Pinned
1,302 contributions in the last year
Contribution activity
January 2021
Created 2 repositories
Created a pull request in argoproj/argo-cd that received 4 comments
chore: Upgrade github.com/dgrijalva/jwt-go to 4.0.0-preview1
Upgrade github.com/dgrijalva/jwt-go/ to 4.0.0-preview1.
This fixes both, CVE-2020-26160 and #3462. Both issues aren't fixed in the 3.x branch.
If i…
+61
−44
•
4
comments
Opened 7 other pull requests in 1 repository
argoproj/argo-cd
7
merged
- docs: Clarify RBAC requirements for GnuPG
- fix: Prevent possible nil pointer dereference in project API
- chore: Change installation manifests to pull images from quay.io
- chore: Also push container images to quay.io
- chore: Upgrade gorilla/handlers and gorilla/websocket
- chore: Switch Docker base image to ubuntu:20.10 instead of debian:10-slim
- chore: Remove stray debug Printf() from CLI
Reviewed 15 pull requests in 2 repositories
argoproj/argo-cd 13 pull requests
- fix: Remove kubectl binary from argo image(#5005)
- feat: Enhance submodule support - Change detection in submodule branches and resync
- fix: directory source include/exclude should match relative file path
- fix: locale-independent gpg output parsing
- docs: add instructions for auto-sync & auto-prune argocd instances #5210
- fix: make sure JWT token time fields contain only integer values
- docs: Two new blog posts
- feat: Include argocd-util as part of release artifacts(#5174)
- fix: Disable Transparent Huge Pages (THP) for redis pods (#5195)
- refactor: upgrade gitops-engine and k8s deps to v0.20.1
- fix: remove invalid assumption about OCI helm chart path
- docs: document ARGOCD_EXEC_TIMEOUT environment variable
- fix: add liveness probe to restart repo server if it fails to server tls requests (#5110)
argoproj-labs/argocd-image-updater 2 pull requests
Created an issue in argoproj/argo-cd that received 1 comment
Move away from github.com/dgrijalva/jwt-go as JWT library
Summary
The github.com/dgrijalva/jwt-go seems to be abandoned and not maintained any more, but contains a security vulnerability marked as high. See …
1
comment