-
Notifications
You must be signed in to change notification settings - Fork 70
SANDBOX-1465: update kube & openshift dependencies to 4.20 #1226
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
84a1cb9
9e2d967
6dbba3f
8b45327
56eda52
627efdd
d3117d2
47c07cd
d7fa59c
0b868c4
60d4270
99dcd52
301e71e
17f7378
69fa444
a81a179
973b309
120a380
07d483c
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,61 +1 @@ | ||
| ignored-vulnerabilities: | ||
| # Panic when validating certificates with DSA public keys in crypto/x509 | ||
| # Found in: crypto/x509@go1.23.12 | ||
| # Fixed in: crypto/x509@go1.24.8 | ||
| - id: GO-2025-4013 | ||
| info: https://pkg.go.dev/vuln/GO-2025-4013 | ||
| silence-until: 2026-01-03 | ||
| # Lack of limit when parsing cookies can cause memory exhaustion in net/http | ||
| # Found in: net/http@go1.23.12 | ||
| # Fixed in: net/http@go1.24.8 | ||
| - id: GO-2025-4012 | ||
| info: https://pkg.go.dev/vuln/GO-2025-4012 | ||
| silence-until: 2026-01-03 | ||
| # Parsing DER payload can cause memory exhaustion in encoding/asn1 | ||
| # Found in: encoding/asn1@go1.23.12 | ||
| # Fixed in: encoding/asn1@go1.24.8 | ||
| - id: GO-2025-4011 | ||
| info: https://pkg.go.dev/vuln/GO-2025-4011 | ||
| silence-until: 2026-01-03 | ||
| # Insufficient validation of bracketed IPv6 hostnames in net/url | ||
| # Found in: net/url@go1.23.12 | ||
| # Fixed in: net/url@go1.24.8 | ||
| - id: GO-2025-4010 | ||
| info: https://pkg.go.dev/vuln/GO-2025-4010 | ||
| silence-until: 2026-01-03 | ||
| # Quadratic complexity when parsing some invalid inputs in encoding/pem | ||
| # Found in: encoding/pem@go1.23.12 | ||
| # Fixed in: encoding/pem@go1.24.8 | ||
| - id: GO-2025-4009 | ||
| info: https://pkg.go.dev/vuln/GO-2025-4009 | ||
| silence-until: 2026-01-03 | ||
| # ALPN negotiation error contains attacker controlled information in crypto/tls | ||
| # Found in: crypto/tls@go1.23.12 | ||
| # Fixed in: crypto/tls@go1.24.8 | ||
| - id: GO-2025-4008 | ||
| info: https://pkg.go.dev/vuln/GO-2025-4008 | ||
| silence-until: 2026-01-03 | ||
| # Quadratic complexity when checking name constraints in crypto/x509 | ||
| # Found in: crypto/x509@go1.23.12 | ||
| # Fixed in: crypto/x509@go1.24.9 | ||
| - id: GO-2025-4007 | ||
| info: https://pkg.go.dev/vuln/GO-2025-4007 | ||
| silence-until: 2026-01-03 | ||
| # Excessive CPU consumption in ParseAddress in net/mail | ||
| # Found in: net/mail@go1.23.12 | ||
| # Fixed in: net/mail@go1.24.8 | ||
| - id: GO-2025-4006 | ||
| info: https://pkg.go.dev/vuln/GO-2025-4006 | ||
| silence-until: 2026-01-03 | ||
| # Excessive resource consumption when printing error string for host certificate validation in crypto/x509 | ||
| # Found in: crypto/x509@go1.23.12 | ||
| # Fixed in: crypto/x509@go1.24.11 | ||
| - id: GO-2025-4155 | ||
| info: https://pkg.go.dev/vuln/GO-2025-4155 | ||
| silence-until: 2026-01-03 | ||
| # Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509 | ||
| # Found in: crypto/x509@go1.23.12 | ||
| # Fixed in: crypto/x509@go1.24.11 | ||
| - id: GO-2025-4175 | ||
| info: https://pkg.go.dev/vuln/GO-2025-4175 | ||
| silence-until: 2026-01-03 | ||
| ignored-vulnerabilities: [] |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -25,6 +25,7 @@ import ( | |
| murtest "github.com/codeready-toolchain/toolchain-common/pkg/test/masteruserrecord" | ||
| metricstest "github.com/codeready-toolchain/toolchain-common/pkg/test/metrics" | ||
|
|
||
| "github.com/stretchr/testify/assert" | ||
| "github.com/stretchr/testify/require" | ||
| corev1 "k8s.io/api/core/v1" | ||
| metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
|
|
@@ -224,8 +225,7 @@ func TestReconcile(t *testing.T) { | |
| res, err := r.Reconcile(context.TODO(), req) | ||
| // then | ||
| require.NoError(t, err) | ||
| require.False(t, res.Requeue, "requeue should not be set") | ||
| require.Equal(t, time.Duration(0), res.RequeueAfter, "requeueAfter should not be set") | ||
| assert.Empty(t, res.RequeueAfter, "requeueAfter should not be set") | ||
| assertThatUserSignupStateIsDeactivated(t, cl, username, false) | ||
| }) | ||
|
|
||
|
|
@@ -238,8 +238,7 @@ func TestReconcile(t *testing.T) { | |
| res, err := r.Reconcile(context.TODO(), req) | ||
| // then | ||
| require.NoError(t, err) | ||
| require.False(t, res.Requeue, "requeue should not be set") | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I guess we can also switch it to "assert.Empty(t, res.RequeueAfter)" as in other places.
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Since the below line has |
||
| require.Equal(t, time.Duration(0), res.RequeueAfter, "requeueAfter should not be set") | ||
| assert.Empty(t, res.RequeueAfter, "requeueAfter should not be set") | ||
| assertThatUserSignupStateIsDeactivated(t, cl, username, false) | ||
| }) | ||
|
|
||
|
|
@@ -283,8 +282,7 @@ func TestReconcile(t *testing.T) { | |
|
|
||
| // then | ||
| require.NoError(t, err) | ||
| require.False(t, res.Requeue, "requeue should not be set") | ||
| require.Equal(t, time.Duration(0), res.RequeueAfter, "requeueAfter should not be set") | ||
| assert.Empty(t, res.RequeueAfter, "requeueAfter should not be set") | ||
| assertThatUserSignupStateIsDeactivated(t, cl, username, false) | ||
|
|
||
| // Reload the userSignup | ||
|
|
@@ -332,7 +330,7 @@ func TestReconcile(t *testing.T) { | |
|
|
||
| // then | ||
| require.NoError(t, err) | ||
| require.False(t, res.Requeue) | ||
| assert.Empty(t, res.RequeueAfter) | ||
|
|
||
| // Reload the userSignup | ||
| require.NoError(t, cl.Get(context.TODO(), types.NamespacedName{Name: userSignupFoobar.Name, Namespace: operatorNamespace}, userSignupFoobar)) | ||
|
|
@@ -373,7 +371,7 @@ func TestReconcile(t *testing.T) { | |
|
|
||
| // then | ||
| require.NoError(t, err) | ||
| require.False(t, res.Requeue) | ||
| assert.Empty(t, res.RequeueAfter) | ||
|
|
||
| // Reload the userSignup | ||
| require.NoError(t, cl.Get(context.TODO(), types.NamespacedName{Name: userSignupFoobar.Name, Namespace: operatorNamespace}, userSignupFoobar)) | ||
|
|
@@ -428,7 +426,6 @@ func TestReconcile(t *testing.T) { | |
|
|
||
| // then | ||
| require.NoError(t, err) | ||
| require.False(t, res.Requeue) | ||
|
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I had to delete this check because if we replace to Since
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. it's because it's being set (we expect the requeue) - this is also verified in the following lines |
||
| // The RequeueAfter should be ~about 3 days... let's accept if it's within 1 hour of that | ||
| require.WithinDuration(t, time.Now().Add(time.Duration(72)*time.Hour), time.Now().Add(res.RequeueAfter), time.Duration(1)*time.Hour) | ||
|
|
||
|
|
@@ -466,7 +463,7 @@ func TestReconcile(t *testing.T) { | |
| res, err := r.Reconcile(context.TODO(), req) | ||
| // then | ||
| require.NoError(t, err) | ||
| require.False(t, res.Requeue) | ||
| assert.Empty(t, res.RequeueAfter) | ||
|
|
||
| // Reload the userSignup | ||
| require.NoError(t, cl.Get(context.TODO(), types.NamespacedName{Name: userSignupFoobar.Name, Namespace: operatorNamespace}, userSignupFoobar)) | ||
|
|
@@ -495,8 +492,7 @@ func TestReconcile(t *testing.T) { | |
| res, err := r.Reconcile(context.TODO(), req) | ||
| // then | ||
| require.NoError(t, err) | ||
| require.False(t, res.Requeue, "requeue should not be set") | ||
| require.Equal(t, time.Duration(0), res.RequeueAfter, "requeueAfter should not be set") | ||
| assert.Empty(t, res.RequeueAfter, "requeueAfter should not be set") | ||
| }) | ||
| }) | ||
| }) | ||
|
|
@@ -515,8 +511,7 @@ func TestReconcile(t *testing.T) { | |
| res, err := r.Reconcile(context.TODO(), req) | ||
| // then | ||
| require.NoError(t, err) | ||
| require.False(t, res.Requeue, "requeue should not be set") | ||
| require.Equal(t, time.Duration(0), res.RequeueAfter, "requeue should not be set") | ||
| assert.Empty(t, res.RequeueAfter, "requeue should not be set") | ||
| assertThatUserSignupStateIsDeactivated(t, cl, username, true) | ||
| metricstest.AssertMetricsCounterEquals(t, 1, metrics.UserSignupAutoDeactivatedTotal) | ||
| }) | ||
|
|
@@ -605,7 +600,7 @@ func TestReconcile(t *testing.T) { | |
|
|
||
| // then | ||
| require.NoError(t, err) | ||
| require.False(t, res.Requeue) // no requeue since user should not be auto deactivated | ||
| assert.Empty(t, res.RequeueAfter) // no requeue since user should not be auto deactivated | ||
|
|
||
| // Reload the userSignup | ||
| require.NoError(t, cl.Get(context.TODO(), types.NamespacedName{Name: userSignupFoobar.Name, Namespace: operatorNamespace}, userSignupFoobar)) | ||
|
|
@@ -625,7 +620,7 @@ func TestReconcile(t *testing.T) { | |
|
|
||
| // The scheduled deactivation time should now be set to nil | ||
| require.Nil(t, userSignupFoobar.Status.ScheduledDeactivationTimestamp) | ||
| require.False(t, res.Requeue) | ||
| assert.Empty(t, res.RequeueAfter) | ||
| }) | ||
| }) | ||
|
|
||
|
|
@@ -724,8 +719,7 @@ func TestReconcile(t *testing.T) { | |
| // then | ||
| require.Error(t, err) | ||
| require.Contains(t, err.Error(), "usersignup get error") | ||
| require.False(t, res.Requeue, "requeue should not be set") | ||
| require.Equal(t, time.Duration(0), res.RequeueAfter, "requeueAfter should not be set") | ||
| assert.Empty(t, res.RequeueAfter, "requeueAfter should not be set") | ||
| }) | ||
|
|
||
| // cannot update UserSignup | ||
|
|
@@ -757,8 +751,7 @@ func TestReconcile(t *testing.T) { | |
| // then | ||
| require.Error(t, err) | ||
| require.Contains(t, err.Error(), "usersignup update error") | ||
| require.False(t, res.Requeue, "requeue should not be set") | ||
| require.Equal(t, time.Duration(0), res.RequeueAfter, "requeueAfter should not be set") | ||
| assert.Empty(t, res.RequeueAfter, "requeueAfter should not be set") | ||
| assertThatUserSignupStateIsDeactivated(t, cl, username, false) | ||
| }) | ||
| }) | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm curios why we need to remove it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
result.Requeueis deprecated