Hi there ,
First off , Nice work on the new release and at the looks of it , a new form to disccuss about the package.
Dont want to sound like the party crasher, but how can we make the process of bumping some packages even smoother.
I am using prisma cloud for container scanning so I,ll point out 4 vulnerabilities that it found for this 1.8.0 releaase
"sha256:ea299dd31352594c776cf1527b319fe3afb4b535bd9ba1e005a28983edf66330"
Vulnerabilities
- go version 1.20.1 has 8 vulnerabilities - all are fixed in 1.20.4
- openssl (used in libssl3, libcrypto3, openssl) version 3.1.0-r4 has 1 vulnerability - Fixed in: 3.1.1-r0
Compliance
- Private keys stored in image
Found:
/etc/ingress-controller/ssl/default-fake-certificate.pem,
/etc/ingress-controller/ssl/primary-ingress-primary-default-ssl.pem,
/etc/nginx/lua/test/fixtures/default-cert.pem,
/etc/nginx/lua/test/fixtures/example-com-cert.pem
I know that those are placeholder certs, but it looks like not the best way from a compliance standpoint, keys should be mounted on runtime instead of baking them in the image.
I would argue that there are allot of easy version bump releases, if the proccess can improve on that.
Not that I know what to do, hence asking as an open question
Thnx
Igor