-
Notifications
You must be signed in to change notification settings - Fork 716
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[LFX-Q2]: Enhance/Upgrade chaos operator and chaos exporter module #3969
Comments
Hey @imrajdas, I am currently exploring go and have some understanding of backend development. I'd love to work on this project as a part of lfx mentorship, I believe this project will be a great opportunity for me to apply my skills and gain hands-on experience. So will it be idle for me to apply for the project ? |
Hey @imrajdas, I am currently a final year student at IIT BHU. I have decent knowledge of backend development and Kubernetes and have been exploring Golang recently. I find this project interesting and would like to apply for it under the LFX mentorship. Thank you. |
Hi Everyone, Please submit your application to LFX, and we will review it. |
Hi @imrajdas i have seen the project objectives and i have studied on chaos exporter
Imported the promhttp package for a simpler handler registration and serving of the metrics endpoint. Updated the way the HTTP server is started using an anonymous goroutine and a proper error handling check. This ensures that any potential errors during server startup are handled correctly. Simplified the failChaosExperiment() function by removing the placeholder comment. You can replace the comment with the code that simulates a failed chaos experiment. Aligned the closing parentheses for the chaosExperimentFailures counter declaration to improve readability. for fixing the security vulnerabilities issued by trivy and golangcli-int
In this example, we have added a sanitizeInput() function to sanitize the user input and prevent SQL injection. The function applies appropriate sanitization techniques specific to your database engine. Additionally, we use a prepared statement (stmt) with a parameterized query to safely execute the SQL query. By passing the sanitized input as a parameter to the query, we avoid direct concatenation of user input into the SQL statement, thereby mitigating the SQL injection vulnerability. Please note that the above example is a simplified illustration, and the actual fix may vary depending on the specific vulnerability reported and the structure of the exporter.go file in the Chaos Exporter repository. It is important to carefully analyze the reported vulnerability and refer to relevant secure coding practices and documentation to implement the appropriate fixes. Any inputs and further guidance will be much appreciated. |
Hi all, Today(May 23, 5:00 PM PDT) is the last day to submit your proposal to the LFX portal Apply link- https://mentorship.lfx.linuxfoundation.org/project/bd6e875a-a64c-4405-af1c-677d8c45014b |
Hey @imrajdas . Excited to work on this particular LFX Mentorship issue . I have submitted the respective details in the LFX mentorship portal |
Hi All, We have finalized the LFX mentee. We participate in LFX every 3 months. Please apply it for next term in case you didn't get selected. Please feel free to contribute to the LitmusChaos project or join the monthly community call to learn about the project. |
This task is divided into multiple subtasks
operator-sdk
version and refactor code required for version upgrade inChaos Operator
Chaos Exporter
and refactor code required for version upgradechaos exporter
chaos-operator
andchaos-exporter
repositoryAdditional:
Repository Ref
Note:
The text was updated successfully, but these errors were encountered: