-
Notifications
You must be signed in to change notification settings - Fork 22
Essentials DB version, aws_account_id, region_id, db_id #705
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Dependabot version bumps
fix: workflow file incorrectly formatted
…n-version Fix: Revert removal subscription version
…db-versions OPCR-34: Adding redis_version support to the pro and AA database data sources
…oning-support OPCR-33 aa database versioning support
v2.3.0 - Redis Database version support
docs: updating changelog to also include other changes
docs: also change date of release
…al-overrides Revert regressions in global overrides
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❌ Jit has detected 1 important finding in this PR that you should review.
The finding is detailed below as a comment.
It’s highly recommended that you fix this security issue before merge.
Repository Risks:
- Database Integration: Connects to a database, often involving sensitive data that must be securely managed.
- Internally Accessible: Accessible only within the internal network, reducing exposure to external threats but still requiring proper controls.
Repository Context:
graph LR
GitHub$Repository_U23_RedisLabs/terraform_U2D_provider_U2D_rediscloud["GitHub Repository<br/>RedisLabs/terraform-provider-rediscloud"]:::GitHub$Repository
Team_U23_SecurityManagers["Team<br/>SecurityManagers"]:::Team
DBIntegration_U23_redis["DBIntegration<br/>redis"]:::DBIntegration
Team_U23_SecurityManagers -- "Owns" --> GitHub$Repository_U23_RedisLabs/terraform_U2D_provider_U2D_rediscloud
GitHub$Repository_U23_RedisLabs/terraform_U2D_provider_U2D_rediscloud -- "Is accessible to" --> DBIntegration_U23_redis
package.json
Outdated
| @@ -0,0 +1,5 @@ | |||
| { | |||
| "dependencies": { | |||
| "@anthropic-ai/claude-code": "^2.0.36" | |||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security control: License Compliance Checker
License Compliance Violation
Found 6 violations in @anthropic-ai/claude-code (Apache-2.0 AND LGPL-3.0-or-later, LGPL-3.0-or-later):
@anthropic-ai/claude-code -> @img/sharp-darwin-arm64 -> @img/sharp-libvips-darwin-arm64 (LGPL-3.0-or-later)
@anthropic-ai/claude-code -> @img/sharp-darwin-x64 -> @img/sharp-libvips-darwin-x64 (LGPL-3.0-or-later)
@anthropic-ai/claude-code -> @img/sharp-linux-arm -> @img/sharp-libvips-linux-arm (LGPL-3.0-or-later)
@anthropic-ai/claude-code -> @img/sharp-linux-arm64 -> @img/sharp-libvips-linux-arm64 (LGPL-3.0-or-later)
@anthropic-ai/claude-code -> @img/sharp-linux-x64 -> @img/sharp-libvips-linux-x64 (LGPL-3.0-or-later)
@anthropic-ai/claude-code -> @img/sharp-win32-x64 (Apache-2.0 AND LGPL-3.0-or-later)
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "License Compliance Violation" in package.json; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
1c84767 to
21b80bb
Compare
Added
aws_account_idattribute to Pro and Active-Active subscription resources and data sources.region_idto the attribute reference documentation forrediscloud_active_active_subscription_regionsdata source.region_idattribute torediscloud_regionsdata source.db_idto the attribute reference documentation forrediscloud_databasedata source.