Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Bump kube-webhook-certgen to 1.4.4 #2935

Merged
merged 5 commits into from
Dec 17, 2024
Merged

Conversation

ArvinderPal09
Copy link
Contributor

@ArvinderPal09 ArvinderPal09 commented Dec 10, 2024

What problem does this PR solve?:
Bumps webhook certgen version to 1.4.4

Which issue(s) does this PR fix?:
https://jira.nutanix.com/browse/NCN-104606

Special notes for your reviewer:
arvinder.pal@GHH4XN27GC kommander-applications % git checkout webhook-certgen-1.4.4
branch 'webhook-certgen-1.4.4' set up to track 'origin/webhook-certgen-1.4.4'.
Switched to a new branch 'webhook-certgen-1.4.4'
arvinder.pal@GHH4XN27GC kommander-applications % trivy i registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.4
2024-12-10T18:28:30+05:30 INFO [db] Need to update DB
2024-12-10T18:28:30+05:30 INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
57.28 MiB / 57.28 MiB [-----------------------------------------------------------------------] 100.00% 3.17 MiB p/s 18s
2024-12-10T18:28:50+05:30 INFO [vuln] Vulnerability scanning is enabled
2024-12-10T18:28:50+05:30 INFO [secret] Secret scanning is enabled
2024-12-10T18:28:50+05:30 INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-12-10T18:28:50+05:30 INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-12-10T18:28:51+05:30 INFO Detected OS family="debian" version="12.7"
2024-12-10T18:28:51+05:30 INFO [debian] Detecting vulnerabilities... os_version="12" pkg_num=3
2024-12-10T18:28:51+05:30 INFO Number of language-specific files num=1
2024-12-10T18:28:51+05:30 INFO [gobinary] Detecting vulnerabilities...

registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.4 (debian 12.7)

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

@github-actions github-actions bot added size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. services/kube-prometheus-stack and removed size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Dec 10, 2024
@mesosphere-ci mesosphere-ci added ok-to-test Signals mergebot that CI checks are ready to be kicked off do-not-merge/testing Do not merge because there is still on-going testing open-kommander-pr Automatically triggers the creation of a PR in Kommander repo update-licenses signals mergebot to update licenses.d2iq.yaml labels Dec 10, 2024
Copy link
Contributor

✅ Created Kommander branch to test kommander-applications changes: https://github.com/mesosphere/kommander/tree/kapps/main/webhook-certgen-1.4.4

@coveralls
Copy link

coveralls commented Dec 10, 2024

Pull Request Test Coverage Report for Build 12351001904

Details

  • 0 of 0 changed or added relevant lines in 0 files are covered.
  • No unchanged relevant lines lost coverage.
  • Overall coverage remained the same at 51.703%

Totals Coverage Status
Change from base Build 12296678219: 0.0%
Covered Lines: 167
Relevant Lines: 323

💛 - Coveralls

@github-actions github-actions bot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Dec 16, 2024
@ArvinderPal09 ArvinderPal09 requested review from mhrabovcin and removed request for mhrabovcin December 16, 2024 10:53
@mhrabovcin mhrabovcin merged commit a0d53c2 into main Dec 17, 2024
27 checks passed
@mhrabovcin mhrabovcin deleted the webhook-certgen-1.4.4 branch December 17, 2024 12:21
rohitkumar0510 pushed a commit that referenced this pull request Feb 5, 2025
* feat: Bump kube-webhook-certgen to 1.4.4

* feat: kube-webhook-cretgen bump 1.4.4

* feat: kube-webhook-certgen 1.4.4

* feat: kube-webhook-cretgen bump 1.4.4

* feat: kube-webhook-cretgen bump 1.4.4
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
do-not-merge/testing Do not merge because there is still on-going testing ok-to-test Signals mergebot that CI checks are ready to be kicked off open-kommander-pr Automatically triggers the creation of a PR in Kommander repo ready-for-review services/kube-prometheus-stack size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. update-licenses signals mergebot to update licenses.d2iq.yaml
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants