Bump actions/checkout from 2 to 6 (#1243)
Bumps actions/checkout from 2 to 6.
updated-dependencies:
- dependency-name: actions/checkout dependency-version: ‘6’ dependency-type: direct:production update-type: version-update:semver-major …
Signed-off-by: dependabot[bot] support@github.com Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
版权所有:中国计算机学会技术支持:开源发展技术委员会
京ICP备13000930号-9
京公网安备 11010802032778号
Amazon EKS Anywhere Curated Packages
Build status:
The Amazon EKS Anywhere Curated Packages are only available to customers with the Amazon EKS Anywhere Enterprise Subscription. To request a free trial, talk to your Amazon representative or connect with one here.
EKS Anywhere Curated Packages is a management system for installation, configuration and maintenance of additional components for your Kubernetes cluster. Examples of these components may include Container Registry, Ingress, and LoadBalancer, etc.
Here are the steps for getting started with EKS Anywhere Curated Packages.
Development
EKS Anywhere Curated Packages is tested using Prow, the Kubernetes CI system. EKS operates an installation of Prow, which is visible at https://prow.eks.amazonaws.com/. Please read our CONTRIBUTING guide before making a pull request.
The dependencies which make up EKS Anywhere Curated Packages are defined and built via the build-tooling repo.
Local Development
Local development can be done using tilt.
Setup
If running tilt on a remote host, you can port-forward tilt’s web UI by forwarding over ssh:
After running
tilt up, tilt’s UI should now be available atlocalhost:10350on your local machine.Vulnerability Checking
This repository includes comprehensive vulnerability scanning for all Go dependencies across all modules.
Running Vulnerability Checks Locally
To scan all Go modules for known vulnerabilities:
This will run
govulncheckagainst:./)credentialproviderpackagemodulegeneratebundlefilemoduleecrtokenrefreshermoduleCI/CD Integration
Vulnerability scanning runs automatically via GitHub Actions:
Automated Dependency Updates
GitHub Dependabot is configured to:
To view security advisories and Dependabot alerts, visit the repository’s Security tab on GitHub.
Security
If you discover a potential security issue in this project, or think you may have discovered a security issue, we ask that you notify AWS Security via our vulnerability reporting page. Please do not create a public GitHub issue.
License
This project is licensed under the Apache-2.0 License.