Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(maint) Allow 'file' transport when adding git submodules #1329

Merged

Conversation

mwaggett
Copy link
Contributor

Due to a recent CVE, the 'file' transport is considered unsafe by default. This results in an error when attempting to add submodules on ubuntu. This commit explicitly allows the 'file' transport protocol when adding submodules in acceptance tests.
For more info, see https://github.blog/2022-10-18-git-security-vulnerabilities-announced/#cve-2022-39253

Due to a recent CVE, the 'file' transport is considered unsafe by default. This
results in an error when attempting to add submodules on ubuntu. This commit
explicitly allows the 'file' transport protocol when adding submodules in
acceptance tests.
For more info, see https://github.blog/2022-10-18-git-security-vulnerabilities-announced/#cve-2022-39253
@mwaggett mwaggett requested a review from a team as a code owner January 18, 2023 23:32
As of Bundler 2.4.0, Ruby >= 2.6.0 is required, so this commit pins Bundler to a
version that supports Ruby 2.4 and 2.5, since we still support those versions.
This commit ensures that puppet_forge >= 4.0.0 is not used, since 4.0.0
drops support for Ruby versions < 2.6 and we still support 2.4 and 2.5.
@jonathannewman jonathannewman merged commit b6814c0 into puppetlabs:main Jan 19, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants