Commit Graph

23 Commits

Author SHA1 Message Date
Zach Wasserman
c136b3bdfa
Update Fleet library versions used in Sandbox (#10230) 2023-03-01 15:22:14 -05:00
dependabot[bot]
37c9097ac0
Bump github.com/open-policy-agent/opa from 0.42.0 to 0.43.1 in /infrastructure/sandbox/JITProvisioner/lambda (#10225)
Bumps
[github.com/open-policy-agent/opa](https://github.com/open-policy-agent/opa)
from 0.42.0 to 0.43.1.
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/open-policy-agent/opa/releases">github.com/open-policy-agent/opa's
releases</a>.</em></p>
<blockquote>
<h2>v0.43.1</h2>
<p>This is a security release fixing the following vulnerabilities:</p>
<ul>
<li>
<p>CVE-2022-36085: Respect unsafeBuiltinMap for 'with' replacements in
the compiler</p>
<p>See <a
href="https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr">https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr</a>
for all details.</p>
</li>
<li>
<p>CVE-2022-27664 and CVE-2022-32190.</p>
<p>Fixed by updating the Go version used in our builds to 1.18.6,
see <a
href="https://groups.google.com/g/golang-announce/c/x49AQzIVX-s">https://groups.google.com/g/golang-announce/c/x49AQzIVX-s</a>.
Note that CVE-2022-32190 is most likely not relevant for OPA's usage of
net/url.
But since these CVEs tend to come up in security assessment tooling
regardless,
it's better to get it out of the way.</p>
</li>
</ul>
<h2>v0.43.0</h2>
<p>This release contains a number of fixes, enhancements, and
performance improvements.</p>
<h3>Object Insertion Optimization</h3>
<p>Rego Object insertion operations did not scale linearly (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4625">#4625</a>)
in the past, and experienced noticeable reallocation/memory movement
overheads once the Object grew past 120k-150k keys in size.</p>
<p>This release introduces different handling of Object internals during
insert operations to avoid pathological reallocation behavior, and
allows linear performance scaling up into the 500k key range and
beyond.</p>
<h3>Tooling, SDK, and Runtime</h3>
<ul>
<li>Add lines covered/not covered counts to test coverage report
(authored by <a
href="https://github.com/FarisR99"><code>@​FarisR99</code></a>)</li>
<li>Plugins: Status and logs plugins now accept any HTTP 2xx status code
(authored by <a
href="https://github.com/lvisterin"><code>@​lvisterin</code></a>)</li>
<li>Runtime: Generalize OS check for MacOS to other Unix-likes (authored
by <a href="https://github.com/iamleot"><code>@​iamleot</code></a>)</li>
</ul>
<h4>Bundles Fixes</h4>
<p>The Bundles system received several bugfixes and performance
improvements in this release:</p>
<ul>
<li>Bundle: <code>opa bundle</code> command now supports
<code>.yml</code> files (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4859">#4859</a>)
authored by <a
href="https://github.com/Joffref"><code>@​Joffref</code></a> reported by
<a
href="https://github.com/rdrgmnzsakt"><code>@​rdrgmnzsakt</code></a></li>
<li>Plugins/Bundle: Use unique temporary files for persisting activated
bundles to disk (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4782">#4782</a>)
authored by <a
href="https://github.com/FredrikAppelros"><code>@​FredrikAppelros</code></a>
reported by <a
href="https://github.com/FredrikAppelros"><code>@​FredrikAppelros</code></a></li>
<li>Server: Old policy path is now checked for bundle ownership before
update (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4846">#4846</a>)</li>
<li>Storage+Bundle: Old bundle data is now cleaned before new bundle
activation (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4940">#4940</a>)</li>
<li>Bundle: Paths are now normalized before bundle root check occurs to
ensure checks are os-independent</li>
</ul>
<h4>Storage Fixes</h4>
<p>The Storage system received mostly bugfixes, with a notable
performance improvement for large bundles in this release:</p>
<ul>
<li>storage/inmem: Speed up bundle activation by avoiding unnecessary
read operations (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4898">#4898</a>)</li>
<li>storage/inmem: Paths are now created during truncate operations if
they did not exist before</li>
<li>storage/disk: Symlinks work with relative paths now (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4869">#4869</a>)</li>
</ul>
<h3>Rego and Topdown</h3>
<!-- raw HTML omitted -->
</blockquote>
<p>... (truncated)</p>
</details>
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/open-policy-agent/opa/blob/main/CHANGELOG.md">github.com/open-policy-agent/opa's
changelog</a>.</em></p>
<blockquote>
<h2>0.43.1</h2>
<p>This is a security release fixing the following vulnerabilities:</p>
<ul>
<li>
<p>CVE-2022-36085: Respect unsafeBuiltinMap for 'with' replacements in
the compiler</p>
<p>See <a
href="https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr">https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr</a>
for all details.</p>
</li>
<li>
<p>CVE-2022-27664 and CVE-2022-32190.</p>
<p>Fixed by updating the Go version used in our builds to 1.18.6,
see <a
href="https://groups.google.com/g/golang-announce/c/x49AQzIVX-s">https://groups.google.com/g/golang-announce/c/x49AQzIVX-s</a>.
Note that CVE-2022-32190 is most likely not relevant for OPA's usage of
net/url.
But since these CVEs tend to come up in security assessment tooling
regardless,
it's better to get it out of the way.</p>
</li>
</ul>
<h2>0.43.0</h2>
<p>This release contains a number of fixes, enhancements, and
performance improvements.</p>
<h3>Object Insertion Optimization</h3>
<p>Rego Object insertion operations did not scale linearly (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4625">#4625</a>)
in the past, and experienced noticeable reallocation/memory movement
overheads once the Object grew past 120k-150k keys in size.</p>
<p>This release introduces different handling of Object internals during
insert
operations to avoid pathological reallocation behavior, and allows
linear
performance scaling up into the 500k key range and beyond.</p>
<h3>Tooling, SDK, and Runtime</h3>
<ul>
<li>Add lines covered/not covered counts to test coverage report
(authored by <a
href="https://github.com/FarisR99"><code>@​FarisR99</code></a>)</li>
<li>Plugins: Status and logs plugins now accept any HTTP 2xx status code
(authored by <a
href="https://github.com/lvisterin"><code>@​lvisterin</code></a>)</li>
<li>Runtime: Generalize OS check for MacOS to other Unix-likes (authored
by <a href="https://github.com/iamleot"><code>@​iamleot</code></a>)</li>
</ul>
<h4>Bundles Fixes</h4>
<p>The Bundles system received several bugfixes and performance
improvements in this release:</p>
<ul>
<li>Bundle: <code>opa bundle</code> command now supports
<code>.yml</code> files (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4859">#4859</a>)
authored by <a
href="https://github.com/Joffref"><code>@​Joffref</code></a> reported by
<a
href="https://github.com/rdrgmnzsakt"><code>@​rdrgmnzsakt</code></a></li>
<li>Plugins/Bundle: Use unique temporary files for persisting activated
bundles to disk (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4782">#4782</a>)
authored by <a
href="https://github.com/FredrikAppelros"><code>@​FredrikAppelros</code></a>
reported by <a
href="https://github.com/FredrikAppelros"><code>@​FredrikAppelros</code></a></li>
<li>Server: Old policy path is now checked for bundle ownership before
update (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4846">#4846</a>)</li>
<li>Storage+Bundle: Old bundle data is now cleaned before new bundle
activation (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4940">#4940</a>)</li>
<li>Bundle: Paths are now normalized before bundle root check occurs to
ensure checks are os-independent</li>
</ul>
<h4>Storage Fixes</h4>
<p>The Storage system received mostly bugfixes, with a notable
performance improvement for large bundles in this release:</p>
<ul>
<li>storage/inmem: Speed up bundle activation by avoiding unnecessary
read operations (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4898">#4898</a>)</li>
</ul>
<!-- raw HTML omitted -->
</blockquote>
<p>... (truncated)</p>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="196c92df8b"><code>196c92d</code></a>
Release v0.43.1</li>
<li><a
href="3e8c754ed0"><code>3e8c754</code></a>
ast/compile: respect unsafeBuiltinMap for 'with' replacements</li>
<li><a
href="b78756fa64"><code>b78756f</code></a>
build: bump golang: 1.18 -&gt; 1.18.6</li>
<li><a
href="d75bbdd0f9"><code>d75bbdd</code></a>
Prepare v0.43.0 release (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4949">#4949</a>)</li>
<li><a
href="a99e5a9aa6"><code>a99e5a9</code></a>
docs: add warning about importing 'future.keywords' (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4947">#4947</a>)</li>
<li><a
href="8f63046fb9"><code>8f63046</code></a>
storage+bundle: Clean old bundle data before new activation (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4944">#4944</a>)</li>
<li><a
href="462d51850c"><code>462d518</code></a>
docs: Add note about counter_server_query_cache_hit metric (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4946">#4946</a>)</li>
<li><a
href="eff91f755c"><code>eff91f7</code></a>
build(deps): bump aquasecurity/trivy-action from 0.6.0 to 0.6.1 (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4941">#4941</a>)</li>
<li><a
href="1c1957c57b"><code>1c1957c</code></a>
topdown/copypropagation: keep refs into livevars (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4936">#4936</a>)</li>
<li><a
href="7f78653f9c"><code>7f78653</code></a>
build: run 'make generate' in release container (<a
href="https://github-redirect.dependabot.com/open-policy-agent/opa/issues/4934">#4934</a>)</li>
<li>Additional commits viewable in <a
href="https://github.com/open-policy-agent/opa/compare/v0.42.0...v0.43.1">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=github.com/open-policy-agent/opa&package-manager=go_modules&previous-version=0.42.0&new-version=0.43.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after
your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge
and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating
it. You can achieve the same result by closing it manually
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the
[Security Alerts page](https://github.com/fleetdm/fleet/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-03-01 11:43:58 -08:00
dependabot[bot]
1a73517a7f
Bump github.com/russellhaering/goxmldsig from 1.1.0 to 1.1.1 in /infrastructure/sandbox/JITProvisioner/lambda (#10224)
Bumps
[github.com/russellhaering/goxmldsig](https://github.com/russellhaering/goxmldsig)
from 1.1.0 to 1.1.1.
<details>
<summary>Commits</summary>
<ul>
<li><a
href="dfbd95396a"><code>dfbd953</code></a>
Bump Go versions in Travis</li>
<li><a
href="65601c817d"><code>65601c8</code></a>
Update dependencies</li>
<li><a
href="fb23e0af61"><code>fb23e0a</code></a>
Merge pull request <a
href="https://github-redirect.dependabot.com/russellhaering/goxmldsig/issues/71">#71</a>
from aporcupine/patch-1</li>
<li><a
href="ca2b448c7d"><code>ca2b448</code></a>
Explicitly check for case where SignatureValue is nil</li>
<li><a
href="3541f5e554"><code>3541f5e</code></a>
Merge pull request <a
href="https://github-redirect.dependabot.com/russellhaering/goxmldsig/issues/67">#67</a>
from santosh653/master</li>
<li><a
href="735e3c720c"><code>735e3c7</code></a>
Update .travis.yml</li>
<li><a
href="d6a59c7d76"><code>d6a59c7</code></a>
Update .travis.yml</li>
<li><a
href="add80e26e1"><code>add80e2</code></a>
Update .travis.yml</li>
<li><a
href="0bf1c10130"><code>0bf1c10</code></a>
Merge pull request <a
href="https://github-redirect.dependabot.com/russellhaering/goxmldsig/issues/61">#61</a>
from pboyd04/UseCanonicalizationFromSigInfo</li>
<li><a
href="d396ec6179"><code>d396ec6</code></a>
Merge pull request <a
href="https://github-redirect.dependabot.com/russellhaering/goxmldsig/issues/39">#39</a>
from aykevl/fixes</li>
<li>Additional commits viewable in <a
href="https://github.com/russellhaering/goxmldsig/compare/v1.1.0...v1.1.1">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=github.com/russellhaering/goxmldsig&package-manager=go_modules&previous-version=1.1.0&new-version=1.1.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after
your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge
and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating
it. You can achieve the same result by closing it manually
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the
[Security Alerts page](https://github.com/fleetdm/fleet/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-03-01 11:43:35 -08:00
StepSecurity Bot
fb152b9114
Pin image SHA in Dockerfiles (#10205)
## Summary

This pull request is created by [Secure
Repo](https://app.stepsecurity.io/securerepo) at the request of @zwass.
Please merge the Pull Request to incorporate the requested changes.
Please tag @zwass on your message if you have any questions related to
the PR. You can also engage with the
[StepSecurity](https://github.com/step-security) team by tagging
@step-security-bot.

## Security Fixes

### Secure Dockerfiles

Pin image tags to digests in Dockerfiles. With the Docker v2 API
release, it became possible to use digests in place of tags when pulling
images or to use them in FROM lines in Dockerfiles.

- [The Open Source Security Foundation (OpenSSF) Security
Guide](https://github.com/ossf/scorecard/blob/main/docs/checks.md#pinned-dependencies)


## Feedback
For bug reports, feature requests, and general feedback; please create
an issue in
[step-security/secure-repo](https://github.com/step-security/secure-repo).
To create such PRs, please visit https://app.stepsecurity.io/securerepo.


Signed-off-by: StepSecurity Bot <bot@stepsecurity.io>

---------

Signed-off-by: StepSecurity Bot <bot@stepsecurity.io>
Co-authored-by: Zach Wasserman <zach@fleetdm.com>
2023-03-01 11:37:00 -08:00
dependabot[bot]
8dc9c15bc6
Bump golang.org/x/net from 0.0.0-20220722155237-a158d28d115b to 0.7.0 in /infrastructure/sandbox/JITProvisioner/lambda (#10154)
Bumps [golang.org/x/net](https://github.com/golang/net) from
0.0.0-20220722155237-a158d28d115b to 0.7.0.
<details>
<summary>Commits</summary>
<ul>
<li>See full diff in <a
href="https://github.com/golang/net/commits/v0.7.0">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=golang.org/x/net&package-manager=go_modules&previous-version=0.0.0-20220722155237-a158d28d115b&new-version=0.7.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after
your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge
and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating
it. You can achieve the same result by closing it manually
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the
[Security Alerts page](https://github.com/fleetdm/fleet/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-02-28 09:39:28 -08:00
dependabot[bot]
c067302c2c
Bump golang.org/x/sys from 0.0.0-20220227234510-4e6760a101f9 to 0.1.0 in /infrastructure/sandbox/JITProvisioner/deprovisioner (#10109)
Bumps [golang.org/x/sys](https://github.com/golang/sys) from
0.0.0-20220227234510-4e6760a101f9 to 0.1.0.
<details>
<summary>Commits</summary>
<ul>
<li>See full diff in <a
href="https://github.com/golang/sys/commits/v0.1.0">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=golang.org/x/sys&package-manager=go_modules&previous-version=0.0.0-20220227234510-4e6760a101f9&new-version=0.1.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after
your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge
and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating
it. You can achieve the same result by closing it manually
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the
[Security Alerts page](https://github.com/fleetdm/fleet/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-02-27 18:11:30 -08:00
dependabot[bot]
6bf80ef23e
Bump golang.org/x/text from 0.3.7 to 0.3.8 in /infrastructure/sandbox/JITProvisioner/lambda (#10049)
[//]: # (dependabot-start)
⚠️  **Dependabot is rebasing this PR** ⚠️ 

Rebasing might not happen immediately, so don't worry if this takes some
time.

Note: if you make any changes to this PR yourself, they will take
precedence over the rebase.

---

[//]: # (dependabot-end)

Bumps [golang.org/x/text](https://github.com/golang/text) from 0.3.7 to
0.3.8.
<details>
<summary>Commits</summary>
<ul>
<li><a
href="434eadcdbc"><code>434eadc</code></a>
language: reject excessively large Accept-Language strings</li>
<li><a
href="23407e72ed"><code>23407e7</code></a>
go.mod: ignore cyclic dependency for tagging</li>
<li><a
href="b18d3dd8a4"><code>b18d3dd</code></a>
secure/precis: replace bytes.Compare with bytes.Equal</li>
<li><a
href="795e854ff3"><code>795e854</code></a>
all: replace io/ioutil with io and os package</li>
<li><a
href="b0ca10ff35"><code>b0ca10f</code></a>
internal/language: bump script types to uint16 and update registry</li>
<li><a
href="ba9b0e1d4b"><code>ba9b0e1</code></a>
go.mod: update x/tools to HEAD</li>
<li><a
href="d03b418000"><code>d03b418</code></a>
A+C: delete AUTHORS and CONTRIBUTORS</li>
<li><a
href="b4bca84b03"><code>b4bca84</code></a>
language/display: fix Tag method comment</li>
<li><a
href="ea49e3e2d5"><code>ea49e3e</code></a>
go.mod: update x/tools to HEAD</li>
<li><a
href="78819d01d0"><code>78819d0</code></a>
go.mod: update to golang.org/x/text v0.1.10</li>
<li>Additional commits viewable in <a
href="https://github.com/golang/text/compare/v0.3.7...v0.3.8">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=golang.org/x/text&package-manager=go_modules&previous-version=0.3.7&new-version=0.3.8)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after
your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge
and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating
it. You can achieve the same result by closing it manually
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the
[Security Alerts page](https://github.com/fleetdm/fleet/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-02-27 18:10:29 -08:00
Robert Fairburn
3bdbce10c6
Reduce queued instances and improve update_unclaimed script (#9343)
Reduce queued instances to 10 for sandbox from 20 and make the
update_unclaimed script aware of it and improve checking.
2023-01-16 14:09:37 -06:00
Zachary Winnerman
114e97ba6c
Make code match what we are running in prod for sandbox timeout (#9169) 2023-01-03 19:37:19 -05:00
Tomas Touceda
71dbb71df4
Update go to 1.19.4 (#8945)
* Update go to 1.19.4

* Comment out failing package test

* Comment out ALL the packaging tests for windows for the moment

* Update go to 1.19.4

* Comment out failing package test

* Comment out ALL the packaging tests for windows for the moment

* Update changelog

* Bump versions

* Update changelog to reflect this being a security release
2022-12-09 11:47:17 -03:00
Robert Fairburn
5d7900b388
Add scripts to update sandbox easier (#8700)
* Add scripts to update sandbox easier

* Sort unclaimed instances in cleanup tool

* Sandbox readme update
2022-11-16 13:30:01 -06:00
Zach Wasserman
efbe4c0777
Update Go to 1.19.3 (#8525) (#8614)
Co-authored-by: Tomas Touceda <chiiph@gmail.com>
2022-11-08 13:03:23 -03:00
Zachary Winnerman
eeba487ea4
Add changes to clear activities table in sandbox (#7723)
* Add changes to clear activities table in sandbox

* fixup

* fixup

* fixup

* Finished testing in dev

* fixup

* fixup
2022-09-16 15:59:57 -04:00
Tomas Touceda
8457e55b53
Bump go to 1.19.1 (#7690)
* Bump go to 1.19.1

* Bump remaining go-version to the 1.19.1

* Add extra paths for test-go

* Oops, putting the right path in the right place

* gofmt file

* gofmt ALL THE THINGS

* Moar changes

* Actually, go.mod doesn't like minor versions
2022-09-12 20:32:43 -03:00
Zachary Winnerman
369c976e82
Quick sandbox fixup (#7386) 2022-08-24 11:49:39 -05:00
Zachary Winnerman
1d83b2610c
Delete now defunct workspaces (#7322) 2022-08-19 18:27:05 +00:00
Robert Fairburn
69c8eb088e
SandboxProd SSO access to EKS (#7172)
* SandboxProd SSO access to EKS

* Sandbox docker platform = linux/amd64

* Shorten SSO role ARN for EKS
2022-08-16 13:16:48 -05:00
dependabot[bot]
6f0e0873ca
Bump golang from 1.18.4-bullseye to 1.19.0-bullseye (#7039)
* Bump golang from 1.18.4-bullseye to 1.19.0-bullseye

Bumps golang from 1.18.4-bullseye to 1.19.0-bullseye.

---
updated-dependencies:
- dependency-name: golang
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

* Update other golang deps as well

* Update missing go mods

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Tomas Touceda <chiiph@gmail.com>
2022-08-10 17:00:01 -03:00
Zachary Winnerman
f1d76d7e24
Testing applying basic config to sandbox instances (#7105)
* Testing applying basic config to sandbox instances

* fixup

* Consistency nit from @lucasmrod
2022-08-09 12:24:10 -03:00
Zachary Winnerman
af5a1c7d2c
Change fleet org to "Fleet Sandbox" (#7042)
Closes #7016
2022-08-03 16:53:27 -04:00
Zachary Winnerman
7ff2c3d249
Add cors to sandbox jitprovisioner (#6900) 2022-07-26 16:30:44 -05:00
Zachary Winnerman
913acdc2ae
Add auth header requirement for /new and fix openapi spec for timestamp (#6855) 2022-07-25 16:26:04 -04:00
Zachary Winnerman
9338fcbcbd
Fleet Sandbox (#5079)
* Add code for the shared infra part of the demo environment

* Checkin

* checkin

* Checkin for pre-provisioner, got terraform working

* Checkin with the pre-deployer working, now blocked by helm chart

* Add interface for helm

* Add some initial code for the JIT Provisioner lambda

Lots of code taken from https://gitlab.com/hmajid2301/articles/-/tree/master/41.%20Create%20a%20webapp%20with%20fizz

* Update helm chart to work with shared infra (#5621)

* Update helm chart to work with shared infra

* Update helm chart README to reflect changes.

* Checkin

* Checkin

* Checkin, Pre-provisioner actually works

* PreProvisioner is now complete

* Make changes to the JIT provisioner based off of actually learning how
to do stuff

* checkin

* Check in, broken currently

* Add all code except provisioning and emailing user

* Checkin

* Checkin, fixed kubernetes

* Checkin

* Forgot a file

* Finish jit provisioner, need to test now

* Checkin, switching to nginx ingress

* Fleets are now actually accessible

* JITProvisioner now returns working fleet instances

* Deprovisioner code done, just need a few bugs fixed

* Fix the deprovisioner so it works now and re-ip

* fixup

* Finished testing the deprovisioner

* Added monitoring and fixed some bugs

* Add stuff for #6548

* fixed per luke's suggestion

* Fix for inactive task definition arns

* move everything to the prod account

* Bump fleet version and fix a couple of bugs

* Fix a couple of bugs

* Lots of security fixes and a few bug fixes

* Rename demo to sandbox to match product's naming

* Revert "Update helm chart to work with shared infra (#5621)"

This reverts commit 610bbd1c00338620f6cc65fe2aff86139551f465.

Co-authored-by: Robert Fairburn <8029478+rfairburn@users.noreply.github.com>
2022-07-19 13:56:53 -05:00