-
Notifications
You must be signed in to change notification settings - Fork 448
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCPTOOLS-525, OCPTOOLS-535, OCPTOOLS-527: Bump Jenkins and plugins #1878
base: master
Are you sure you want to change the base?
Conversation
@k37y: This pull request references OCPTOOLS-525 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the vulnerability to target the "4.19.0" version, but no target version was set. This pull request references OCPTOOLS-535 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the vulnerability to target the "4.19.0" version, but no target version was set. This pull request references OCPTOOLS-527 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the vulnerability to target the "4.19.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/test e2e-aws-jenkins-client-plugin |
/retest |
- Bump jenkins version from 2.462.3 to 2.479.3 to mitigate CVE-2024-47072 Signed-off-by: Vinu K [email protected]
4ab6d59
to
5a7254e
Compare
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: k37y The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@k37y: This pull request references OCPTOOLS-525 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the vulnerability to target the "4.19.0" version, but no target version was set. This pull request references OCPTOOLS-535 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the vulnerability to target the "4.19.0" version, but no target version was set. This pull request references OCPTOOLS-527 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the vulnerability to target the "4.19.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/retest |
- Bump workflow-cps to mitigate CVE-2024-52550 - Bump pipeline-model-definition to mitigate CVE-2024-52551 - Bump plugins to fix the compatibility issue of openshift/jenkins-sync-plugin/pull/490 Signed-off-by: Vinu K <[email protected]>
5a7254e
to
94a9d64
Compare
@k37y: This pull request references OCPTOOLS-525 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the vulnerability to target the "4.19.0" version, but no target version was set. This pull request references OCPTOOLS-535 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the vulnerability to target the "4.19.0" version, but no target version was set. This pull request references OCPTOOLS-527 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the vulnerability to target the "4.19.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/test e2e-aws-jenkins-sync-plugin |
1 similar comment
/test e2e-aws-jenkins-sync-plugin |
@k37y: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
jenkins
version from2.462.3
to2.479.3
to mitigate CVE-2024-47072workflow-cps
to mitigate CVE-2024-52550pipeline-model-definition
to mitigate CVE-2024-52551