You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@dolphinscheduler.apache.org by GitBox <gi...@apache.org> on 2022/11/05 14:40:07 UTC

[GitHub] [dolphinscheduler] caishunfeng commented on pull request #12726: [Improvement-12029][dolphinscheduler-api] Upgrade the snakeyaml version to avoid vulnerabilities

caishunfeng commented on PR #12726:
URL: https://github.com/apache/dolphinscheduler/pull/12726#issuecomment-1304559004

   > @caishunfeng The version currently used by other components is vulnerable. Do I need to modify it? Are there any risks? 
   
   The `OWASP` is not a requirement for the CI pass, it can be fixed if you are interested.
   
   > In addition, how does CI retry? 
   
   I had rerun the e2e CI.
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscribe@dolphinscheduler.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org