@cisco/releases
Advanced tools
+11
-0
@@ -6,2 +6,13 @@ # Change Log | ||
| ## [0.10.6](https://github.com/CiscoDevNet/essentials/compare/@cisco/releases@0.10.5...@cisco/releases@0.10.6) (2022-06-08) | ||
| ### Bug Fixes | ||
| * **releases:** write image name explicitly to deployment ([28b6cb1](https://github.com/CiscoDevNet/essentials/commit/28b6cb1c0400885f0ce57be706f9841cc4957d0f)) | ||
| ## [0.10.5](https://github.com/CiscoDevNet/essentials/compare/@cisco/releases@0.10.4...@cisco/releases@0.10.5) (2022-05-11) | ||
@@ -8,0 +19,0 @@ |
+2
-2
| { | ||
| "name": "@cisco/releases", | ||
| "version": "0.10.5", | ||
| "version": "0.10.6", | ||
| "description": "Build Docker images and deploy containers to Google Cloud or OpenShift", | ||
@@ -37,3 +37,3 @@ "main": "src/index.js", | ||
| }, | ||
| "gitHead": "0ffc0d033665516eb3bba560cf846384a0fe7fac" | ||
| "gitHead": "14b35121dfa0b0bba10c785ad7847ac79112b27b" | ||
| } |
@@ -144,3 +144,8 @@ /** | ||
| const { spec } = deploymentData.spec.template; | ||
| const container = spec.containers[0]; | ||
| // Configure image. | ||
| container.image = this.fullImageName; | ||
| // Configure secret. | ||
| const imagePullSecret = Release.read(this.imagePullSecretPath); | ||
@@ -151,5 +156,3 @@ const { name } = imagePullSecret.metadata; | ||
| if (secret) { | ||
| spec.containers[0].volumeMounts = [ | ||
| { name: SECRETS_VOLUME_NAME, mountPath }, | ||
| ]; | ||
| container.volumeMounts = [{ name: SECRETS_VOLUME_NAME, mountPath }]; | ||
| spec.volumes = [{ name: SECRETS_VOLUME_NAME, secret: { secretName } }]; | ||
@@ -156,0 +159,0 @@ } |
Sorry, the diff of this file is not supported yet
| kind: Service | ||
| apiVersion: v1 | ||
| metadata: | ||
| name: grover | ||
| namespace: gve-bot-dev-oa1f | ||
| uid: 81694f34-37d7-4f80-b7c1-7a546aef86bd | ||
| resourceVersion: "310687980" | ||
| creationTimestamp: "2022-04-07T21:04:33Z" | ||
| labels: | ||
| app: grover | ||
| annotations: | ||
| kubectl.kubernetes.io/last-applied-configuration: > | ||
| {"apiVersion":"v1","kind":"Service","metadata":{"annotations":{},"creationTimestamp":"2022-04-07T21:04:05Z","labels":{"app":"grover"},"name":"grover","namespace":"gve-bot-dev-oa1f","uid":"10d0ac56-da7d-49c7-8342-188957d2bc78"},"spec":{"ipFamilies":["IPv4"],"ipFamilyPolicy":"SingleStack","ports":[{"name":"3000","port":3000,"protocol":"TCP","targetPort":3000}],"selector":{"app":"grover"},"sessionAffinity":"None","type":"ClusterIP"},"status":{"loadBalancer":{}}} | ||
| managedFields: | ||
| - manager: kubectl-create | ||
| operation: Update | ||
| apiVersion: v1 | ||
| time: "2022-04-07T21:04:33Z" | ||
| fieldsType: FieldsV1 | ||
| fieldsV1: | ||
| "f:metadata": | ||
| "f:annotations": | ||
| .: {} | ||
| "f:kubectl.kubernetes.io/last-applied-configuration": {} | ||
| "f:labels": | ||
| .: {} | ||
| "f:app": {} | ||
| "f:spec": | ||
| "f:ipFamilies": {} | ||
| "f:ipFamilyPolicy": {} | ||
| "f:ports": | ||
| .: {} | ||
| 'k:{"port":3000,"protocol":"TCP"}': | ||
| .: {} | ||
| "f:port": {} | ||
| "f:protocol": {} | ||
| "f:targetPort": {} | ||
| "f:selector": | ||
| .: {} | ||
| "f:app": {} | ||
| "f:sessionAffinity": {} | ||
| "f:type": {} | ||
| - manager: Mozilla | ||
| operation: Update | ||
| apiVersion: v1 | ||
| time: "2022-04-07T21:09:34Z" | ||
| fieldsType: FieldsV1 | ||
| fieldsV1: | ||
| "f:spec": | ||
| "f:ports": | ||
| 'k:{"port":3000,"protocol":"TCP"}': | ||
| "f:name": {} | ||
| "f:selector": | ||
| "f:deploymentconfig": {} | ||
| spec: | ||
| ports: | ||
| - name: 3000-tcp | ||
| protocol: TCP | ||
| port: 3000 | ||
| targetPort: 3000 | ||
| selector: | ||
| app: grover | ||
| deploymentconfig: grover | ||
| clusterIP: 10.38.197.190 | ||
| clusterIPs: | ||
| - 10.38.197.190 | ||
| type: ClusterIP | ||
| sessionAffinity: None | ||
| ipFamilies: | ||
| - IPv4 | ||
| ipFamilyPolicy: SingleStack | ||
| status: | ||
| loadBalancer: {} |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
1020
0.2%41355
-9.98%19
-9.52%