antoinecaputo opened a new pull request, #6509:
URL: https://github.com/apache/incubator-devlake/pull/6509

   ### Summary
   Fix image vulnerability from docker and aws inspector scan
   
   ### Does this close any open issues?
   Closes #6508
   
   ### Screenshots
   
![image](https://github.com/apache/incubator-devlake/assets/44469196/511b74b0-3d6b-4888-9d67-8c06dc0d91a6)
   
![image](https://github.com/apache/incubator-devlake/assets/44469196/4608f083-556a-4a6d-9c5e-42dfaf2c1cfb)
   
   
   ### Other Information
   As it has been discussed on psf/requests repo, [update certifi version to 
address critical CVE #6494](https://github.com/psf/requests/pull/6494), 
maintainers have decided to not update certifi :
   ```
   This change isn't required. Requests already support the latest version of 
cryptography and users are free to upgrade as needed.
   ```
   
   I have overridden poetry certifi version dependency to `2023.07.22` as 
mentioned in [fix subdependency versions, while keeping subdeps separated from 
direct dependencies. #2546](https://github.com/python-poetry/poetry/issues/2546)
   
   It only concerns the `backend/python/pydevlake/pyproject.toml` file since 
other pyproject files include it as a dependency.
   ```
   [tool.poetry.dependencies]
   python = "~3.9"
   pydevlake = { path = "../../pydevlake", develop = true }
   ```
   
   Lock files have been updated with `poetry lock --no-update` to keep the same 
dependencies versions in :
   - `backend/python/pydevlake`
   - `backend/python/plugins/azuredevops`
   - `backend/python/test/fakeplugin`
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to