Conversation
This reverts commit 12f877d.
| if flagActionFilePath == stdinFilePath { | ||
| input, err = io.ReadAll(os.Stdin) | ||
| } else { | ||
| input, err = os.ReadFile(flagActionFilePath) |
Check failure
Code scanning / gosec
Potential file inclusion via variable Error
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_api_api_proto_rawDesc), len(file_components_api_api_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_api_api_proto_rawDesc), len(file_components_api_api_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_kubeadm_v20260301_action_proto_rawDesc), len(file_components_kubeadm_v20260301_action_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_kubeadm_v20260301_action_proto_rawDesc), len(file_components_kubeadm_v20260301_action_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_services_actions_actions_proto_rawDesc), len(file_components_services_actions_actions_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_services_actions_actions_proto_rawDesc), len(file_components_services_actions_actions_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_kubebins_v20260301_action_proto_rawDesc), len(file_components_kubebins_v20260301_action_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_kubebins_v20260301_action_proto_rawDesc), len(file_components_kubebins_v20260301_action_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| fmt.Fprintf(os.Stderr, "[%d/%d] %s failed (%s): %v\n", i+1, len(parsed), pa.name, formatDuration(elapsed), err) | ||
| return err | ||
| } | ||
| fmt.Fprintf(os.Stderr, "[%d/%d] %s done (%s)\n", i+1, len(parsed), pa.name, formatDuration(elapsed)) |
Check failure
Code scanning / gosec
XSS via taint analysis Error
| elapsed := time.Since(start) | ||
|
|
||
| if err != nil { | ||
| fmt.Fprintf(os.Stderr, "[%d/%d] %s failed (%s): %v\n", i+1, len(parsed), pa.name, formatDuration(elapsed), err) |
Check failure
Code scanning / gosec
XSS via taint analysis Error
| // applyPlain executes actions with no progress bar or colors. | ||
| func applyPlain(ctx context.Context, conn *grpc.ClientConn, parsed []parsedAction) error { | ||
| for i, pa := range parsed { | ||
| fmt.Fprintf(os.Stderr, "[%d/%d] applying %s\n", i+1, len(parsed), pa.name) |
Check failure
Code scanning / gosec
XSS via taint analysis Error
| "filename", "f", stdinFilePath, | ||
| "Path to the action file to apply. Use '-' to read from stdin.", | ||
| ) | ||
| Command.MarkFlagRequired("filename") |
Check warning
Code scanning / gosec
Errors unhandled Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_linux_v20260301_action_proto_rawDesc), len(file_components_linux_v20260301_action_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_linux_v20260301_action_proto_rawDesc), len(file_components_linux_v20260301_action_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_cri_v20260301_action_proto_rawDesc), len(file_components_cri_v20260301_action_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
| out := protoimpl.TypeBuilder{ | ||
| File: protoimpl.DescBuilder{ | ||
| GoPackagePath: reflect.TypeOf(x{}).PkgPath(), | ||
| RawDescriptor: unsafe.Slice(unsafe.StringData(file_components_cri_v20260301_action_proto_rawDesc), len(file_components_cri_v20260301_action_proto_rawDesc)), |
Check warning
Code scanning / gosec
Use of unsafe calls should be audited Warning
No description provided.