@sentry/cli
Advanced tools
| #!/bin/bash | ||
| # This script is run by Craft after a release is created. | ||
| # We currently use it to bump the platform-specific optional dependencies to their new versions | ||
| # in the package-lock.json, immediately after a release is created. This is needed for CI to | ||
| # pass after the release is created.c | ||
| set -eux | ||
| OLD_VERSION="${1}" | ||
| NEW_VERSION="${2}" | ||
| git checkout master | ||
| # We need to update the package-lock.json to include the new version of the optional dependencies. | ||
| npm install --package-lock-only | ||
| git add package-lock.json | ||
| # Only commit if there are changes | ||
| git diff --staged --quiet || git commit -m "build(npm): 🤖 Bump optional dependencies to ${NEW_VERSION}" | ||
| git pull --rebase | ||
| git push |
+7
-10
@@ -1,10 +0,7 @@ | ||
| sentry-cli-Darwin-arm64=75305e4f59e4ca561a4f42a53250cf9b3fa342154d125ab7ef85586d0aed8621 | ||
| sentry-cli-Darwin-universal=d4de5a7c75d970970742daf0d1d489a42e40e11a88bb22552d5c532ce97e4025 | ||
| sentry-cli-Darwin-x86_64=e9f3b2f4507ca8853f7b3c13315f0721e8108a202147b0dc48fd90f3f96cd02b | ||
| sentry-cli-Linux-aarch64=a895f1f4adf3641d43ea98f869e46216159e26992dc3a9d2f60728eede143e02 | ||
| sentry-cli-Linux-armv7=305735b535f6c911b99141825654a5cc8c26b749563edb4d9ac6d0328117d47a | ||
| sentry-cli-Linux-i686=fcfcb458ee3819b050072bbc6badfee0eaaea08964a35351429431d5dccdeab4 | ||
| sentry-cli-Linux-x86_64=2fe957bc8f2eccdfde5fd78ebf86ddf66b589e92b9dd40b54ec99cce3fd469e4 | ||
| sentry-cli-Windows-aarch64.exe=a8179f9ac3bf5221fc08a3d45102e53fdd21e0bfd658b2d1ac57ebfb886b5783 | ||
| sentry-cli-Windows-i686.exe=f42bdfb13b54456a716639a79f314b3dbe0fd917d77d40e57b05cc0fa2287d8a | ||
| sentry-cli-Windows-x86_64.exe=b5d60034ad23d03046b9904659d1dd90bd7ca8ac036a5ff6b10547e7869009b4 | ||
| sentry-cli-Linux-aarch64=8c59d5d93a5cb6cc09873a7548e011d6e594f42f88d50e4ad5542c1494586047 | ||
| sentry-cli-Linux-armv7=ba062d3bd4e3ab56e8c9dcb7d85c4b1a17392356e0a393c41195411e30e0070d | ||
| sentry-cli-Linux-i686=600e78cd10dd2a8e3a0deb0ba5ccd14b2be2984c4bae831219b4b430b89d4c02 | ||
| sentry-cli-Linux-x86_64=3bd243899a31908154e19f65219fd13984166c45ce95393aa4d90c4f37c14194 | ||
| sentry-cli-Windows-aarch64.exe=43d87b409c8efda51df6f7866b6421c1bd6d8354032006a46901a652ad9d768d | ||
| sentry-cli-Windows-i686.exe=070f513b06b42604a68fdeb80c6dc2c6b8c9cff139ae5f819f93ad459a093313 | ||
| sentry-cli-Windows-x86_64.exe=0a445473c83d6609ec8fde303588adb5d208615b7f802fdd8f0a37e22d95e426 |
+14
-11
| { | ||
| "name": "@sentry/cli", | ||
| "version": "2.53.0", | ||
| "version": "2.54.0", | ||
| "description": "A command line utility to work with Sentry. https://docs.sentry.io/hosted/learn/cli/", | ||
@@ -35,10 +35,10 @@ "repository": "git://github.com/getsentry/sentry-cli.git", | ||
| "optionalDependencies": { | ||
| "@sentry/cli-darwin": "2.53.0", | ||
| "@sentry/cli-linux-arm": "2.53.0", | ||
| "@sentry/cli-linux-arm64": "2.53.0", | ||
| "@sentry/cli-linux-i686": "2.53.0", | ||
| "@sentry/cli-linux-x64": "2.53.0", | ||
| "@sentry/cli-win32-i686": "2.53.0", | ||
| "@sentry/cli-win32-x64": "2.53.0", | ||
| "@sentry/cli-win32-arm64": "2.53.0" | ||
| "@sentry/cli-darwin": "2.54.0", | ||
| "@sentry/cli-linux-arm": "2.54.0", | ||
| "@sentry/cli-linux-arm64": "2.54.0", | ||
| "@sentry/cli-linux-i686": "2.54.0", | ||
| "@sentry/cli-linux-x64": "2.54.0", | ||
| "@sentry/cli-win32-i686": "2.54.0", | ||
| "@sentry/cli-win32-x64": "2.54.0", | ||
| "@sentry/cli-win32-arm64": "2.54.0" | ||
| }, | ||
@@ -66,5 +66,8 @@ "scripts": { | ||
| "volta": { | ||
| "node": "20.10.0", | ||
| "yarn": "1.22.19" | ||
| "node": "24.8.0", | ||
| "npm": "11.6.0" | ||
| }, | ||
| "overrides": { | ||
| "browserslist": "<4.26.0 || >4.26.0" | ||
| } | ||
| } |
| #!/bin/bash | ||
| set -eux | ||
| DOCKER_IMAGE="messense/rust-musl-cross:${DOCKER_TAG}" | ||
| BUILD_DIR="/work" | ||
| DOCKER_RUN_OPTS=" | ||
| -w ${BUILD_DIR} | ||
| -v $(pwd):${BUILD_DIR}:ro | ||
| -v $(pwd)/target:${BUILD_DIR}/target | ||
| -v $HOME/.cargo/registry:/root/.cargo/registry | ||
| ${DOCKER_IMAGE} | ||
| " | ||
| docker run \ | ||
| ${DOCKER_RUN_OPTS} \ | ||
| cargo build --release --target=${TARGET} --locked | ||
| # Smoke test (but only when building from the same repo). | ||
| # $TRAVIS_PULL_REQUEST_SLUG is set either to head repo slug, or to "" when | ||
| # building branches. | ||
| if [[ "${TRAVIS_PULL_REQUEST_SLUG:-x}" =~ ^(getsentry/sentry-cli)?$ ]]; then | ||
| env | grep SENTRY_ > .env | ||
| docker run \ | ||
| --env-file=.env \ | ||
| ${DOCKER_RUN_OPTS} \ | ||
| cargo run --release --target=${TARGET} -- releases list | ||
| fi | ||
| # Fix permissions for shared directories | ||
| USER_ID=$(id -u) | ||
| GROUP_ID=$(id -g) | ||
| sudo chown -R ${USER_ID}:${GROUP_ID} target/ $HOME/.cargo |
Network access
Supply chain riskThis module accesses the network.
Found 2 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 13 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 2 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 13 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
60551
-0.64%