
Security News
vlt Launches "reproduce": A New Tool Challenging the Limits of Package Provenance
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
github.com/jenkinsci/google-compute-engine-plugin
The Google Compute Engine (GCE) Plugin allows you to use GCE virtual machines (VMs) with Jenkins to execute build tasks. GCE VMs provision quickly, are destroyed by Jenkins when idle, and offer Preemptible VMs that run at a much lower price than regular VMs.
Please see the Google Compute Engine Plugin docs for complete documentation.
See Plugin Source Build Installation to build and install from source.
Support for Jenkins Configuration as Code. See the below examples that are already automatically tested:
Please file feature requests and bug reports under issues.
NOTE: Starting with version 4.0, you will be required to use version 0.9 or higher of the Google OAuth Credentials plugin. Version 0.9 of the OAuth plugin is still compatible with older versions of this plugin. Please verify you are using the correct versions before filing a bug request.
The GCP Jenkins community uses the #gcp-jenkins slack channel on https://googlecloud-community.slack.com to ask questions and share feedback. Invitation link available here: gcp-slack.
See CONTRIBUTING.md
See LICENSE
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
vlt's new "reproduce" tool verifies npm packages against their source code, outperforming traditional provenance adoption in the JavaScript ecosystem.
Research
Security News
Socket researchers uncovered a malicious PyPI package exploiting Deezer’s API to enable coordinated music piracy through API abuse and C2 server control.
Research
The Socket Research Team discovered a malicious npm package, '@ton-wallet/create', stealing cryptocurrency wallet keys from developers and users in the TON ecosystem.