-
Notifications
You must be signed in to change notification settings - Fork 326
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
suppressing vulnerability GO-2022-0635 for release #4460
Conversation
preparing for release 1.1.18 and updated golang.org/x/net dependency to 0.34.0 to fix vulnerability https://pkg.go.dev/vuln/GO-2024-3333 in CNI, acceptance and control-plane submodule.
// newfakeServerClient returns a fakeServerClient to be used in tests to communicate with the fake Telemetry Gateway. | ||
func newfakeServerClient(tunnel string) *fakeServerClient { | ||
tr := &http.Transport{ | ||
TLSClientConfig: &tls.Config{InsecureSkipVerify: true}, |
Check warning
Code scanning / Go Modules Scanner
TLS configuration is insecure Warning test
seconds, _ = strconv.Atoi(v) | ||
} | ||
if seconds > 0 { | ||
return int32(seconds) |
Check warning
Code scanning / Go Modules Scanner
String conversion integer overflow Warning
Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement Learn more about why HashiCorp requires a CLA and what the CLA includes 10 out of 11 committers have signed the CLA.
Chris S. Kim seems not to be a GitHub user. Have you signed the CLA already but the status is still pending? Recheck it. |
Changes proposed in this PR
How I've tested this PR
How I expect reviewers to test this PR
Checklist