Configbump update #23378
Labels
area/gateway
severity/P1
Has a major impact to usage or development of the system.
team/A
This team is responsible for the Che Operator and all its operands as well as chectl and Hosted Che
Running trivy image for the configbump:v7.99.0 it comes out that we have 42 vulnerabilities (4 Critical, 17 High and 21 Medium)
The majority of these are because you use old versions of go modules.
A suggestion can be running
go get -u=patch ./...
to update modules without breaking changes to the latest version and building a new version of the image.
Doing so, the vulnerabilities will be consistently reduced to only 5 vulns.
Is it possible to have this type of patch?
The text was updated successfully, but these errors were encountered: