temporalio / benchmark-matrix Goto Github PK
View Code? Open in Web Editor NEWAutomated benchmarks for Temporal
License: MIT License
Automated benchmarks for Temporal
License: MIT License
Not really a problem, just maybe would be nice for contributing without costing $$$ in cloud costs
Localstack has a CLI tool that wraps the Pulumi CLI. I would like to test if this works for the sake of future contributions, and if it does, I'll open a PR here to add docs (in README.md or elsewhere) on how to implement.
For clarity, there's no expectation of actioning this from the temporal team - this is more of a "fyi I'm gonna try this and get back to you" π
If this works, another idea might be to add a Gitpod button/link for immediate environment spin up. There was just an article yesterday on integrating Localstack + Gitpod for improved/more efficient dx
Path to dependency file: /stacks/package.json
Path to vulnerable library: /stacks/package.json,/environments/aws/package.json
Found in HEAD commit: 4a36e97a0a6aa86c910cdb024048c18855f6c0d0
CVE | Severity | CVSS | Dependency | Type | Fixed in (pulumi version) | Remediation Possible** |
---|---|---|---|---|---|---|
CVE-2022-25883 | High | 7.5 | semver-6.3.0.tgz | Transitive | N/A* | β |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
The semantic version parser used by npm.
Library home page: https://registry.npmjs.org/semver/-/semver-6.3.0.tgz
Path to dependency file: /stacks/package.json
Path to vulnerable library: /stacks/package.json,/environments/aws/package.json
Dependency Hierarchy:
Found in HEAD commit: 4a36e97a0a6aa86c910cdb024048c18855f6c0d0
Found in base branch: main
Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
Publish Date: 2023-06-21
URL: CVE-2022-25883
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-c2qf-rxjj-qqgw
Release Date: 2023-06-21
Fix Resolution: semver - 5.7.2,6.3.1,7.5.2;org.webjars.npm:semver:7.5.2
Should also include max sustained iterations/second. The figure that k6 will report is for the lifetime of the benchmark, not really relevant in the context of ramp up.
This will make it clearer to users what resources are needed for which parts.
Adjust the configuration to get the best throughput we can from the cluster. Document the process/outcomes so it can be applied as a starting point for other clusters.
Path to dependency file: /stacks/package.json
Path to vulnerable library: /stacks/node_modules/xml2js/package.json,/environments/aws/node_modules/xml2js/package.json
CVE | Severity | CVSS | Dependency | Type | Fixed in (aws version) | Remediation Available |
---|---|---|---|---|---|---|
CVE-2023-0842 | Medium | 5.3 | xml2js-0.4.19.tgz | Transitive | 5.19.0 | β |
Simple XML to JavaScript object converter.
Library home page: https://registry.npmjs.org/xml2js/-/xml2js-0.4.19.tgz
Path to dependency file: /stacks/package.json
Path to vulnerable library: /stacks/node_modules/xml2js/package.json,/environments/aws/node_modules/xml2js/package.json
Dependency Hierarchy:
Found in base branch: main
xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the proto property to be edited.
Publish Date: 2023-04-05
URL: CVE-2023-0842
Base Score Metrics:
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-0842
Release Date: 2023-04-05
Fix Resolution (xml2js): 0.5.0
Direct dependency fix Resolution (@pulumi/aws): 5.19.0
βοΈ Automatic Remediation is available for this issue
βοΈ Automatic Remediation is available for this issue.
Path to dependency file: /environments/aws/package.json
Path to vulnerable library: /stacks/package.json,/environments/aws/package.json
Found in HEAD commit: 4a36e97a0a6aa86c910cdb024048c18855f6c0d0
CVE | Severity | CVSS | Dependency | Type | Fixed in (awsx version) | Remediation Possible** |
---|---|---|---|---|---|---|
CVE-2022-25883 | High | 7.5 | semver-5.7.1.tgz | Transitive | N/A* | β |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
The semantic version parser used by npm.
Library home page: https://registry.npmjs.org/semver/-/semver-5.7.1.tgz
Path to dependency file: /stacks/package.json
Path to vulnerable library: /stacks/package.json,/environments/aws/package.json
Dependency Hierarchy:
Found in HEAD commit: 4a36e97a0a6aa86c910cdb024048c18855f6c0d0
Found in base branch: main
Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
Publish Date: 2023-06-21
URL: CVE-2022-25883
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-c2qf-rxjj-qqgw
Release Date: 2023-06-21
Fix Resolution: semver - 5.7.2,6.3.1,7.5.2;org.webjars.npm:semver:7.5.2
Path to dependency file: /stacks/package.json
Path to vulnerable library: /environments/aws/package.json,/stacks/package.json
Found in HEAD commit: 4a36e97a0a6aa86c910cdb024048c18855f6c0d0
CVE | Severity | CVSS | Dependency | Type | Fixed in (eks version) | Remediation Possible** |
---|---|---|---|---|---|---|
CVE-2022-25883 | High | 7.5 | semver-7.3.8.tgz | Transitive | N/A* | β |
CVE-2023-45857 | Medium | 6.5 | axios-0.21.4.tgz | Transitive | 1.0.1 | β |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
The semantic version parser used by npm.
Library home page: https://registry.npmjs.org/semver/-/semver-7.3.8.tgz
Path to dependency file: /environments/aws/package.json
Path to vulnerable library: /environments/aws/package.json,/stacks/package.json
Dependency Hierarchy:
Found in HEAD commit: 4a36e97a0a6aa86c910cdb024048c18855f6c0d0
Found in base branch: main
Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
Publish Date: 2023-06-21
URL: CVE-2022-25883
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-c2qf-rxjj-qqgw
Release Date: 2023-06-21
Fix Resolution: semver - 5.7.2,6.3.1,7.5.2;org.webjars.npm:semver:7.5.2
Promise based HTTP client for the browser and node.js
Library home page: https://registry.npmjs.org/axios/-/axios-0.21.4.tgz
Path to dependency file: /environments/aws/package.json
Path to vulnerable library: /environments/aws/package.json,/stacks/package.json
Dependency Hierarchy:
Found in HEAD commit: 4a36e97a0a6aa86c910cdb024048c18855f6c0d0
Found in base branch: main
An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
Publish Date: 2023-11-08
URL: CVE-2023-45857
Base Score Metrics:
Type: Upgrade version
Release Date: 2023-11-08
Fix Resolution (axios): 1.6.0
Direct dependency fix Resolution (@pulumi/eks): 1.0.1
βοΈ Automatic Remediation will be attempted for this issue.
βοΈAutomatic Remediation will be attempted for this issue.
Found in HEAD commit: bccaced53dc6517f5cb6cadfd832eee1d6762dc6
CVE | Severity | CVSS | Dependency | Type | Fixed in (github.com/pulumi/pulumi/sdk/v3-v3.35.3 version) | Remediation Available |
---|---|---|---|---|---|---|
CVE-2019-0205 | High | 7.5 | github.com/uber/jaeger-client-go-v2.22.1+incompatible | Transitive | N/A* | β |
CVE-2022-27664 | High | 7.5 | golang.org/x/net-v0.0.0-20220225172249-27dd8689420f | Transitive | N/A* | β |
CVE-2022-30633 | High | 7.5 | golang.org/x/net-v0.0.0-20220225172249-27dd8689420f | Transitive | N/A* | β |
CVE-2022-32149 | High | 7.5 | golang.org/x/text-v0.3.7 | Transitive | N/A* | β |
CVE-2022-28131 | High | 7.5 | golang.org/x/net-v0.0.0-20220225172249-27dd8689420f | Transitive | N/A* | β |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.
Jaeger Bindings for Go OpenTracing API.
Library home page: https://proxy.golang.org/github.com/uber/jaeger-client-go/@v/v2.22.1+incompatible.zip
Dependency Hierarchy:
Found in HEAD commit: bccaced53dc6517f5cb6cadfd832eee1d6762dc6
Found in base branch: main
In Apache Thrift all versions up to and including 0.12.0, a server or client may run into an endless loop when feed with specific input data. Because the issue had already been partially fixed in version 0.11.0, depending on the installed version it affects only certain language bindings.
Publish Date: Oct 29, 2019 7:15:00 PM
URL: CVE-2019-0205
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0205
Release Date: Oct 29, 2019 7:15:00 PM
Fix Resolution: org.apache.thrift:libthrift:0.13.0
Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.0.0-20220225172249-27dd8689420f.zip
Dependency Hierarchy:
Found in HEAD commit: bccaced53dc6517f5cb6cadfd832eee1d6762dc6
Found in base branch: main
In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
Publish Date: Sep 6, 2022 6:15:00 PM
URL: CVE-2022-27664
Base Score Metrics:
Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.0.0-20220225172249-27dd8689420f.zip
Dependency Hierarchy:
Found in HEAD commit: bccaced53dc6517f5cb6cadfd832eee1d6762dc6
Found in base branch: main
Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag.
Publish Date: Aug 10, 2022 8:15:00 PM
URL: CVE-2022-30633
Base Score Metrics:
Type: Upgrade version
Origin: https://security-tracker.debian.org/tracker/CVE-2022-30633
Release Date: May 13, 2022 3:10:10 PM
Fix Resolution: go1.17.12,go1.18.4
Library home page: https://proxy.golang.org/golang.org/x/text/@v/v0.3.7.zip
Dependency Hierarchy:
Found in HEAD commit: bccaced53dc6517f5cb6cadfd832eee1d6762dc6
Found in base branch: main
An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.
Publish Date: Oct 14, 2022 3:15:00 PM
URL: CVE-2022-32149
Base Score Metrics:
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2022-32149
Release Date: Oct 14, 2022 3:15:00 PM
Fix Resolution: v0.3.8
Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.0.0-20220225172249-27dd8689420f.zip
Dependency Hierarchy:
Found in HEAD commit: bccaced53dc6517f5cb6cadfd832eee1d6762dc6
Found in base branch: main
In Decoder.Skip in encoding/xml in Go before 1.17.12 and 1.18.x before 1.18.4, stack exhaustion and a panic can occur via a deeply nested XML document.
Publish Date: Aug 10, 2022 8:15:00 PM
URL: CVE-2022-28131
Base Score Metrics:
Type: Upgrade version
Origin: https://security-tracker.debian.org/tracker/CVE-2022-28131
Release Date: Mar 29, 2022 3:10:07 PM
Fix Resolution: go1.17.12,go1.18.4
A declarative, efficient, and flexible JavaScript library for building user interfaces.
π Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. πππ
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google β€οΈ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.