Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prepare release prs/0.76.0 #3

Closed
wants to merge 5 commits into from
Closed

Conversation

dmitryax
Copy link
Owner

@dmitryax dmitryax commented Apr 25, 2023

No description provided.

@codecov-commenter
Copy link

Codecov Report

Patch coverage: 82.75% and project coverage change: +0.84 🎉

Comparison is base (763cbc6) 90.35% compared to head (1e8b33b) 91.19%.

📣 This organization is not using Codecov’s GitHub App Integration. We recommend you install it so Codecov can continue to function properly for your repositories. Learn more

Additional details and impacted files
@@            Coverage Diff             @@
##           master       #3      +/-   ##
==========================================
+ Coverage   90.35%   91.19%   +0.84%     
==========================================
  Files         188      296     +108     
  Lines       11054    14441    +3387     
==========================================
+ Hits         9988    13170    +3182     
- Misses        841     1006     +165     
- Partials      225      265      +40     
Impacted Files Coverage Δ
cmd/otelcorecol/main.go 0.00% <0.00%> (ø)
cmd/otelcorecol/main_others.go 0.00% <0.00%> (ø)
component/build_info.go 0.00% <ø> (-100.00%) ⬇️
confmap/expand.go 100.00% <ø> (ø)
confmap/internal/mapstructure/encoder.go 100.00% <ø> (ø)
confmap/provider.go 100.00% <ø> (ø)
confmap/provider/envprovider/provider.go 100.00% <ø> (ø)
confmap/provider/fileprovider/provider.go 100.00% <ø> (ø)
confmap/provider/httpprovider/provider.go 100.00% <ø> (ø)
confmap/provider/httpsprovider/provider.go 100.00% <ø> (ø)
... and 37 more

... and 273 files with indirect coverage changes

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

☔ View full report in Codecov by Sentry.
📢 Do you have feedback about the report comment? Let us know in this issue.

@dmitryax dmitryax force-pushed the master branch 2 times, most recently from 9dbe731 to 8de6210 Compare May 8, 2023 18:18
@dmitryax dmitryax closed this May 8, 2023
@dmitryax dmitryax deleted the prepare-release-prs/0.76.0 branch May 8, 2023 18:26
dmitryax added a commit that referenced this pull request Aug 3, 2023
To resolve the govulncheck reports:
```
Vulnerability #1: GO-2023-1987
    Large RSA keys can cause high CPU usage in crypto/tls
  More info: https://pkg.go.dev/vuln/GO-2023-1987
  Standard library
    Found in: crypto/[email protected]
    Fixed in: crypto/[email protected]
    Example traces found:
Error:       #1: service/internal/proctelemetry/config.go:299:27: proctelemetry.initOTLPgRPCExporter calls otlpmetricgrpc.New, which eventually calls tls.Conn.Handshake
Error:       #2: service/internal/proctelemetry/config.go:156:39: proctelemetry.InitPrometheusServer calls http.Server.ListenAndServe, which eventually calls tls.Conn.HandshakeContext
Error:       #3: service/service.go:251:36: service.buildResource calls uuid.NewRandom, which eventually calls tls.Conn.Read
Error:       #4: service/config.go:35:13: service.Config.Validate calls fmt.Printf, which eventually calls tls.Conn.Write
Error:       #5: service/telemetry/telemetry.go:32:28: telemetry.Telemetry.Shutdown calls trace.TracerProvider.Shutdown, which eventually calls tls.Dialer.DialContext
```
dmitryax added a commit that referenced this pull request Aug 7, 2023
To resolve the govulncheck reports:
```
Vulnerability #1: GO-2023-1987
    Large RSA keys can cause high CPU usage in crypto/tls
  More info: https://pkg.go.dev/vuln/GO-2023-1987
  Standard library
    Found in: crypto/[email protected]
    Fixed in: crypto/[email protected]
    Example traces found:
Error:       #1: service/internal/proctelemetry/config.go:299:27: proctelemetry.initOTLPgRPCExporter calls otlpmetricgrpc.New, which eventually calls tls.Conn.Handshake
Error:       #2: service/internal/proctelemetry/config.go:156:39: proctelemetry.InitPrometheusServer calls http.Server.ListenAndServe, which eventually calls tls.Conn.HandshakeContext
Error:       #3: service/service.go:251:36: service.buildResource calls uuid.NewRandom, which eventually calls tls.Conn.Read
Error:       #4: service/config.go:35:13: service.Config.Validate calls fmt.Printf, which eventually calls tls.Conn.Write
Error:       #5: service/telemetry/telemetry.go:32:28: telemetry.Telemetry.Shutdown calls trace.TracerProvider.Shutdown, which eventually calls tls.Dialer.DialContext
```


https://github.com/open-telemetry/opentelemetry-collector/actions/runs/5753675727/job/15597394973?pr=8144
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants