-
Notifications
You must be signed in to change notification settings - Fork 19
chore: pin deps and security fixes #2124
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,7 +1,7 @@ | ||
| package file | ||
|
|
||
| import ( | ||
| "crypto/md5" | ||
| "crypto/sha256" | ||
| "encoding/hex" | ||
| "net/url" | ||
| "os" | ||
|
|
@@ -57,7 +57,7 @@ func convertToLocalPath(uri string) string { | |
| if err != nil { | ||
| return uri | ||
| } | ||
| hash := md5.Sum([]byte(uri)) | ||
| hash := sha256.Sum256([]byte(stripSecrets(uri))) | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Behavior change: cache key now collapses distinct credentials to the same path. Hashing Also worth noting: existing on-disk caches under the old MD5-suffixed directories will be orphaned after this change (harmless, but may warrant a one-time cleanup or a release note). 🤖 Prompt for AI Agents |
||
| p := "" | ||
| if _uri.Host != "" { | ||
| p = _uri.Host + "-" | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Drop OIDC permission while using static AWS keys.
Line 71 grants
id-token: write, but the AWS step still authenticates withECR_AWS_ACCESS_KEY/ECR_AWS_SECRET_ACCESS_KEY. That gives every step in thedockerjob OIDC token access without using it. Remove it unless this job is switching torole-to-assume.🔒 Proposed least-privilege fix
permissions: contents: read - id-token: writeAlso applies to: 104-109
🤖 Prompt for AI Agents