-
Notifications
You must be signed in to change notification settings - Fork 137
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replace whilp/git-urls module by chainguard-dev/git-urls #664
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The hard coded limit in this project is less than our own limit of 2048
, which we already enforced in #654 (and in the further validation of the URL field within the API object itself).
Given this, we can not just merge this without it breaking backwards compatibility with existing validation rules (which arguably are too wide, but I have seen weird URLs in corporate environments).
@hiddeco I don't see why we couldn't bump that limit to 2048 on our side. Let me handle that change and publish a new release. |
4a2279a
to
f921722
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Merci beaucoup @hectorj2f! 🙇
@hectorj2f can you please run |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks Hector!
e9ca446
to
befca49
Compare
Signed-off-by: Hector Fernandez <[email protected]>
befca49
to
39a3853
Compare
Successfully created backport PR for |
Thanks for the reviews! |
We discovered a vulnerability on the module
github.com/whilp/git-urls
GHSA-3f2q-6294-fmq5. This repository doesn't look to be maintained at this moment. That is why we decided to fix the vulnerability and move the repository over our organization. We plan to maintain this repository in the future.