a minor update to the OCI spec to address
https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m
and https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh

Signed-off-by: Jake Sanders <i@am.so-aweso.me>
2021-11-23 16:49:56 +00:00
Ashley Davis
bfecde8116
update keystore-go library version
Following the release of cert-manager v1.6.0, it was observed that an
update to the keystore-go library was backwards-incompatible; it
introduced a 6-character minimum length on passwords which wasn't
previously in force.

This led to https://github.com/pavel-v-chernykh/keystore-go/issues/30
which in turn led to https://github.com/pavel-v-chernykh/keystore-go/pull/31

This commit bumps to use the new version, which by default doesn't have
a min password length

Signed-off-by: Ashley Davis <ashley.davis@jetstack.io>
2021-10-28 10:10:45 +01:00
irbekrm
598ed35e4a Uses go/crypto ListCertAlternates function to fetch alternative certificate chains
This allows us to use upstream go/crypto again instead of our own fork

Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-10-07 15:21:26 +01:00
Richard Wall
6cadf757eb go mod tidy
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-07 09:16:02 +01:00
Richard Wall
1a93079a69 go get -u github.com/containerd/containerd
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-07 09:12:44 +01:00
Richard Wall
6a32ccd5dd go get -u helm.sh/helm/v3
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-01 12:41:10 +01:00
Richard Wall
10090b4853 go mod tidy
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-01 10:15:58 +01:00
Richard Wall
d47c46953f go get -u github.com/containerd/containerd
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-01 10:15:31 +01:00
Richard Wall
c786540b0a go get -u github.com/opencontainers/runc
Signed-off-by: Richard Wall <richard.wall@jetstack.io>
2021-10-01 10:14:53 +01:00
irbekrm
0679c33c3f Update kube libraries, regenerate go.mod/go.sum
Updates go.mod for Go 1.17

Signed-off-by: irbekrm <irbekrm@gmail.com>
2021-09-30 10:07:59 +01:00
George Moldoveanu
0463681244
updates go deps and bazel files
Signed-off-by: George Moldoveanu <mol.george@gmail.com>
2021-09-02 23:45:11 +01:00
George Moldoveanu
d0151f7175
fixed TestEncodeJKSKeystore tests to work with upgraded keystore-go api (v4)
Signed-off-by: George Moldoveanu <mol.george@gmail.com>
2021-09-02 23:33:45 +01:00
Inteon
b13eb0483b
upgrade deps to latest version (kube v0.22.0)
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-08-13 23:38:59 +02:00
Inteon
1e89e9a55b
upgrade go.mod
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-08-04 00:49:07 +02:00
Maël Valais
30f9c123d3 gateway-shim: add the gateway-shim controller
Note that the gateway-shim is only half the work for supporting the
Gateway API in cert-manager. The other half is the HTTP01 solver
support, which is still worked on.

The Gateway API in cert-manager is releases as an experimental feature
and needs to be enabled manually with the following flag:

  --controllers=*,gateway-shim

All the annotations supported by ingress-shim are also supported by
gateway-shim, with some exceptions:

  "acme.cert-manager.io/http01-ingress-class"

This annotation is not supported on the Gateway resource. Although the
Gateway resource also has a "gatewayClass" field, we will need to add
another field instead of "ingress-class" to avoid confusion with the
ingress-shim.

  "acme.cert-manager.io/http01-edit-in-place"

This annotation is not supported because it is specific to some ingress
controllers like ingress-gce.

  "kubernetes.io/tls-acme"

This annotation is not supported because it is a behavior inherited from
kube-lego and we chose not to keep this behavior with the Gateway API.

Unlike the ingress-shim, you can reuse the same Secret name in multiple
TLS configurations on the same Gateway resource.

The ingress-shim now shows the exact location of the duplicate
secretName when the user gives the same secretName in two separate TLS
blocks.

Signed-off-by: Maël Valais <mael@vls.dev>
Co-authored-by: Jake Sanders <i@am.so-aweso.me>
2021-07-15 20:34:55 +02:00
Inteon
b852735a95
upgrade ginkgo & gomega
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-10 20:52:09 +02:00
Inteon
cb6030f1d9
add -prune=true & go mod tidy to update-deps.sh
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-10 20:35:41 +02:00
Inteon
cd92bf321f
centralise testing api-server & remove custom implementation
Signed-off-by: Inteon <42113979+inteon@users.noreply.github.com>
2021-07-06 16:13:44 +02:00