chore(security): update docker base images and patch go dependencies#5459
chore(security): update docker base images and patch go dependencies#5459nXtCyberNet wants to merge 12 commits into
Conversation
|
Hey @nXtCyberNet A few checks are failing. Could you please look into it? |
|
Hi @PriteshKiri , To keep the functionality intact, I replaced This is required to support controller-runtime v0.15.0 and maintain |
|
Hey @nXtCyberNet Could you please resolve the conflicts? |
Done resolving the conflicts. Could you please enable the CI now? |
Signed-off-by: nXtCyberNet <rohantech2005@gmail.com>
Signed-off-by: nXtCyberNet <rohantech2005@gmail.com>
Signed-off-by: nXtCyberNet <rohantech2005@gmail.com>
Signed-off-by: nXtCyberNet <rohantech2005@gmail.com>
Signed-off-by: nXtCyberNet <rohantech2005@gmail.com>
Signed-off-by: nXtCyberNet <rohantech2005@gmail.com>
4fed1d7 to
ad76d70
Compare
|
hi @PriteshKiri , could you please allow the ci to run again , thanks! |
|
hi @PriteshKiri the ci is failed due to issue #5481 |
|
Any updates? |
|
Hey @nXtCyberNet Apologies for the delayed response. Your PR is under review. and it will get merged before the next release. |
uditgaurav
left a comment
There was a problem hiding this comment.
Looks good. Thanks @nXtCyberNet!
|
@nXtCyberNet could you please resolve the conflicts? |
Signed-off-by: Rohan Dev <86916212+nXtCyberNet@users.noreply.github.com>
I’ve resolved the conflicts. Could you please allow the CI runs? Thanks! |
Signed-off-by: Rohan Dev <86916212+nXtCyberNet@users.noreply.github.com>
|
@nXtCyberNet the build pipeline for graphql-server is failing, can you please fix this. |
Proposed changes
This PR updates Dockerfiles across the repository to use the latest patched base images (primarily UBI variants) and applies security patches/updates to Go dependencies where applicable.
Closes / Fixes:
Note: This is a focused refresh of the original intent behind #5394, but without any broader dependency alignments (e.g., no gnostic/protobuf replaces or Argo-related changes) to keep the PR minimal and avoid CI blockers from unrelated conflicts.
Types of changes
What types of changes does your code introduce to Litmus? Put an
xin the boxes that applyChecklist
Put an
xin the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.Dependency
Special notes for your reviewer:
microdnf module enable nginx:1.20not needed in newer UBI versions; unused python3/pip installs if confirmed removable).github.com/google/gnostic-modelsinstead ofgithub.com/google/gnostic; to ensure security vulnerabilities could be properly addressed, the correct module (gnostic-models) has been added where required. please see Critical Security Risks in Litmus via Outdated Argo Dependencies (incl. CVE-2025-32445 PrivEsc + unmaintained gnostic protobuf library) #5458This PR directly targets the reported CVEs by updating the base images used in the chaoscenter-related Dockerfiles to their latest patched UBI versions. Once merged and images rebuilt, a fresh scan should show significant reduction or closure of the listed vulnerabilities in the chaoscenter images.
Thanks for reviewing — let's get these security updates landed!