Skip to content

Conversation

@spowelljr
Copy link
Member

@spowelljr spowelljr commented Nov 23, 2022

Closes #11107
Closes #15086

Problem:
Original image was k8s.gcr.io/echoserver:1.4 but it didn't work on arm64.

Updated image to nginx:1.23 but it wasn't an echo-server, just displayed the nginx welcome screen.

Added image ealen/echo-server:0.7.0 to ingress tutorial, but image has a critical CVE.

✗ Critical severity vulnerability found in zlib/zlib Description: Out-of-bounds Write Info: https://security.snyk.io/vuln/SNYK-ALPINE316-ZLIB-2976176 Introduced through: zlib/zlib@1.2.12-r1, apk-tools/apk-tools@2.12.9-r3 From: zlib/zlib@1.2.12-r1 From: apk-tools/apk-tools@2.12.9-r3 > zlib/zlib@1.2.12-r1 Fixed in: 1.2.12-r2 

Solution:
Updated all references to kicbase/echo-server:1.0

  • Image works on both amd64 & arm64
  • Image is a true echo-server
Request served by hello-minikube-564c59b4dd-4tch4 HTTP/1.1 GET /test123 Host: 192.168.105.34:31791 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Connection: keep-alive Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36 
  • Image has no CVEs
Testing kicbase/echo-server:1.0... Package manager: linux Project name: docker-image|kicbase/echo-server Docker image: kicbase/echo-server:1.0 Platform: linux/arm64 Licenses: enabled ✔ Tested kicbase/echo-server:1.0 for known issues, no vulnerable paths found. Note that we do not currently have vulnerability data for your image. ------------------------------------------------------- Testing kicbase/echo-server:1.0... Package manager: gomodules Target file: /bin/echo-server Project name: github.com/jmalloc/echo-server Docker image: kicbase/echo-server:1.0 Licenses: enabled ✔ Tested 9 dependencies for known issues, no vulnerable paths found. Tested 2 projects, no vulnerable paths were found. 
@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/M Denotes a PR that changes 30-99 lines, ignoring generated files. labels Nov 23, 2022
@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Nov 23, 2022
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: medyagh, spowelljr

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.

3 participants