diff --git a/CHANGELOG.md b/CHANGELOG.md index 5ca06d61..e63fcfdb 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -13,6 +13,11 @@ This project adheres to [Semantic Versioning](http://semver.org/). ## v-next +## v0.13.19 +Released: 2024-09-30 + +* Remediates CVE-2024-24791, CVE-2024-34155, CVE-2024-34156 and CVE-2024-34158 in go-toolset + ## v0.13.18 Released: 2024-08-20 diff --git a/Dockerfile b/Dockerfile index 3cb333cb..9592052e 100644 --- a/Dockerfile +++ b/Dockerfile @@ -1,6 +1,6 @@ # This first stage of the build uses go-toolset to build the portieris binary creates # a simplified operating system image that satisfies vulnerability scanning requirements -FROM --platform=$BUILDPLATFORM registry.access.redhat.com/ubi8/go-toolset:1.21.11 AS builder +FROM --platform=$BUILDPLATFORM registry.access.redhat.com/ubi8/go-toolset:1.21.13 AS builder ARG PORTIERIS_VERSION=undefined # switch to root user as we need to run yum and rpm to ensure packages are up to date @@ -22,7 +22,7 @@ RUN CGO_ENABLED=0 GOOS=${TARGETOS} GOARCH=${TARGETARCH} go build \ -tags containers_image_openpgp -o /opt/app-root/bin/portieris ./cmd/portieris RUN go version -m -v /opt/app-root/bin/portieris | (grep dep || true) | awk '{print "{\"Path\": \""$2 "\", \"Version\": \"" $3 "\"}"}' > /deps.jsonl -FROM registry.access.redhat.com/ubi8/go-toolset:1.21.11 AS installer +FROM registry.access.redhat.com/ubi8/go-toolset:1.21.13 AS installer ARG TARGETOS TARGETARCH USER root RUN yum update -y diff --git a/Makefile b/Makefile index 326e31a6..de54607a 100644 --- a/Makefile +++ b/Makefile @@ -1,7 +1,7 @@ GOFILES=$(shell find . -type f -name '*.go' -not -path "./code-generator/*" -not -path "./pkg/apis/*") GOPACKAGES=$(shell go list ./... | grep -v test/ | grep -v pkg/apis/) -VERSION=v0.13.18 +VERSION=v0.13.19 TAG=$(VERSION) GOTAGS='containers_image_openpgp' diff --git a/helm/portieris/Chart.yaml b/helm/portieris/Chart.yaml index 86c45f6b..6dfac6d0 100644 --- a/helm/portieris/Chart.yaml +++ b/helm/portieris/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v1 name: portieris -version: v0.13.18 +version: v0.13.19 description: Admission Controller webhook for enforcing image trust in your cluster maintainers: - name: Stuart Hayton diff --git a/helm/portieris/values.yaml b/helm/portieris/values.yaml index ee3a68a8..b08af69b 100644 --- a/helm/portieris/values.yaml +++ b/helm/portieris/values.yaml @@ -15,7 +15,7 @@ image: host: icr.io/portieris pullSecret: image: portieris - tag: v0.13.18 + tag: v0.13.19 pullPolicy: Always service: diff --git a/scripts/env.sh b/scripts/env.sh index e5c69a18..1fa2e8a0 100644 --- a/scripts/env.sh +++ b/scripts/env.sh @@ -2,8 +2,8 @@ export PORTIERIS_PULL_APIKEY= export PORTIERIS_TESTIMAGE_APIKEY= # charts to test -export VERSION=v0.13.18 -# image tag to test e.g. prep-v0.13.18 +export VERSION=v0.13.19 +# image tag to test e.g. prep-v0.13.19 export TAG= # name of the secret used to pull portieris made from $REG and $PORTIERIS_PULL_APIKEY