Commit Graph

114 Commits

Author SHA1 Message Date
Erik Seliger
e0a8ff3d89
app: Move out of enterprise and merge with cmd/sourcegraph-oss (#56447)
Another item on the checklist to get rid of the enterprise directory.
2023-09-08 16:23:46 +02:00
Jean-Hadrien Chabran
c8a3bd3ce1
bzl: set version on bins, not lib + add missing (#54030)
A few `x_defs` attributes were missing on binaries, which is now fixed.
Also moved to stamping from `go_library` rules to `go_binaries` to ease
caching.

## Test plan

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->

CI + main-dry-run + locally tested + `strings github-proxy | grep
version` on `us.gcr.io/sourcegraph-dev/github-proxy:323c450504f8`
2023-06-23 14:06:58 +02:00
Jean-Hadrien Chabran
e0746e18e5
dev: drop outdated build scripts + minor updates (#53841)
This PR drops all now outdated `build.sh`, `Dockerfile*` from artifacts
entirely built from Bazel. It also updates `sg.config.yaml` to replace
`install` steps that were using them.

## Test plan

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->

- Ran locally all new sg targets
- CI 
- 🟢 Main-dry-run
https://buildkite.com/sourcegraph/sourcegraph/builds/229439
2023-06-21 18:58:39 +02:00
Jean-Hadrien Chabran
cf3a47683f
bzl: make all container_structure_test exclusive (#53502)
```
buildozer 'add tags exclusive' //...:%container_structure_test
```

Make all container structure test exclusive, as they just start crawling
if they're all run at once and tend to timeout.

This will fix all flakes caused by `*:image_test` targets. 


## Test plan

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->

Tested in CI, with `no-cache` to ensure timings are relevant. 

Before: 


![image](https://github.com/sourcegraph/sourcegraph/assets/10151/9ac0194b-d0f9-436c-8df1-91fa72f9e626)


After 

<img width="1103" alt="CleanShot 2023-06-14 at 19 06 16@2x"
src="https://github.com/sourcegraph/sourcegraph/assets/10151/09fe2032-fb3f-45c8-af2f-18b576b1972e">
2023-06-14 17:17:20 +00:00
Jean-Hadrien Chabran
4af8ef78f8
bzl: remove default_tags from oci_push rules (#52996)
Having the default tags handled makes it confusing as we're still in a
transition phase and having two places to handle those is error prone.



## Test plan

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->

local testing + CI
2023-06-06 12:32:45 +02:00
Jean-Hadrien Chabran
3d36d34b3d
ci: re-enable race detection (#52776)
The previous approach to enable race detection was too radical and
accidently led to build our binaries with the race flage enabled, which
caused issues when building images down the line.

This happened because putting a `test --something` in bazelrc also sets
it on `build` which is absolutely not what we wanted. Usually folks get
this one working by having a `--stamp` config setting that fixes this
when releasing binaries, which we don't at this stage, as we're still
learning Bazel.

Luckily, this was caught swiftly. The current approach insteads takes a
more granular approach, which makes the `go_test` rule uses our own
variant, which injects the `race = "on"` attribute, but only on
`go_test`.


## Test plan

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->

CI, being a main-dry-run, this will cover the container building jobs,
which were the ones failing.

---------

Co-authored-by: Alex Ostrikov <alex.ostrikov@sourcegraph.com>
2023-06-05 20:41:47 +02:00
Jean-Hadrien Chabran
58da6780d7
Switch to OCI/Wolfi based image (#52693)
This PR ships our freshly rewritten container images built with
rules_oci and Wolfi, which for now will only be used on S2.

*What is this about*

This work is the conjunction of [hardening container
images](https://github.com/orgs/sourcegraph/projects/302?pane=issue&itemId=25019223)
and fully building our container images with Bazel.

* All base images are now distroless, based on Wolfi, meaning we fully
control every little package version and we won't be subject anymore to
Alpine maintainers dropping a postgres version for example.

* Container images are now built with `rules_oci`, meaning we don't have
Dockerfile anymore, but instead created through [Bazel
rules](https://sourcegraph.sourcegraph.com/github.com/sourcegraph/sourcegraph@bzl/oci_wolfi/-/blob/enterprise/cmd/gitserver/BUILD.bazel).
Don't be scared, while this will look a bit strange to you at first,
it's much saner and simpler to do than our Dockerfiles and their muddy
shell scripts calling themselves in cascade.


:spiral_note_pad:  *Plan*:

*1/ (NOW) We merge our branch on `main` today, here is what it does
change for you 👇:skin-tone-3::*

* On `main`: 
* It will introduce a new job on `main` _Bazel Push_, which will push
those new images on our registries with all tags prefixed by `bazel-`.
    * These new images will be picked up by S2 and S2 only. 
* The existing jobs building docker images and pushing them will stay in
place until we have QA'ed them enough and are confident to roll them out
on Dotcom.
* Because we'll be building both images, there will be more jobs running
on `main`, but this should not affect the wall clock time.
* On all branches (so your PRs and `main`)
* The _Bazel Test_ job will now run: Backend Integration Tests, E2E
Tests and CodeIntel QA
* This will increase the duration of your test jobs in PRs, but as we
haven't removed yet the `sg lint` step, it should not affect too much
the wall clock time of your PRs.
* But it will also increase your confidence toward your changes, as the
coverage will vastly increased compared to before.
* If you have ongoing branches which are affecting the docker images
(like adding a new binary, like the recent `scip-tags`, reach us out on
#job-fair-bazel so we can help you to port your changes. It's much much
simpler than before, but it's going to be unfamiliar to you).

* If something goes awfully wrong, we'll rollback and update this
thread.

*2/ (EOW / Early next week) Once we're confident enough with what we saw
on S2, we'll roll the new images on Dotcom.*

* After the first successful deploy and a few sanity checks, we will
drop the old images building jobs.
* At this point, we'll reach out to all TLs asking for their help to
exercise all features of our product to ensure we catch any potential
breakage.



## Test plan

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->


* We tested our new images on `scale-testing` and it worked.
* The new container building rules comes with _container tests_ which
ensures that produced images are containing and configured with what
should be in there:
[example](https://sourcegraph.sourcegraph.com/github.com/sourcegraph/sourcegraph@bzl/oci_wolfi/-/blob/enterprise/cmd/gitserver/image_test.yaml)
.

---------

Co-authored-by: Dave Try <davetry@gmail.com>
Co-authored-by: Will Dollman <will.dollman@sourcegraph.com>
2023-06-02 12:12:52 +02:00
Chris Warwick
33cac9fae1
App - Fix shutdown of postgres when terminating (#52463)
Addresses https://github.com/sourcegraph/sourcegraph/issues/52420

Previously when App shut down it was leaving behind postgres processes
thats caused issues due to the socket from the previous instance
remaining. This is manifest to the user as a app with a blank screen
that wouldn't launch.

There were several issues

1. The github proxy was calling `os.Exit` on the first shutdown signal
received. This is an issue for app because all services are running in
the same parent process it would terminate the app before any other
services or postgres could properly close.
2. Once the `os.Exit` issue was resolved the single binary would never
terminate because it was paused on an empty select. This replaces the
empty select with a 2nd wait group that waits for the termination of
each service that was started. The app will exit now but leaves a race
condition on shutdown of the services and postgres.
3. To resolve the race condition I removed postgres from being monitored
as a background process and instead return a cleanup function from
`Init` so that balance can be restored. Init is responsible for starting
postgres before any service and now it can inform the caller how to
clean up anything it needs to.
2023-05-26 09:34:27 -04:00
Jean-Hadrien Chabran
ee4b4007aa
Running binaries with SANITY_CHECK=true immediately exits with a code zero (#52186)
As we're using
https://github.com/GoogleContainerTools/container-structure-test when
building images with Bazel, we can write tests that ensures that the
binaries we produced are executable on the current platform.

The code using this feature is not present in this PR, as it makes it
much more readable for everyone to ship this independently.

We may still be bitten by `init()` functions, but we'll set low timeouts
on those container structure tests to ensure it stays quick.

## Test plan

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->



```
~/work/other  jh/sanity_check $ SANITY_CHECK=true ./bazel-bin/docker-images/syntax-highlighter/syntect_server
Sanity check passed, exiting without error

~/work/other U jh/sanity_check $ ./bazel-bin/docker-images/syntax-highlighter/syntect_server  
## Embedded themes:

- `InspiredGitHub`
- `Monokai`
- `Solarized (dark)`
# ... 
```

```
~/work/other  jh/sanity_check $ SANITY_CHECK=true bazel-bin/cmd/worker/worker_/worker
Sanity check passed, exiting without error

```
2023-05-19 12:30:11 +00:00
Will Dollman
b95719f528
Apply Wolfi Cloud Instance Fixes (#51263)
This PR contains all the fixes and tweaks I've made during the process
of getting the wolfi-test cloud instance working.

There's a lot going on in this PR:

Packages:
* Build comby from source - the published binary isn't compatible with
Arch/Wolfi's libpcre library path
* Build cadvisor from source - may not be necessary, but done as a
debugging step and gives us more arch flexibility
* Package s3proxy
* Update p4-fusion dependency SHA
* Bump all packages to trigger a rebuild with latest version of melange.
The old version didn't seem to pick up on dylibs properly
* Fix opentelemetry-collector binary path

Base images:
* Fix cadvisor base image
* Fix redis UID+GIDs
* Add missing p4cli package to repo-updater image
* Remove nodejs from server image (no longer required by code-intel)

Other fixes:
* Update build-wolfi.sh scripts to match the current Bazelified build.sh
scripts
* Fix `server` image builds
* Fix zoekt-webserver CMD
* Fix postgres locale + default config + add a patch for
`unix_socket_directories`
* Fix `symbols` go-build-wolfi scripts

## Things to do before merging

- [ ] Validate the new postgres patch-conf.sh script with delivery - will do post-merge
- [x] Remove all DO NOT MERGE comments

## Test plan

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->

- [x] Manual testing on wolfi-test cloud instance
- [x] Manual testing on scaletesting instance
2023-05-18 10:48:43 +01:00
Noah S-C
ad1c0d7cb2
'undeprecate' single-service main entrypoints (#51930)
Renaming main entrypoints which are confusingly marked as "deprecated",
yet are not deprecated from what I've been informed 🤷

## Test plan

No logic changes, just renaming functions
2023-05-15 15:37:49 +00:00
Dave Try
321e0e9d01
ci: enable bazel builds for docker images (#51241)
Reintroduces the same changes as
https://github.com/sourcegraph/sourcegraph/pull/51104 minus
syntax-highlighter which we're unable to compile with the right
toolchain at the moment.

Tested as a full main-dry-run, as well as running the stack with compose
and checking indexing and syntax-highlighting.

Executors are also built correctly. 


## Test plan

CI + manual test via compose.

---------

Co-authored-by: Jean-Hadrien Chabran <jh@chabran.fr>
2023-04-28 10:41:13 +02:00
Dave Try
c5d638bfda
ci: revert bazel builds (#51190)
revert bazel changes due to errors with syntax-highlighter

## Test plan

CI
2023-04-26 23:19:36 +00:00
Dave Try
5b198be1b4
bazel: build all binaries with bazel for inclusion in docker images (#51104)
Build docker images with bazel compiled binaries

---------

Co-authored-by: Jean-Hadrien Chabran <jh@chabran.fr>
2023-04-26 14:18:05 -05:00
Will Dollman
3db318de24
Build Wolfi images (#47182)
Add Dockerfiles and build scripts for building Wolfi-based images for every container

Progress tracked in https://github.com/sourcegraph/security/issues/447

## Test plan

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->
* Green CI
* These changes will not be made live until each image undergoes full
validation
- [x] `main-dry-run` prior to merging
https://buildkite.com/sourcegraph/sourcegraph/builds/214773#_
2023-04-24 17:32:36 +00:00
William Bezuidenhout
d0d1507181
add default value for DOCKER_BAZEL (#50324)
Adding a defauilt value for the Docker Bazel variable used in the build
scripts

## Test plan
ran the script locally to see how it works with and without the variable
set
<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->
2023-04-04 08:55:14 +00:00
Vincent
9a2904203c
dep: resolve CVE-2023-0464 in base image 2/2 (#50261)
This PR updates the base images for our docker files to a version of
Alpine without vulnerabilities.

## Test plan
Pipelines from https://github.com/sourcegraph/sourcegraph/pull/50248
indicate that there are no vulnerabilities in the base image.

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->
2023-04-02 18:24:34 +02:00
Dave Try
e60a8f573b
bazel: build docker images binary with bazel (#49525)
Build the remaining docker images with bazel 

Depends on:

https://github.com/sourcegraph/sourcegraph/pull/49228


## Test plan

CI

---------

Co-authored-by: Jean-Hadrien Chabran <jh@chabran.fr>
Co-authored-by: William Bezuidenhout <william.bezuidenhout@sourcegraph.com>
2023-03-22 14:22:07 +00:00
Vincent
ee981a6c2c
dep: use new docker base (#49706)
Use the new docker image as the base image for our images. This is uses
the newly released `curl` version.

## Test plan
- [x] ci tests

<!-- All pull requests REQUIRE a test plan:
https://docs.sourcegraph.com/dev/background-information/testing_principles
-->
2023-03-20 18:15:21 +01:00
Dave Try
2b8fa079f0
bazel: fix buf files (#49444)
fix protoc-gen-go version
2023-03-15 20:21:38 +00:00
Dave Try
293385d5dd
bazel: update timeouts to suppress warnings (#49399)
Updates all of the BUILD fields with timeouts to suppress warnings and
reduce log spam.


## Test plan

Green CI
2023-03-15 15:04:16 +02:00
Vincent
b3ba5ec9b4
Use new base image with curl from edge/main (#48144)
Use latest `curl` in our base-images
2023-02-23 19:40:07 +00:00
Vincent
e4fe8cf9c2
Resolve SSL issues in containers (#48042)
Replace the old base image with the new updated one. Resolving the SSL
issues in new container builds.
2023-02-22 14:34:32 +00:00
Vincent
ef114ac72b
Use newer alpine base-image (#47265) 2023-02-01 14:16:49 +00:00
Jean-Hadrien Chabran
bc5490c4bb
bazel: introduce build files for Go (#46770) 2023-01-23 14:00:01 +01:00
Stephen Gutekanst
be4f4409a3
Sourcegraph App (single-binary branch) (#46547)
* internal: add service and singleprogram packages
* sg.config.yaml: add single-binary build targets
* internal/env: add a function for clearing environ cache
* internal/{workerutil,metrics}: add a hack to allow running 2 executors in the same process
* internal/conf: add single-program deploy type
* internal/singleprogram: clarify security
* cmd/sourcegraph-oss: add initial single-binary main (will not build yet)
* enterprise/cmd/sourcegraph: initial enterprise single-binary
* Add multi-platform builds for single-program
* single-binary: correctly build JS artifacts into binary
* license_finder licenses add github.com/xi2/xz "Public domain"
* internal/service/svcmain: correctly initialize logger for DeprecatedSingleServiceMain
* worker: refactor to new service pattern
* cmd/github-proxy: refactor to use new service pattern
* symbols: refactor to use new service pattern
* gitserver: refactor to user new service pattern
* searcher: refactor to use new service pattern
* gitserver: refactor to use new service pattern
* repo-updater: refactor to use new service pattern
* frontend: refactor to use new service pattern
* executor: refactor to use new service pattern
* internal/symbols: use new LoadConfig pattern
* precise-code-intel-worker: refactor to use new service pattern
* internal/symbols: load config for tests
* cmd/repo-updater: remove LoadConfig approach
* cmd/symbols: workaround env var conflict with searcher
* executor: internal: add workaround to allow running 2 instances in same process
* executors: add EXECUTOR_QUEUE_DISABLE_ACCESS_TOKEN for single-binary and dev deployments only
* single-binary: use EXECUTOR_QUEUE_DISABLE_ACCESS_TOKEN
* extsvc/github: fix default value for single-program deploy type
* single-binary: stop relying on a local ctags image
* single-binary: use unix sockets for postgres
* release App snapshots in CI when pushed to app/release-snapshot branch
* internal/service/svcmain: update TODO comment
* executor: correct DEPLOY_TYPE check
* dev/check: allow single-binary to import dbconn
* executor: remove accidental reliance on dbconn package
* executor: improve error logging when running commands (#46546)
* executor: improve error logging when running commands
* executor: do not attempt std config validation running e.g. install cmd
* executor: do not pull in the conf package / frontend reliance
* ci: executors: correct site config for passwordless auth
* server: fix bug where github-proxy would try to be a conf server
* CI: executors: fix integration test passwordless auth
* executors: allow passwordless auth in sourcegraph/server for testing
* repo-updater: fix enterprise init (caused regression in repository syncing)

Signed-off-by: Stephen Gutekanst <stephen@sourcegraph.com>
Co-authored-by: Peter Guy <peter.guy@sourcegraph.com>
Co-authored-by: Quinn Slack <quinn@slack.org>
2023-01-19 17:35:39 -07:00
Vincent
61d5544660
Use new alpine base image (#45937) 2022-12-22 19:57:05 +01:00
Quinn Slack
4e13a0226a
extract github-proxy main to shared package for external invocation (#45113) (#45868)
This is a copy-and-paste of the github-proxy main function to a shared package so that github-proxy can be invoked from a different entrypoint. This is how it's done for several other programs (frontend, repo-updater, gitserver, etc.). There are no logic changes.
2022-12-20 20:56:39 -08:00
Keegan Carruthers-Smith
f885c53472
all: update alpine image (#43655)
This updates the alpine image we use to the one built in 84d1e240bb.
This is to update libxml2 for CVE-2022-40303 CVE-2022-40304.

Test Plan: CI
2022-10-31 10:35:37 +02:00
Robert Lin
8a54aba93a
Revert "Revert "httptrace: remove unused repo and origin label" (#42187) (#42189)
This reverts commit 20de2ba52e (#42187 , #42118)
2022-09-29 08:46:21 -07:00
Keegan Carruthers-Smith
db6c4cd841
all: update Dockerfile to use latest alpine-3.14 (#42259)
We updated sourcegraph/alpine-3.14 today in 3b3879b9 to remove a bunch
of CVEs in bind-tools. This commit makes it so we use the new image.

Test Plan: CI works and has far less security reports.
2022-09-28 20:05:50 +00:00
Jean-Hadrien Chabran
20de2ba52e
Revert "httptrace: remove unused repo and origin label" (#42187)
This reverts commit 6ad85b0ec7, which is causing e2e tests to fail.
2022-09-27 19:25:17 +02:00
Robert Lin
6ad85b0ec7
httptrace: remove unused repo and origin label (#42118)
A repo label is set on httptrace metrics, but it only tracks a small set of hardcoded repositories that have not been changed for at least 4 years. There do not appear to be any references to this label in any dashboard either.

origin is another label untouched for 4+ years, and is always set to 'unknown' in s2. Tracking references also reveals two metrics that have no references in dashboards.
2022-09-27 09:29:40 -07:00
Robert Lin
ac8edd7334
internal/trace: use otelhttp, update deprecation notices (#41024)
Swap out the OpenTracing HTTP middleware with otelhttp, with a default constructor provided in a new package internal/instrumentation. Also adds deprecation notices on internal/trace/ot, and updates deprecation notices in internal/trace so that they render properly in VS Code.
2022-08-30 09:37:46 -07:00
William Bezuidenhout
ef31cf98a0
feat(ci): sentry events on pipeline generation failures (#39289)
* update sg log

* use sg log and log sentry events

* lookup sentry DSN from environment

* Update enterprise/dev/ci/gen-pipeline.go

Co-authored-by: Jean-Hadrien Chabran <jh@chabran.fr>

* Update enterprise/dev/ci/internal/ci/pipeline.go

* Update dev/sg/internal/analytics/context.go

Co-authored-by: Robert Lin <robert@bobheadxi.dev>

* Update enterprise/dev/ci/gen-pipeline.go

Co-authored-by: Robert Lin <robert@bobheadxi.dev>

* remove package level logger

Co-authored-by: Jean-Hadrien Chabran <jh@chabran.fr>
Co-authored-by: Robert Lin <robert@bobheadxi.dev>
2022-08-24 17:59:57 +00:00
Andre Eleuterio
1a2c0f5f2b
Update alpine consumers (#40279)
Update base alpine images
2022-08-11 17:03:24 -03:00
Andre Eleuterio
7c8315ca77
Bump alpine base image (#38423)
* Bump curl version

* Update base alpine image

* Bump base alpine images
2022-07-07 13:01:37 -03:00
Thorsten Ball
cee97470a3
github-proxy: do not log fatal err message if err is expected (#38201)
I don't think it makes sense to log a fatal message if the server simply
closed. And we do the same check in other `main()` functions too.
2022-07-05 15:07:43 +00:00
Robert Lin
25dec337d9
internal/tracer: migrate to new logging library (#37973) 2022-06-29 16:50:48 -07:00
Jean-Hadrien Chabran
c0d80714f9
log: sample sentry errors on all services (#37314) 2022-06-16 11:31:44 +02:00
Jean-Hadrien Chabran
03346d3ab9
Drop all explicit sentry refs (#37231) 2022-06-15 20:41:50 +02:00
Andre Eleuterio
46f57624bd
Update base images (#37132)
* Update migrator base image

* upgrade images

* lint

* add lint skips
2022-06-14 00:49:53 +02:00
Robert Lin
3518a54ce8
doc/dev: update logging conventions, align existing usage (#36934)
Outlines some logging conventions based on our recent migration work, and update some existing callsites to align with the new recommendations
2022-06-10 09:38:43 -07:00
Robert Lin
95c6946b9d
lib/log: migrate to github.com/sourcegraph/log (#36834)
This change migrates lib/log to https://github.com/sourcegraph/log in the hopes of easing adoption for other services.
2022-06-08 15:02:38 -07:00
Jean-Hadrien Chabran
3ea3c84343
Update services to use the sentry sink (#36569)
This patches all services that were using the HTTP middleware to capture sentry errors to now use the sentry sink.
2022-06-08 11:17:13 -07:00
Keegan Carruthers-Smith
fa6a244424
all: use alpine-3.14 (#34508)
We have a 3.14 image available, but when we introduced it we ran into problems
using it. This updates all images to use the newer version of alpine.

  ruplacer --go \
    sourcegraph/alpine-3.12:142406_2022-04-14_8836ac3499f4@sha256:4681a48d1fb9a73fef1b540c08b3411f797351bbeda749f5dca21213a1e71526 \
    sourcegraph/alpine-3.14:142406_2022-04-14_8836ac3499f4@sha256:2a2d1cbaec78882661fe1aa5b0a4af0c23a37be2ea9ff8aadc2da5b80852c233

I also had to pin postgresql in the server image since we can't upgrade it
otherwise customer upgrades fail (incompatible on disk data). Additionally we
had to include libstc++ and libgcc for tree sitter.

Risks: I am relying on our CI to catch problems with this upgrade. The main
risks here are us not testing things which exercise non-go binaries that rely
on shared libraries. What comes to mind is things like p4 and tree-sitter, I
am unsure if they get properly exercised. However, I think now is a good time
to land a change like this since we have a lot of time until branch cut.

Test Plan: main dry run on CI to test docker image building and integration
testing.
2022-05-04 11:41:54 +02:00
Robert Lin
b383f1346e
github-proxy: initialize and use lib/log (#34674) 2022-04-28 21:44:15 +00:00
Andre Eleuterio
d7f2d1dce0
Update base alpine images (#33938)
* Upgrade base alpine

* Upgrade base alpine 3.14
2022-04-14 17:37:12 -03:00
Kevin Wojkovich
938f4497bf
security: patch openssl libs against CVE 2022-0778 (#32720)
* security: patch openssl libs against CVE 2022-0778

* docker: patch alpine-3.12 dependant images

* docker: patch alpine-3.14 dependant images

* docker: update libxslt for cve-2021-30560 fix

* docker: patch redis images against CVE-2022-0778

* fix typo
2022-03-17 09:15:07 -05:00
Kevin Wojkovich
dc15c520d9
docker: update alpine base image (#32622)
* docker: update alpine base image

* minio: update to latest version
2022-03-16 06:35:07 -05:00