
Research
Security News
The Growing Risk of Malicious Browser Extensions
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
@bcgov/pipeline-cli
Advanced tools
The pipeline-cli
is an opinionated utility wrapper around oc CLI.
It enables developer to run stages of their continuous delivery pipeline from their own workstation or form within a CI/CD server.
The utitility support and promote the following Continuous Delivery patterns:
As well as support a Github Flow.
This is OpenShift built-in pipeline build strategy.
Pro:
Con:
Jenkins Shared Library addresses the reusablity aspect, and make it easier to share common pipeline tasks/stages.
Pro:
Con:
echo
to try to identify issues.Pro:
Con:
Pro:
Con:
Helm helps you manage Kubernetes applications — Helm Charts help you define, install, and upgrade even the most complex Kubernetes application.
The Operator Framework is an open source toolkit to manage Kubernetes native applications, called Operators, in an effective, automated, and scalable way.
Odo utilizes Source-to-Image to create reproducible Docker images from source code. Odo handles the complex task of building, pushing and deploying your source code.
DEBUG=info:* npm run coverage
rm -rf node_modules; npm install
npm link
FAQs
Pipeline Utility
The npm package @bcgov/pipeline-cli receives a total of 14 weekly downloads. As such, @bcgov/pipeline-cli popularity was classified as not popular.
We found that @bcgov/pipeline-cli demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 10 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.
Research
Security News
An in-depth analysis of credential stealers, crypto drainers, cryptojackers, and clipboard hijackers abusing open source package registries to compromise Web3 development environments.
Security News
pnpm 10.12.1 introduces a global virtual store for faster installs and new options for managing dependencies with version catalogs.