Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow for registering feature that doesn't have warehouse store #5

Closed
pradithya opened this issue Dec 12, 2018 · 15 comments
Closed

Allow for registering feature that doesn't have warehouse store #5

pradithya opened this issue Dec 12, 2018 · 15 comments
Assignees
Labels
kind/feature New feature or request

Comments

@pradithya
Copy link
Collaborator

Registering feature that doesn't have warehouse store will currently return error.
There is a use case that some feature doesn't need warehouse store, so the restriction could be removed.
Additionally, ingestion will need to be updated to do no operation for warehouse storing operation.

@woop
Copy link
Member

woop commented Dec 14, 2018

So the question here is

  • Do we allow toggling of the warehouse storage option at the feature level
  • or at the system level (Feast deployment)
  • or both?

I think we should have the option to both disable warehouse storage on specific features, as well as deploy a Feast instance without a warehouse (serving only)

@tims
Copy link
Contributor

tims commented Dec 26, 2018

My pull request fixes a typo.. But basically ingestion already supports setting a "no operation" store, for either serving or ingestion. The core api would still need to implement sending it of course.

@woop
Copy link
Member

woop commented Jan 3, 2019

My pull request fixes a typo.. But basically ingestion already supports setting a "no operation" store, for either serving or ingestion. The core api would still need to implement sending it of course.

So the next step is a PR which adds this functionality to core?

@zhilingc, possible to have a look at this?

@tims
Copy link
Contributor

tims commented Jan 3, 2019

I'm also working on a PR to make ingestion accept an empty storage spec. Though in reality, that will interpreted as a StorageSpec.defaultInstance(). With empty string as the storeid. Ingestion will then treat this as a noop store.

@tims tims self-assigned this Jan 3, 2019
@zhilingc
Copy link
Collaborator

zhilingc commented Jan 3, 2019

Ok. You might want to remove the validation check that makes declaring a store mandatory when registering a feature as well.

@tims
Copy link
Contributor

tims commented Jan 3, 2019

Aren't you worried people will register features and they will just all go to noop when they leave it out though? We do need to implement inheriting a system default first.

And then a user needs to be able to override the default to a noop.

Which now that I think about might be a pain. As if they set the store id to an empty string, it will look the same as the default instance, so how will you know when to override it with the default or not?

Remember protos not having optional values means that there's no such thing as a null store id.

@woop
Copy link
Member

woop commented Jan 3, 2019

Aren't you worried people will register features and they will just all go to noop when they leave it out though? We do need to implement inheriting a system default first.

And then a user needs to be able to override the default to a noop.

Which now that I think about might be a pain. As if they set the store id to an empty string, it will look the same as the default instance, so how will you know when to override it with the default or not?

Remember protos not having optional values means that there's no such thing as a null store id.

Isn't a better approach simply to have an option to switch off either store? That we we don't have to look at the value and try to guess whether it should be on or off. I think the default should be inheritance.

@zhilingc
Copy link
Collaborator

zhilingc commented Jan 3, 2019

When is the default declared? Should it be in the configuration when deploying core Feast? Or is it a necessary step that has to be done by the user before registering features (but after deployment)?

@woop
Copy link
Member

woop commented Jan 3, 2019

When is the default declared? Should it be in the configuration when deploying core Feast? Or is it a necessary step that has to be done by the user before registering features (but after deployment)?

I think it should be done during initial installation. That way the user could theoretically have all data storage abstracted away from them.

@tims
Copy link
Contributor

tims commented Jan 3, 2019

@zhilingc yes it should be a system default. So it should come with the system.

Users shouldn't even be creating new stores? I think we made store specs creatable accidentally to be honest, because all the others are. They should probably only ever be created by the person who deploys a feast instance.

@tims
Copy link
Contributor

tims commented Jan 9, 2019

Can we close this issue now?

@tims
Copy link
Contributor

tims commented Jan 9, 2019

Closing, but reopen if I missed something.

@tims tims closed this as completed Jan 9, 2019
@pradithya
Copy link
Collaborator Author

Reopening the issue, core is still checking for presence of warehouse store. I am crafting a PR

@pradithya
Copy link
Collaborator Author

I am still having this error when trying to ingest data for feature having no warehouse store.
The feature spec looks like as follow:

id: "myentity.minute.feature_1"
name: "feature_1"
owner: "test@email.com"
description: "Test feature"
uri: "NA"
granularity: "MINUTE"
valueType: "DOUBLE"
entity: "myentity"
dataStores: 
  serving: 
    id: "REDIS1"

Exception:

Optional[Exception in thread "main" java.lang.IllegalArgumentException: no write transforms found
        at com.google.common.base.Preconditions.checkArgument(Preconditions.java:141)
        at feast.ingestion.transform.SplitOutputByStore.expand(SplitOutputByStore.java:57)
        at feast.ingestion.transform.SplitOutputByStore.expand(SplitOutputByStore.java:45)
        at org.apache.beam.sdk.Pipeline.applyInternal(Pipeline.java:537)
        at org.apache.beam.sdk.Pipeline.applyTransform(Pipeline.java:488)
        at feast.ingestion.values.PFeatureRows.apply(PFeatureRows.java:109)
        at feast.ingestion.transform.WarehouseStoreTransform.expand(WarehouseStoreTransform.java:45)
        at feast.ingestion.transform.WarehouseStoreTransform.expand(WarehouseStoreTransform.java:30)
        at org.apache.beam.sdk.Pipeline.applyInternal(Pipeline.java:537)
        at org.apache.beam.sdk.Pipeline.applyTransform(Pipeline.java:488)
        at feast.ingestion.values.PFeatureRows.apply(PFeatureRows.java:109)
        at feast.ingestion.ImportJob.expand(ImportJob.java:184)
        at feast.ingestion.ImportJob.mainWithResult(ImportJob.java:126)
        at feast.ingestion.ImportJob.main(ImportJob.java:110)]

@pradithya
Copy link
Collaborator Author

pradithya commented Jan 18, 2019

Apparently the ingestion job succeed but all feature row didn't pass validation

gitbook-com bot pushed a commit that referenced this issue Nov 25, 2021
dmartinol pushed a commit to dmartinol/feast that referenced this issue May 27, 2024
Initial skeleton of unit test for offline server
tsisodia10 pushed a commit to tsisodia10/feast that referenced this issue Jul 23, 2024
# This is the 1st commit message:

chore: Bump ws from 7.5.6 to 7.5.10 in /ui (feast-dev#4292)


# This is the commit message feast-dev#2:

Remove metric checks

Signed-off-by: Twinkll Sisodia <tsisodia@redhat.com>

# This is the commit message feast-dev#3:

Draft different md file

# This is the commit message feast-dev#4:

Refine opentelemetry.md

# This is the commit message feast-dev#5:

Refine opentelemetry.md

# This is the commit message feast-dev#6:

Refine opentelemetry.md

# This is the commit message feast-dev#7:

Refine opentelemetry.md
tsisodia10 pushed a commit to tsisodia10/feast that referenced this issue Jul 23, 2024
# This is the 1st commit message:

chore: Bump ws from 7.5.6 to 7.5.10 in /ui (feast-dev#4292)


# This is the commit message feast-dev#2:

Remove metric checks

Signed-off-by: Twinkll Sisodia <tsisodia@redhat.com>

# This is the commit message feast-dev#3:

Draft different md file

# This is the commit message feast-dev#4:

Refine opentelemetry.md

# This is the commit message feast-dev#5:

Refine opentelemetry.md

# This is the commit message feast-dev#6:

Refine opentelemetry.md

# This is the commit message feast-dev#7:

Refine opentelemetry.md
lokeshrangineni added a commit that referenced this issue Dec 20, 2024
* Snyk scan vulnerability fixes.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Reverting the grpc version so hoping that it will fix the java integration tests.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Upgrading the grpc version as it didn't fix the problem

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* adding grpc-api libraries as dependency to solve some of the class not found exceptions with the grpc upgrades.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Fix for 2 vulnerabilities (#3)

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating the requirements files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating the requirements files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Changing the python httpx package to 0.27.2 because after 0.28.0 version is giving errors related to proxies which is removed.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Security upgrade io.grpc:grpc-services from 1.53.0 to 1.63.0 (#4)

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Fix for 1 vulnerabilities (#5)

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* trying to fix some vulnerabilities in the requirements.txt files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
lokeshrangineni added a commit that referenced this issue Dec 20, 2024
* feat: Loading the CA trusted store certificate into Feast to verify the public certificate. (#4852)

* Initial Draft version to load the CA trusted store code.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Initial Draft version to load the CA trusted store code.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Fixing the lint error.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Trying to fix the online store test cases.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Formatted the python to fix lint errors.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Fixing the unit test cases.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Fixing the unit test cases.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* removing unnecessary cli args.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Now configuring the SSL ca store configurations on the feast client side rather than on the server side. And also fixing the integration tests.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Renamed the remote registry is_tls_mode variable to is_tls.
Changed the offline store TLS setting decision from cert to scheme.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Adding the existing trust store certificates to the newly created trust store.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Clearing the existing trust store configuration to see if it fixes the PR integration failures.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Clearing the existing trust store configuration to see if it fixes the PR integration failures.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Clearing the existing trust store configuration to see if it fixes the PR integration failures.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* combining the default system ca store with the custom one to fix the integration tests.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Final clean up and adding documentation.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Incorporating the code review comments from Francisco.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: Updated python-helm-demo example to use MinIO instead of GS (#4691)

* Updated python-helm-demo example to use MinIO instead of GS

Signed-off-by: Daniele Martinoli <dmartino@redhat.com>

* Update examples/python-helm-demo/README.md

Co-authored-by: Francisco Arceo <farceo@redhat.com>
Signed-off-by: Daniele Martinoli <dmartino@redhat.com>

* Adding explicit wait to container to validate CI failures

Signed-off-by: Daniele Martinoli <dmartino@redhat.com>

* restored original conftest

Signed-off-by: Daniele Martinoli <dmartino@redhat.com>

---------

Signed-off-by: Daniele Martinoli <dmartino@redhat.com>
Co-authored-by: Francisco Arceo <farceo@redhat.com>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: Fixing some of the warnings with the github actions (#4763)

Fixing some of the warnings with the github actions, most of them related to deprecated actions or libraries.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Update README.md

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Snyk scan vulnerability fixes.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Reverting the grpc version so hoping that it will fix the java integration tests.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Upgrading the grpc version as it didn't fix the problem

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* adding grpc-api libraries as dependency to solve some of the class not found exceptions with the grpc upgrades.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Fix for 2 vulnerabilities (#3)

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating the requirements files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating the requirements files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Changing the python httpx package to 0.27.2 because after 0.28.0 version is giving errors related to proxies which is removed.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Security upgrade io.grpc:grpc-services from 1.53.0 to 1.63.0 (#4)

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Fix for 1 vulnerabilities (#5)

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* trying to fix some vulnerabilities in the requirements.txt files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating the lettuce-core to fix the snyk vulnerability.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Signed-off-by: Daniele Martinoli <dmartino@redhat.com>
Co-authored-by: Daniele Martinoli <86618610+dmartinol@users.noreply.github.com>
Co-authored-by: Francisco Arceo <farceo@redhat.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
franciscojavierarceo added a commit that referenced this issue Dec 21, 2024
* Update README.md

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* chore: Update quickstart.md

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Feature/lrangine master (#6)

* Snyk scan vulnerability fixes.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Reverting the grpc version so hoping that it will fix the java integration tests.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Upgrading the grpc version as it didn't fix the problem

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* adding grpc-api libraries as dependency to solve some of the class not found exceptions with the grpc upgrades.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Fix for 2 vulnerabilities (#3)

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating the requirements files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating the requirements files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Changing the python httpx package to 0.27.2 because after 0.28.0 version is giving errors related to proxies which is removed.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Security upgrade io.grpc:grpc-services from 1.53.0 to 1.63.0 (#4)

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Fix for 1 vulnerabilities (#5)

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* trying to fix some vulnerabilities in the requirements.txt files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Feature/lrangine master (#7)

* feat: Loading the CA trusted store certificate into Feast to verify the public certificate. (#4852)

* Initial Draft version to load the CA trusted store code.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Initial Draft version to load the CA trusted store code.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Fixing the lint error.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Trying to fix the online store test cases.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Formatted the python to fix lint errors.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Fixing the unit test cases.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Fixing the unit test cases.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* removing unnecessary cli args.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Now configuring the SSL ca store configurations on the feast client side rather than on the server side. And also fixing the integration tests.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Renamed the remote registry is_tls_mode variable to is_tls.
Changed the offline store TLS setting decision from cert to scheme.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Adding the existing trust store certificates to the newly created trust store.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Clearing the existing trust store configuration to see if it fixes the PR integration failures.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Clearing the existing trust store configuration to see if it fixes the PR integration failures.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Clearing the existing trust store configuration to see if it fixes the PR integration failures.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* combining the default system ca store with the custom one to fix the integration tests.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Final clean up and adding documentation.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Incorporating the code review comments from Francisco.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: Updated python-helm-demo example to use MinIO instead of GS (#4691)

* Updated python-helm-demo example to use MinIO instead of GS

Signed-off-by: Daniele Martinoli <dmartino@redhat.com>

* Update examples/python-helm-demo/README.md

Co-authored-by: Francisco Arceo <farceo@redhat.com>
Signed-off-by: Daniele Martinoli <dmartino@redhat.com>

* Adding explicit wait to container to validate CI failures

Signed-off-by: Daniele Martinoli <dmartino@redhat.com>

* restored original conftest

Signed-off-by: Daniele Martinoli <dmartino@redhat.com>

---------

Signed-off-by: Daniele Martinoli <dmartino@redhat.com>
Co-authored-by: Francisco Arceo <farceo@redhat.com>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: Fixing some of the warnings with the github actions (#4763)

Fixing some of the warnings with the github actions, most of them related to deprecated actions or libraries.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Update README.md

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Snyk scan vulnerability fixes.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Reverting the grpc version so hoping that it will fix the java integration tests.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Upgrading the grpc version as it didn't fix the problem

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* adding grpc-api libraries as dependency to solve some of the class not found exceptions with the grpc upgrades.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Fix for 2 vulnerabilities (#3)

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating the requirements files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating the requirements files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Changing the python httpx package to 0.27.2 because after 0.28.0 version is giving errors related to proxies which is removed.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Security upgrade io.grpc:grpc-services from 1.53.0 to 1.63.0 (#4)

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* [Snyk] Fix for 1 vulnerabilities (#5)

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* chore: Update quickstart.md

* fix: java/serving/pom.xml & java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-2807808
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055227
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-8055228
- https://snyk.io/vuln/SNYK-JAVA-ORGYAML-3152153
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3167772
- https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETHRIFT-1074898
- https://snyk.io/vuln/SNYK-JAVA-IONETTY-6483812
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044
- https://snyk.io/vuln/SNYK-JAVA-IOGRPC-571957
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
- https://snyk.io/vuln/SNYK-JAVA-JUNIT-1017047

* fix: sdk/python/feast/ui/package.json & sdk/python/feast/ui/yarn.lock to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-TRIM-1017038

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* fix: java/pom.xml to reduce vulnerabilities

The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-5710356

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* trying to fix some vulnerabilities in the requirements.txt files.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating the lettuce-core to fix the snyk vulnerability.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Signed-off-by: Daniele Martinoli <dmartino@redhat.com>
Co-authored-by: Daniele Martinoli <86618610+dmartinol@users.noreply.github.com>
Co-authored-by: Francisco Arceo <farceo@redhat.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* updating netty library

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* updating netty library

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Updating aws java sdk libraries.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Adding verbose logs to debug the sudden failure of tests without any error messages.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

* Adding verbose logs to debug the sudden failure of tests without any error messages.

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>

---------

Signed-off-by: lrangine <19699092+lokeshrangineni@users.noreply.github.com>
Signed-off-by: Daniele Martinoli <dmartino@redhat.com>
Co-authored-by: Francisco Arceo <arceofrancisco@gmail.com>
Co-authored-by: snyk-bot <snyk-bot@snyk.io>
Co-authored-by: Daniele Martinoli <86618610+dmartinol@users.noreply.github.com>
Co-authored-by: Francisco Arceo <farceo@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants