π± backstage: Provide some default values + secrets for the Scaffolder context#1041
Conversation
β¦lder mission Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Welcome to KubeStellar! Thank you for this PR. Before merge, please ensure:
Resources:
A maintainer will review your PR soon. |
π Mission Scan Resultsπ
|
Signed-off-by: Andy Anderson <andy@clubanderson.com>
π Mission Scan Resultsπ
|
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-1068-problem-with-setting-sqs-queue.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/argo-events/argo-events-1132-azure-event-hub-trigger.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-1339-possible-memory-leak-in-sensor.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 4 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \a || (a && b) || c`` |
| Command injection: backtick | \a || c`` |
| Command injection: backtick | \a || (a && b) || c`` |
| Command injection: backtick | \a || c`` |
π solutions/cncf-generated/argo-events/argo-events-3260-argo-lint-should-work-for-argo-event-resources-such-as-eventsou.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-3372-add-allow-adding-readiness-probes-to-eventbus.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-726-the-joinchannel-api-call-is-fully-deprecated-for-new-slack-appli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-920-infinite-creation-of-new-workflows.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-1019-intermittent-404-not-found-on-pulls-github-calls.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-1306-atlantis-outputs-all-refreshed-resources-before-outputting-the-fin.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| Confirm that the issue symptoms are gone. | |
| Confirm Atlantis outputs all refreshed resources before⦠is resolved | |
| Attempt at fixing #1306 |
Might not be the right place for this logic; first time committer, please let me know if there is a better place to do this
See the source issue for community-verified solutions.
Apply the fix for Atlantis outputs all refreshed resources before outputtingβ¦
Inspect the relevant atlantis configuration:
`` |
π solutions/cncf-generated/atlantis/atlantis-2054-terraform-log-streaming-for-custom-workflows.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n atlantis -l app.kubernetes.io/name=atlantis | |
| helm list -n atlantis 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/atlantis/atlantis-3474-changes-in-recloning-for-merge-strategy-leads-to-disappearing-plan.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-3538-support-forgejo-gitea-webhooks.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
| // code taken from go-github |
func NewEnterpriseClient(baseURL, uploadURL string, httpClient *http.Client) (*Client, error) {
baseEndpoint, err := url.Parse(baseURL)
if err != nil {
return nil, err
}
if !strings.HasSuffix(baseEndpoint.Path, "/") {
baseEndpoint.Path += "/"
}
if !strings.HasSuffix(baseEndpoint.Path, "/api/v3/") &&
!strings.HasPrefix(baseEndpoint.Host, "api.") &&
!strings.Contains(baseEndpoint.Host, ".api.") {
baseEndpoint.Path += "api/v3/"
}
uploadEndpoint, err := url.Parse(uploadURL)
if err != nil {
return nil, err
}
if !strings.HasSuffix(uploadEndpoin
`| | Command injection: backtick |`bash
kubectl get pods -n atlantis -l app.kubernetes.io/name=atlantis
helm list -n atlantis 2>/dev/null || echo "Not installed via Helm"
`` |
π solutions/cncf-generated/atlantis/atlantis-3845-atlantis-unlock-fails-to-delete-plan-of-environment-with-project-n.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-418-support-installation-as-a-github-app.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n atlantis -l app.kubernetes.io/name=atlantis | |
| helm list -n atlantis 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/atlantis/atlantis-5389-atlantis-runs-plans-on-prs-even-when-no-files-matching-when-modifi.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-18422-bug-report-createunifiedtheme-does-not-allow-overrides-for-backs.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
| export const lightThemeNew = createTheme({ | |
| ...lightTheme, | |
| defaultPageTheme: 'home', | |
| pageTheme: newPageTheme, | |
| }); | |
| `` |
π solutions/cncf-generated/backstage/backstage-6057-techdocs-support-readme-md-or-docs-readme-md-to-be-treated-as-doc.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-6568-scaffolder-have-a-way-to-do-integration-tests-for-fetch-template.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-7671-support-google-analytics-4-as-a-analytics-integration.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-8090-plugin-api-docs-support-openapi-3-1.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-9461-provide-some-default-values-secrets-for-the-scaffolder-context.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-23516-support-of-dynamic-subcolumns-in-tables.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | 2:: |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \sql |
| CREATE TABLE example (data Object('JSON')) ENGINE = MergeTree ORDER BY tuple(); | |
| INSERT INTO example FORMAT JSONEachRow {"data": {"name": "John", "age": 42, "location": {"country": "USA", "city": "New York"}}}; | |
| SELECT data.name, data.location.city FROM example; | |
| `` |
π solutions/cncf-generated/clickhouse/clickhouse-26748-parallel-processing-on-replicas-reworked.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-28961-local-cache-for-remote-filesystem-rfc.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-36536-implement-ulid-function.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-39459-add-jetstream-persistence-support-for-nats.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
| CREATE TABLE event_queue | |
| ( |
raw String
) ENGINE = NATS SETTINGS
nats_url = '127.0.0.1:4222',
nats_queue_group='event_queue',
nats_subjects = 'EVENTS_FOR_CH',
nats_format = 'RawBLOB';
`` |
π solutions/cncf-generated/clickhouse/clickhouse-41817-rfc-table-engine-with-unique-key-support.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-56826-full-mpp-style-execution-mode-and-a-cbo-optimizer.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-8702-add-bitcount-function.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/helm/helm-3208-helm-upgrade-install-no-longer-works.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/helm/helm-5046-helm-completion-fails-in-zsh-prezto-with-bad-math-expression-operand-e.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/helm/helm-6794-enable-release-namespace-creation-in-helm3.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/k8up/k8up-106-unexpected-status-code-200-while-pushing-to-pushgateway.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n k8up -l app.kubernetes.io/name=k8up | |
| helm list -n k8up 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/k8up/k8up-116-support-auto-schedules.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n k8up -l app.kubernetes.io/name=k8up | |
| helm list -n k8up 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kagent/kagent-171-expose-kagent-functionality-through-the-api-for-external-consumption.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/channels/1346225185166065826/1346225185841221644/1351530953939484705 |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kagent -l app.kubernetes.io/name=kagent | |
| helm list -n kagent 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kagent/kagent-183-feature-add-support-for-aws-bedrock-models.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| AWS Secret Key | AWS_SECRET_ACCESS_KEY=<secret-key> |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kagent -l app.kubernetes.io/name=kagent | |
| helm list -n kagent 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kanister/kanister-1622-bug-problem-with-long-running-phase.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kubearmor/kubearmor-1179-index-out-of-bound-on-containers-with-short-names.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | 405b4c292a7a6afcedd56f6874173dd865d49798a347762649689e40a6ef3b15 |
β Security: No malicious content detected
π solutions/cncf-generated/kubearmor/kubearmor-1390-feat-leverage-oci-hooks-for-container-events.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kubearmor -l app.kubernetes.io/name=kubearmor | |
| helm list -n kubearmor 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kubearmor/kubearmor-756-minikube-start-is-failing-with-latest-version-of-minikube-1-26-and.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kubearmor/kubearmor-889-go-vulnerability-scan.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kubearmor -l app.kubernetes.io/name=kubearmor | |
| helm list -n kubearmor 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kubevirt/kubevirt-15711-source-vm-remains-in-running-after-live-migration-resulting-in-tw.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-12049-bug-certificate-renewer-does-not-remove-old-ca-certificate-from-se.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-13310-bug-imagepullsecret-doesn-t-render-properly.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/kyverno/kyverno/commit/385eef980e59a2965570a2ef91350e7440d08e84 |
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-13683-bug-helm-bitnami-kubectl-will-soon-be-suject-to-bitnami-registrati.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-3411-feature-json-logging.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kyverno -l app.kubernetes.io/name=kyverno | |
| helm list -n kyverno 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kyverno/kyverno-3542-feature-extend-foreach-to-cover-generate-rules.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kyverno -l app.kubernetes.io/name=kyverno | |
| helm list -n kyverno 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kyverno/kyverno-9930-bug-kyverno-processes-all-pods-in-a-mutate-existing-namespaced-poli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/localai/localai-2018-please-support-reranker-api.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n localai -l app.kubernetes.io/name=localai | |
| helm list -n localai 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/ollama/ollama-2430-v1-models-openai-compatibility-api.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/ollama/ollama-3690-support-vision-models-image-input-in-openai-api-chat-completions.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/ollama/ollama-403-ollama-windows-version.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/ollama/ollama-4051-enable-flash-attention-on-ggml-gguf-feature-now-merged-into-llama-cp.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| Apply the fix for Enable Flash Attention on GGML/GGUF (feature now merged⦠| |
| Review the relevant ollama configuration: | |
| Flash Attention has landed in llama.cpp (ggml-org/llama.cpp#5021). |
The tldr; is simply to pass the -fa flag to llama.cppβs server.
Review ollama configuration
Verify your ollama version and configuration:
`` |
π solutions/cncf-generated/piraeus-datastore/piraeus-datastore-53-drbd-kernel-module-injector-fails-when-using-drbd9-centos7-.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ ; if gcc -Wp,-MD,/drbd/drbd/.compat_test.4.15.18/.have_blk_queue_split_q_bio_bioset.result.d -nostdinc -isystem /usr/lib/gcc/x86_64-linux-gnu/7/include -I/drbd/drbd -I/drbd/drbd/drbd-headers -I./arch/x86/include -I./arch/x86/include/generated -I./include -I./arch/x86/include/uapi -I./arch/x86/include/generated/uapi -I./include/uapi -I./include/generated/uapi -include ./include/linux/kconfig.h -Iubuntu/include -D__KERNEL__ -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs -fno-strict-aliasing -fno-common -fshort-wchar -Werror-implicit-function-declaration -Wno-format-security -std=gnu89 -fno-PIE -mno-sse -mno-mmx -mno-sse2 -mno-3dnow -mno-avx -m64 -falign-jum |
kubectl logs -f piraeus-op-ns-node-mf7zf -c drbd-kernel-module-injector
Need a git checkout to regenerate drbd/.drbd_git_revision
make[1]: Entering directory `` |
π solutions/cncf-generated/podman-container-tools/podman-container-tools-14303-cannot-start-machine-with-podman-version-4-1-0-in-m.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | ::1 |
| IPv6 address | ::1 |
β Security: No malicious content detected
π solutions/cncf-generated/podman-container-tools/podman-container-tools-15580-docker-compose-up-force-recreate-fails-with-network.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/podman-container-tools/podman-container-tools-17382-bug-podman-build-secrets-with-environment-variables.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| FROM python:3.9-slim-bullseye | |
| RUN --mount=type=secret,id=mysecret echo "Secret is" && cat /run/secrets/mysecret | |
| `` | |
| Command injection: backtick | \ |
| FROM python:3.9-slim-bullseye | |
| RUN --mount=type=secret,id=mysecret echo "Secret is" && cat /run/secrets/mysecret | |
| `` |
π solutions/cncf-generated/podman-container-tools/podman-container-tools-21681-mac-current-head-errors-out-on-add-host-using-host-.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | 0cbcd3af7f916dde233efbe6410fef54f439395aa14797fe165ecec223a4428d |
| Base64-encoded long blob | a90605b73f90a2cab9db7142643a111f010ebabc6d8a74eb0bfeda0f525f97cf |
| Base64-encoded long blob | a90605b73f90a2cab9db7142643a111f010ebabc6d8a74eb0bfeda0f525f97cf |
π¨ Security: 4 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
host_gateway=$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")
docker run --add-host foobar:"$host_gateway" -it busybox
`| | Command injection: backtick |`
host_gateway=$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")docker run --add-host foobar:"$host_gateway" -it busybox
`| | Command injection: $() in string |$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")| | Command injection: $() in string |$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")` |
π solutions/cncf-generated/podman-container-tools/podman-container-tools-27628-add-support-to-migrate-data-in-boltdb-to-sqlite.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/podman-container-tools/podman-container-tools-9169-rfe-make-docker-compose-work-with-rootless-podman.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | 76146dacacd305f5bbb4af41b6d107c06679db432fd1b5de4dd9577a56789dcf |
| Base64-encoded long blob | 8c6053d81a45b455a79e7abbc5b4d8410735f060634d345f70b0530b1d50b2b6 |
| Base64-encoded long blob | 76146dacacd305f5bbb4af41b6d107c06679db432fd1b5de4dd9577a56789dcf |
| Base64-encoded long blob | 8c6053d81a45b455a79e7abbc5b4d8410735f060634d345f70b0530b1d50b2b6 |
β Security: No malicious content detected
π solutions/cncf-generated/tikv/tikv-11940-tikv-running-over-2-years-may-panic.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | e:: |
| IPv6 address | ::f |
| IPv6 address | ::F |
| IPv6 address | ::ca |
| IPv6 address | e:: |
| IPv6 address | ::f |
| IPv6 address | ::F |
| IPv6 address | ::ca |
β Security: No malicious content detected
π solutions/cncf-generated/tikv/tikv-18838-implement-compareanddelete-for-the-rawkv-api.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/pingcap/kvproto/commit/3cb428bfb56c52446311d5d4fd40a36119c526a2 |
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-11035-ssh-ca-generate-signing-key-to-support-ed25519-keys.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ types (which match OpenSSH's constants), thus making key bits only relevant for RSA keys. |
| Test that the new capability is working as expected. | |
| Confirm the feature described in "SSH CA: generate_signing_key to support ed25519 keys" is functioning correctly. | |
| Verify the feature works | |
| Curious about general sentiment here; if it is positive, I'll add docs and a changelog and we can decide what to do about the UI (leave it as-is or drop it for future work). |
See hashicorp/vault#11035 for context. We derive types from the `` |
π solutions/cncf-generated/vault/vault-14671-regression-oidc-login-role-with-oidc-role-type-is-not-allowed.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-1468-patch-api-needed-for-updating-multiple-secrets-stored-at-a-single-uri.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-14696-identity-backend-audit-hmac-request-response-cannot-be-configured.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-21465-v1-14-0-breaks-aws-eks-irsa-credentials-for-dynamodb-backend.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-27772-vault-oidc-flow-breaks-fails-to-prompt-users-to-login-when-their-cli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
start the two versions of vault
[~]$ docker compose up
configure terraform
[~]$ terraform init
; terraform workspace new broken
; terraform workspace new working
bootstrap the older version of vault that wasn't busted (v1.15.6)
[~]$ terraform workspace select working
[~]$ terraform apply -var=vault_addr=http://localhost:8200
bootstrap a more modern version where vault appears busted
[~]$ terraform workspace select broken
[~]$ terraform apply -var=vault_addr=http://localhost:8201
`` |
π solutions/cncf-generated/vault/vault-3790-aws-backend-stsassume-with-external-id.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-8216-vault-agent-doesn-t-honor-sighup-signal.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
Upgrade to Vault 1.13+ which includes Agent reloadable config
vault version
Send SIGHUP to the agent process to reload configuration
kill -HUP $(pgrep -f "vault agent")
`| | Command injection: $() in string |$(pgrep -f "vault agent")` |
π solutions/cncf-generated/vault/vault-8649-add-telemetry-to-vault-agent.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-8754-sending-arbitrary-headers-in-cli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 5 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick |
\yaml |
| function vault-curl() { | |
| curl_command="$(vault ${@} -output-curl-string)" | |
| curl_command="${curl_command#curl }" | |
| curl -v --fail -H "Authorization: Bearer |
|
| } |
vault-curl operator generate-root -init
`| | Command injection: $() in string || | Command injection: $() in string |$(gcloud auth print-identity-token)| | Command injection: $() in string || | Command injection: $() in string |$(gcloud auth print-identity-token)` |
|
Thank you for your contribution! Your PR has been merged. Check out what's new:
Stay connected: Slack #kubestellar-dev | Multi-Cluster Survey |
π± New Mission: backstage β Provide some default values + secrets for the Scaffolder context
Type: feature | Source: backstage/backstage#9461 (22 reactions)
File:
solutions/cncf-generated/backstage/backstage-9461-provide-some-default-values-secrets-for-the-scaffolder-context.jsonCopilot: Please enhance this mission
The JSON file has been pre-filled with content from the source issue. Please improve:
node scripts/scanner.mjsto validateAuto-generated by CNCF Mission Generator