weaveworks / common

Libraries used in multiple Weave projects
Other
129 stars 92 forks source link

`gorilla/mux` is archived #272

Closed vaguecoder closed 1 year ago

vaguecoder commented 1 year ago

gorilla mux is archived. This repo is using mux for routing. It would be better to step down to net/http or to jump on to other alternatives to remove the dependency on mux. Thoughts?

bboreham commented 1 year ago

My personal inclination is to do that after it becomes necessary. There were no changes in gorilla for years, so presumably it works fine.

tspearconquest commented 1 year ago

Unfortunately, "waiting until it becomes necessary" is not an option for organizations with security requirements. My org wants to adopt FluxCD, but we cannot do so if gorilla is used, because of the risk of an unknown CVE.

Since the Gorilla project is archived, issues cannot be opened against it. Therefore if a security researcher wanted to report a CVE finding, it would not be possible. Various open source vulnerability scanners like Trivy use GHSA to report on CVEs, and GHSA generates vulnerable/fixed versions from issues on the projects themselves.

This could lead to unknown CVEs being present in gorilla which nobody will ever know about.

Please consider this a formal request from a potential customer to replace gorilla.

bboreham commented 1 year ago

Can you point me at the non-archived Flux repo that depends on this repo?

tspearconquest commented 1 year ago

Hi, apologies, I don't know that there is one. I was more making the point that IF Flux uses gorilla... Then this would prevent our adoption of it. :)

we cannot do so if gorilla is used

Added emphasis to the quote

bboreham commented 1 year ago

Looks like the upstream position has changed, so I will close this issue. https://github.com/gorilla/mux/issues/707#issuecomment-1629838706 https://www.reddit.com/r/golang/comments/14xyido/the_gorilla_web_toolkit_project_is_being_revived/

Also, I looked into "if a security researcher wanted to report a CVE finding, it would not be possible", and found several avenues that could be used, e.g. https://github.com/golang/vulndb/issues/new. So this is not a concern.