-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: export vulnerabilities list #404
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## main #404 +/- ##
==========================================
+ Coverage 87.49% 87.56% +0.06%
==========================================
Files 55 55
Lines 1623 1664 +41
Branches 433 436 +3
==========================================
+ Hits 1420 1457 +37
- Misses 192 196 +4
Partials 11 11 ☔ View full report in Codecov by Sentry. |
Andreea-Lupu
force-pushed
the
export_vuln_list
branch
2 times, most recently
from
December 15, 2023 11:14
9669315
to
a30ce4d
Compare
Do we have an issue linked to this? |
Andreea-Lupu
force-pushed
the
export_vuln_list
branch
from
December 18, 2023 15:37
a30ce4d
to
75a7756
Compare
Yes, project-zot/zot#1999. |
Andreea-Lupu
force-pushed
the
export_vuln_list
branch
from
December 18, 2023 16:35
75a7756
to
2d2323c
Compare
rchincha
reviewed
Dec 18, 2023
Andreea-Lupu
force-pushed
the
export_vuln_list
branch
from
December 18, 2023 18:37
2d2323c
to
04913e9
Compare
raulkele
requested changes
Dec 19, 2023
Andreea-Lupu
force-pushed
the
export_vuln_list
branch
from
December 19, 2023 14:16
04913e9
to
43d68d8
Compare
raulkele
requested changes
Dec 20, 2023
Andreea-Lupu
force-pushed
the
export_vuln_list
branch
from
December 20, 2023 09:37
43d68d8
to
2d58528
Compare
Signed-off-by: Andreea-Lupu <[email protected]>
Andreea-Lupu
force-pushed
the
export_vuln_list
branch
from
December 20, 2023 13:34
2d58528
to
568a65c
Compare
raulkele
approved these changes
Dec 20, 2023
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What type of PR is this?
Which issue does this PR fix:
What does this PR do / Why do we need it:
If an issue # is not available please add repro steps and logs from IPAMD/CNI showing the issue:
Testing done on this change:
Automation added to e2e:
Will this break upgrades or downgrades. Has updating a running cluster been tested?:
Does this change require updates to the CNI daemonset config files to work?:
Does this PR introduce any user-facing change?:
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.