Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cut a new release of this provider #327

Closed
1 task done
aochsner opened this issue May 24, 2024 · 6 comments
Closed
1 task done

Cut a new release of this provider #327

aochsner opened this issue May 24, 2024 · 6 comments
Labels
enhancement New feature or request

Comments

@aochsner
Copy link

Terraform CLI and Provider Versions

1.8.4 & 0.11.1

Use Cases or Problem Statement

https://discuss.hashicorp.com/t/cut-a-new-hashicorp-time-provider-release/67314

Proposal

I'm not sure if this is the right place but also posted in the discussion forums.

How much impact is this issue causing?

High

Additional Information

No response

Code of Conduct

  • I agree to follow this project's Code of Conduct
@aochsner aochsner added the enhancement New feature or request label May 24, 2024
@austinvalle
Copy link
Member

Hey there @aochsner 👋🏻 , do you mind sharing the reports or the dependencies related to the CVEs? We can push a new release with no functional changes but want to ensure we're resolving the CVEs you're seeing.

@austinvalle austinvalle added the waiting-response Issues or pull requests waiting for an external response label May 24, 2024
@aochsner
Copy link
Author

aochsner commented May 24, 2024 via email

@github-actions github-actions bot removed the waiting-response Issues or pull requests waiting for an external response label May 24, 2024
@aochsner
Copy link
Author

SCR-20240524-lhrz

@bflad
Copy link
Contributor

bflad commented May 24, 2024

Hi @aochsner 👋 (and other future readers),

Thanks for that additional context. I'm not on the HashiCorp security team, but I wanted to give some additional information about this particular scanner report. For official security disclosures/responses from the security team, please refer to https://www.hashicorp.com/trust/security.

The github.com/go-git/go-git/v5 dependency in this provider codebase is not in the "production" provider server codepath, but is pulled in due some underlying capabilities of the provider testing library so that it can potentially build Terraform from a specific Git reference when a specific environment variable is passed while running the provider testing.

$ ❯ go mod why -m 'github.com/go-git/go-git/v5'
# github.com/go-git/go-git/v5
github.com/hashicorp/terraform-provider-time/internal/provider
github.com/hashicorp/terraform-provider-time/internal/provider.test
github.com/hashicorp/terraform-plugin-testing/helper/resource
github.com/hashicorp/terraform-exec/tfexec
github.com/hashicorp/terraform-exec/tfexec.test
github.com/hashicorp/terraform-exec/tfexec/internal/testutil
github.com/hashicorp/hc-install/build
github.com/go-git/go-git/v5

Unfortunately a lot of security scanners cannot have code-level context on why or how a dependency is being used or not, but the reality is that many compliance officers need to rely these reports as given. So for anyone who may see references to this dependency or CVE number in relation to this provider codebase (and potentially others in the provider ecosystem), I just wanted to help alleviate any sort of urgency to upgrade. I have created hashicorp/terraform-plugin-testing#347 in the provider testing Go module to consider removing the functionality that causes this dependency to appear in provider codebases to reduce security scanning reports like these.

As @austinvalle mentioned though, we can/will cut a fresh provider release to help remove this particular scanner report for now. 👍

@aochsner
Copy link
Author

Hi @bflad!

Thanks for that explanation; it makes a lot of sense. This would probably be enough justification for an exception TBH, but sounds like a new release will also happen which will probably be easier to get through than the exception route. But if anything new pops up I will look to y'all for that sort of context if needed.

Appreciate the quick responses!
Thanks!

@austinvalle
Copy link
Member

austinvalle commented May 28, 2024

v0.11.2 has been released with the latest Go module updates and should show up in the registry soon 👍🏻

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Jun 28, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants