serverless-plugin-git-variables
Advanced tools
+1
-1
@@ -122,3 +122,3 @@ 'use strict'; | ||
| value = yield _exec('git tag --points-at HEAD'); | ||
| value = value.split(_os2.default.EOL).join(','); | ||
| value = value.split(_os2.default.EOL).join('::'); | ||
| if (value === '') { | ||
@@ -125,0 +125,0 @@ value = yield _exec('git rev-parse --short HEAD'); |
+1
-1
| { | ||
| "name": "serverless-plugin-git-variables", | ||
| "version": "3.5.0", | ||
| "version": "4.0.0", | ||
| "engines": { | ||
@@ -5,0 +5,0 @@ "node": ">=7.0" |
+3
-1
@@ -66,3 +66,3 @@ # serverless-plugin-git-variables | ||
| The tags (`${git:tags}`) is used to get info about which git tags (separated by comma) are pointing to current commit and if none it will show commit ID as fallback. | ||
| The tags (`${git:tags}`) is used to get info about which git tags (separated by ::) are pointing to current commit and if none it will show commit ID as fallback. | ||
@@ -75,2 +75,4 @@ # Serverless Version Support | ||
| # Version History | ||
| * 4.0.0 | ||
| - Change `tags` separator from ',' to '::' to conform to the AWS tag regex | ||
| * 3.5.0 | ||
@@ -77,0 +79,0 @@ - Add ability to specify whitelist of variables to set on the environment or in tags |
+1
-1
@@ -87,3 +87,3 @@ // TODO: Consider using nodegit instead | ||
| value = await _exec('git tag --points-at HEAD') | ||
| value = value.split(os.EOL).join(',') | ||
| value = value.split(os.EOL).join('::') | ||
| if (value === '') { | ||
@@ -90,0 +90,0 @@ value = await _exec('git rev-parse --short HEAD') |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
19534
0.43%108
1.89%