-
Notifications
You must be signed in to change notification settings - Fork 73
wasmtime: update to v9.0.3. #355
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
4601db4
to
02d15aa
Compare
Signed-off-by: Ryan Northey <[email protected]>
@PiotrSikora this seems to be passing ci here, but when i test it in envoy ci im seeing errors like ... [2023-05-31 10:21:05.114][18][error][wasm] [external/envoy/source/extensions/common/wasm/wasm_vm.cc:38] Failed to load Wasm module due to a missing import: env�.proxy_get_header_map_valuen
[2023-05-31 10:21:05.114][18][error][wasm] [external/envoy/source/extensions/common/wasm/wasm.cc:109] Wasm VM failed Failed to initialize Wasm code
unknown file: Failure
C++ exception with description "Unable to create Wasm HTTP filter " thrown in the test body.
[ FAILED ] Runtimes/WasmFilterConfigTest.YamlLoadFromFileWasmFailOpenOk/wamr_cpp, where GetParam() = ("wamr", "cpp") (831 ms)
[----------] 1 test from Runtimes/WasmFilterConfigTest (831 ms total)
[----------] Global test environment tear-down
[==========] 1 test from 1 test suite ran. (831 ms total)
[ PASSED ] 0 tests.
[ FAILED ] 1 test, listed below:
[ FAILED ] Runtimes/WasmFilterConfigTest.YamlLoadFromFileWasmFailOpenOk/wamr_cpp, where GetParam() = ("wamr", "cpp")
1 FAILED TEST |
This is because WAMR was updated here, but apparently not in Envoy, and they made a breaking changes in the code. You need to update WAMR (and presumably LLVM) in Envoy first, unfortunately. |
im trying to knock out a set of patch releases (hopefully tomorrow) to address any flagged cves, so trying to push this through ill raise a pr to update wamr now ... |
Signed-off-by: Ryan Northey <[email protected]>
versions updated here - this really needs a better solution for updating |
confirming that this PR at current HEAD + wamr update passes envoy ci |
IMHO, the best way would be if Envoy used But I think there was a supply chain related reason why you want to control them there? |
how would that be different if one of us still has to come here and do this to update? the only difference i think would be that we would probably not actually see the CVE notices |
updated to 9.0.3 |
somewhat involuntarily - it changed all the versions running generate-lock - ie didnt respect the various places the versions are (manually) set |
Signed-off-by: Ryan Northey <[email protected]>
Signed-off-by: Ryan Northey <[email protected]>
Signed-off-by: Ryan Northey <[email protected]>
You'd only need to do a single "atomic" bump of |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
i guess there is some benefit to delegating the dep setup - it would mess up our cve tracking, which tbh, i think this repo depends on as we are the ones updating it
the main complaint is the complexity of doing this - everyone dreads it and as we track the cves it needs to be updated fairly frequently ideally we reduce what is required to a single command - ie |
|
No description provided.