π± contour: Add Per-HTTPProxy HTTP-Version Support to Address HTTP2 Coalescing Issues with#1243
Conversation
β¦2 mission Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Welcome to KubeStellar! Thank you for this PR. Before merge, please ensure:
Resources:
A maintainer will review your PR soon. |
π Mission Scan Resultsπ
|
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n contour -l app.kubernetes.io/name=contour | |
| helm list -n contour 2>/dev/null || echo "Not installed via Helm" | |
| `` |
Signed-off-by: Andrew Anderson <andy@clubanderson.com>
π Mission Scan Resultsπ
|
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-rollouts -l app.kubernetes.io/name=argo-rollouts | |
| helm list -n argo-rollouts 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-rollouts/argo-rollouts-2050-argo-rollouts-will-scale-down-stable-when-canary-is-missing-p.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/argo-rollouts/argo-rollouts-3991-add-an-option-to-proceed-to-the-next-rollout-step-based-on-a-.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
| func allDesiredAreAvailable(rs *appsv1.ReplicaSet, desired int32) bool { |
return rs != nil && desired == *rs.Spec.Replicas && desired == rs.Status.AvailableReplicas
}
`| | Command injection: backtick |`bash
kubectl get pods -n argo-rollouts -l app.kubernetes.io/name=argo-rollouts
helm list -n argo-rollouts 2>/dev/null || echo "Not installed via Helm"
`` |
π solutions/cncf-generated/argo-rollouts/argo-rollouts-455-ability-to-add-ephemeral-labels-to-canary-stable-pods.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-rollouts -l app.kubernetes.io/name=argo-rollouts | |
| helm list -n argo-rollouts 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-rollouts/argo-rollouts-574-rollback-windows-for-fast-tracked-rollbacks.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-rollouts -l app.kubernetes.io/name=argo-rollouts | |
| helm list -n argo-rollouts 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/cdk-for-kubernetes-cdk8s-/cdk-for-kubernetes-cdk8s-2159-allow-overriding-output-directory-for-imports-in-c.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 3 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| export interface Config { | |
| readonly app?: string; | |
| readonly language?: Language; |
`| | Command injection: backtick |`yaml
export interface Config {
readonly app?: string;
readonly language?: Language;
readonly output?: string;
readonly imports?: string[];
}
const DEFAULTS: Config = {
output: 'dist',
};
`| | Command injection: backtick |`bash
kubectl get pods -n cdk-for-kubernetes-cdk8s- -l app.kubernetes.io/name=cdk-for-kubernetes-cdk8s-
helm list -n cdk-for-kubernetes-cdk8s- 2>/dev/null || echo "Not installed via Helm"
`` |
π solutions/cncf-generated/cert-manager/cert-manager-1083-godaddy-dns01-support.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n cert-manager -l app.kubernetes.io/name=cert-manager | |
| helm list -n cert-manager 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/cert-manager/cert-manager-2237-set-a-commonname-when-using-ingress-shim.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n cert-manager -l app.kubernetes.io/name=cert-manager | |
| helm list -n cert-manager 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/cert-manager/cert-manager-3958-sane-defaults-for-certificate-revision-history-limit.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n cert-manager -l app.kubernetes.io/name=cert-manager | |
| helm list -n cert-manager 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/cert-manager/cert-manager-5904-support-azure-private-dns-zones-for-dns-challenge.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n cert-manager -l app.kubernetes.io/name=cert-manager | |
| helm list -n cert-manager 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/cert-manager/cert-manager-7331-clusterissuer-secrets-and-challenges-unable-to-find-secret.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/consul/consul-10246-envoy-command-deadlocks-when-pipe-buffers-are-too-small.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| [edit] This was originally reported on consul-k8s but transferred as it's really a core consul issue. |
The tl;dr is that if the pipe buffer is reduced to one page, or if there is an abnormally large bootstrap file the command can block.
Review consul configuration
Check for the issue in your consul deployment:
`` |
π solutions/cncf-generated/consul/consul-11363-connect-vault-ca-token-updates-are-not-retained-on-restart.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv4 address | 172.16.18.231 |
| IPv4 address | 172.16.18.231 |
| IPv4 address | 172.16.19.63 |
| IPv4 address | 172.16.18.7 |
| IPv4 address | 172.16.18.231 |
| IPv4 address | 172.16.18.231 |
β Security: No malicious content detected
π solutions/cncf-generated/consul/consul-15470-transparent-proxy-dialed-directly-not-working-on-consul-1-14-0-and-.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/consul/consul-4977-allow-setting-of-secretid-and-accessorid-on-acl-tokens-on-consul-1-4.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n consul -l app.kubernetes.io/name=consul | |
| helm list -n consul 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/consul/consul-865-cors-requests-fail-with-a-405-method-not-allow-for-options.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv4 address | 192.168.111.30 |
| IPv4 address | 192.168.111.30 |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n consul -l app.kubernetes.io/name=consul | |
| helm list -n consul 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/consul/consul-9319-config-entry-replication-of-ingress-gateway-entries-fails-validation.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/consul/consul-9852-prebuilts-for-darwin-arm64-m1-apple-silicon.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n consul -l app.kubernetes.io/name=consul | |
| helm list -n consul 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/contour/contour-1228-please-add-support-for-wildcard-virtual-hosts.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n contour -l app.kubernetes.io/name=contour | |
| helm list -n contour 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/contour/contour-1894-instructions-for-presenting-grpc-services-needs-a-guide.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n contour -l app.kubernetes.io/name=contour | |
| helm list -n contour 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/contour/contour-5822-add-per-httpproxy-http-version-support-to-address-http2-coalescing-.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n projectcontour -l app.kubernetes.io/name=contour | |
| helm list -n projectcontour 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/dragonfly/dragonfly-2930-add-support-for-pub-sub-acls.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n dragonfly-system -l app.kubernetes.io/name=dragonfly | |
| helm list -n dragonfly-system 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/dragonfly/dragonfly-3644-healthcheck-in-dragonfly-v1-22-0-is-failing.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/dragonfly/dragonfly-57-helm-chart.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n dragonfly -l app.kubernetes.io/name=dragonfly | |
| helm list -n dragonfly 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/dragonfly/dragonfly-59-support-stream-data-structure.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n dragonfly -l app.kubernetes.io/name=dragonfly | |
| helm list -n dragonfly 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/dragonfly/dragonfly-782-dragonfly-does-not-work-with-nest-bull.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/taskforcesh/bullmq/blob/master/src/commands/includes/cleanList |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \EVAL "redis.call('RPUSH', 'mylist', 'one'); redis.call('LSET', 'mylist', 0, '');" 0`` |
π solutions/cncf-generated/dragonfly/dragonfly-925-missing-pfcount.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | 1:: |
| IPv6 address | ::C |
| IPv6 address | 1:: |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n dragonfly -l app.kubernetes.io/name=dragonfly | |
| helm list -n dragonfly 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/keda/keda-5355-add-option-for-the-datadog-scaler-to-use-the-datadog-cluster-agent-as-.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n keda -l app.kubernetes.io/name=keda | |
| helm list -n keda 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/keda/keda-853-apache-pulsar-scaler.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n keda -l app.kubernetes.io/name=keda | |
| helm list -n keda 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/lima/lima-1003-add-support-for-vnc-in-addition-to-the-current-qemu-displays.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/lima/lima-3648-docs-discourage-tmp-lima-on-shared-hosts-and-deprecate-it.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/litellm/litellm-13340-bug-ollama-gpt-oss-not-working.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/litellm/litellm-13402-bug-openai-does-not-support-parameters-reasoning-effort-for-model-.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/litellm/litellm-13781-bug-openai-gpt-5-chat-model-does-not-support-temperature-parameter.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/litellm/litellm-14521-bug-runtimeerror-queue-is-bound-to-a-different-event-loop-with-pyt.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/litellm/litellm-14704-bug-tool-choice-rejected-when-calling-azure-gpt-5-models.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/litellm/litellm-14846-bug-litellm-proxy-for-codex-cli-does-not-work-with-the-new-gpt-5-c.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | e:: |
| IPv6 address | e:: |
β Security: No malicious content detected
π solutions/cncf-generated/litellm/litellm-16810-bug-sudden-switch-to-responses-from-completions-causing-failures.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/litellm/litellm-19984-bug-vertexai-anthropic-passthrough-fails-with-prompt-caching-scope.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/litellm/litellm-7560-bug-valid-config-keys-have-changed-in-v2.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/BerriAI/litellm/blob/f1540ceeab9a8ca1335a49b84be95e27ea7b89de/litellm/typ... |
β Security: No malicious content detected
π solutions/cncf-generated/litellm/litellm-7877-feature-deepseek-r1-support.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n litellm -l app.kubernetes.io/name=litellm | |
| helm list -n litellm 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/litmus/litmus-4336-unable-to-add-tags-to-an-existing-experiment.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/litmus/litmus-4532-failed-to-get-argo-pod-logs-is-not-intuitive.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n litmus -l app.kubernetes.io/name=litmus | |
| helm list -n litmus 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/longhorn/longhorn-11039-improvement-expose-spdk-ublk-parameters.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/longhorn/longhorn-11635-improvement-introduce-concurrent-job-limit-for-snapshot-operation.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n longhorn-system -l app.kubernetes.io/name=longhorn | |
| helm list -n longhorn-system 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/longhorn/longhorn-12521-bug-instance-manager-on-nodes-that-don-t-have-hard-or-solid-state.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv4 address | 10.42.12.171 |
| IPv4 address | 10.42.0.18 |
| IPv4 address | 10.42.12.171 |
| IPv4 address | 10.42.0.18 |
| IPv4 address | 10.42.12.171 |
| IPv4 address | 10.42.0.18 |
| IPv4 address | 10.42.12.171 |
| IPv4 address | 10.42.0.18 |
| IPv4 address | 10.42.12.171 |
| IPv4 address | 10.42.0.18 |
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Privileged container | privileged: true |
| hostNetwork enabled | hostNetwork: true |
π solutions/cncf-generated/longhorn/longhorn-6049-feature-add-metric-for-last-backup-of-a-volume.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv4 address | 10.43.192.15 |
| IPv4 address | 10.43.191.158 |
| IPv4 address | 10.43.192.15 |
| IPv4 address | 10.43.146.234 |
| IPv4 address | 10.43.233.131 |
| IPv4 address | 10.43.34.24 |
| IPv4 address | 10.43.195.223 |
| IPv4 address | 10.43.191.158 |
| IPv4 address | 10.43.192.15 |
| IPv4 address | 10.43.146.234 |
| IPv4 address | 10.43.233.131 |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n longhorn -l app.kubernetes.io/name=longhorn | |
| helm list -n longhorn 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/longhorn/longhorn-6415-improvement-remove-or-change-helm-pre-upgrade-hook-to-support-argo.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/longhorn/longhorn-9727-feature-add-support-for-readwriteoncepod-access-mode.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n longhorn -l app.kubernetes.io/name=longhorn | |
| helm list -n longhorn 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/milvus/milvus-41384-bug-meminfo-rss-undefined.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/minio/minio-2111-resolved-versioning-support.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/minio/minio-4072-server-gateway-support-for-backblaze-b2.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/minio/minio-4166-remove-a-bucket-from-gui.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/minio/minio-9726-server-startup-failed-with-unable-to-initialize-sub-systems-unable-to.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/podman-desktop/podman-desktop-1633-podman-desktop-hangs-at-initializing-podman-on-mac-book-m1.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n podman-desktop -l app.kubernetes.io/name=podman-desktop | |
| helm list -n podman-desktop 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/podman-desktop/podman-desktop-4982-podman-desktop-setup-failed-on-requirement-check-wsl-version.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n podman-desktop -l app.kubernetes.io/name=podman-desktop | |
| helm list -n podman-desktop 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/podman-desktop/podman-desktop-5334-compose-setup-fails-when-there-is-already-docker-compose.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/podman-desktop/podman-desktop-9826-podman-desktop-fails-to-download-components-when-behind-tran.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/porter/porter-1080-rethink-interactive-commands.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n porter -l app.kubernetes.io/name=porter | |
| helm list -n porter 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/porter/porter-1151-proposal-naming-versioning-manifest-updates.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n porter -l app.kubernetes.io/name=porter | |
| helm list -n porter 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/qdrant/qdrant-804-rocksdb-investigate-compression-scheme-for-rocksdb.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n qdrant -l app.kubernetes.io/name=qdrant | |
| helm list -n qdrant 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/tetragon/tetragon-288-e2e-framework-implement-metricschecker.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n tetragon -l app.kubernetes.io/name=tetragon | |
| helm list -n tetragon 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/valkey/valkey-1336-new-support-database-level-acl.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/valkey/valkey-544-legal-please-remove-my-copyright-notice-from-the-source-code.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/valkey/valkey-640-support-field-level-expire-ttl-for-hash-set-and-sorted-set.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/valkey/valkey-92-new-native-windows-support.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/weaviate/weaviate-2656-ux-weaviate-should-be-runnable-without-any-env-vars-or-cli-args-se.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n weaviate -l app.kubernetes.io/name=weaviate | |
| helm list -n weaviate 2>/dev/null || echo "Not installed via Helm" | |
| `` |
|
Thank you for your contribution! Your PR has been merged. Check out what's new:
Stay connected: Slack #kubestellar-dev | Multi-Cluster Survey |
π± New Mission: contour β Add Per-HTTPProxy HTTP-Version Support to Address HTTP2 Coalescing Issues with Wildcards
Type: feature | Source: projectcontour/contour#5822 (11 reactions)
Fix PR: projectcontour/contour#5802
File:
solutions/cncf-generated/contour/contour-5822-add-per-httpproxy-http-version-support-to-address-http2-coalescing-.jsonCopilot: Please enhance this mission
The JSON file has been pre-filled with content from the source issue. Please improve:
node scripts/scanner.mjsto validateAuto-generated by CNCF Mission Generator