Releases: google/cc-device-plugin
Releases · google/cc-device-plugin
v1.1.4 - Go Version Upgrade
This release focuses on upgrading Go version to address security vulnerabilities.
🔒 Security
- Go Version Upgrade: Upgraded Go version to v1.26.2 to addresses vulnerabilities found in the Go standard library in versions prior to 1.26.2.
v1.1.3 - gRPC Upgrade and Stability Improvement
This release focuses on upgrading gRPC to address security vulnerabilities and improving plugin stability.
🔒 Security
- gRPC Upgrade: Upgraded
google.golang.org/grpctov1.79.3to fix a security vulnerability.
⚙️ Stability & Testing
- Plugin Improvements: Improved plugin retry logic and optimized measurement file copying in
ccdevice.go. - Test Manifest: Added a test pod manifest for vTPM (SEV) validation.
v1.1.2 - Go Version Upgrade and Security Patch
This release focuses on updating the build environment to address security vulnerabilities and updating the deployment manifests.
🔒 Security
- Go Base Image Update: Upgraded the build image in the
Dockerfilefromgolang:1.21togolang:1.26-trixie. This addresses known vulnerabilities in the Go standard library and ensures the plugin is built using an actively supported version.
⚙️ Deployment
- Manifest Update: Updated the default image tag in
manifests/cc-device-plugin.yamlto point to thev1.1.2release image.
v1.1.1 - Security and Documentation Updates
This release focuses on security improvements and documentation updates.
🔒 Security
- Base Image Update: The Dockerfile has been updated to include OS-level package upgrades (
apt updateandapt -y upgrade) and cleanup (apt -y autoremove). This addresses vulnerabilities in the base image.
📝 Documentation
- Hardware Requirements: Updated the
README.mdto clearly specify the technology requirements for AMD SEV-SNP and Intel TDX support. - Prerequisites: Clarified node pool configuration steps for Confidential Computing features.
v1.1.0 - TDX and SEV-SNP Support
Implement Intel TDX and AMD SEV-SNP support.
v1.0.1
Security:
bump google.golang.org/protobuf version to v1.33.0. fix CVE-2024-24786