-
Notifications
You must be signed in to change notification settings - Fork 782
#23899 API design (IdP department/group labels) #29992
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
| - name: Engineering department | ||
| description: "Hosts with end users in engineering" | ||
| type: Host vitals | ||
| criteria: | ||
| vital: end_user_idp_department | ||
| value: Engineering |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Dev note
TODO
FUTURE
This is how more complex criteria could look in the future:
name: Engineering department or IT admins who are named Ricky
description: Hosts with end users in engineering or who are IT admins named Ricky
type: Host vitals
criteria:
or:
- and:
- vital: end_user_idp_groups
- value: IT admins
- vital: end_user_first_name
- value: Ricky
- vital: end_user_idp_department
value: Engineering| - name: Engineering department | ||
| description: "Hosts with end users in engineering" | ||
| type: host_vitals | ||
| criteria: | ||
| vital: end_user_idp_department | ||
| value: Engineering |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Dev note
TODO
FUTURE
This is how more complex criteria could look in the future:
name: Engineering department or IT admins who are named Ricky
description: Hosts with end users in engineering or who are IT admins named Ricky
type: Host vitals
criteria:
or:
- and:
- vital: end_user_idp_groups
value: IT admins
- vital: end_user_first_name
value: Ricky
- vital: end_user_idp_department
value: EngineeringFixes CVE-2025-22874 reported by https://github.com/fleetdm/fleet/actions/runs/15601368321/job/43941793647. (IMO not a critical CVE, so it doesn't need to be cherry-picked into v4.69.0.) Added automation to make this easier next time.
…29975) Fixes #29973 Tests are failing due to infra issues with https://proxy.golang.org # Checklist for submitter - [x] Manual QA for all new/changed functionality
Closes: #30000 Changes: - Updated the version of node used by the website to `^20.18`
More work to fix #29720. --------- Co-authored-by: Noah Talerman <47070608+noahtalerman@users.noreply.github.com>
…30003) Changes: - Updated the return value of the create-historical-event helper.
- Added a package that installs Fleet's Keynote theme and related fonts to self-service
related to: #30005 Changes: - Compressed and resized large gifs in the "Preventing Mistakes with GitOps" article - Removed unused website assets
…ing that hash exists in Fleet (#29866) Updated documentation to be more clear on behavior if hash is provided for software package in YAML.
This PR adds VEX statement files for three vulverabilities: ``` ┌─────────┬────────────────┬──────────┬──────────┬─────────────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐ │ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │ ├─────────┼────────────────┼──────────┼──────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤ │ libxml2 │ CVE-2025-49794 │ CRITICAL │ affected │ 2.9.14+dfsg-1.3~deb12u1 │ │ libxml: Heap use after free (UAF) leads to Denial of service │ │ │ │ │ │ │ │ (DoS)... │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-49794 │ │ ├────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2025-49795 │ │ │ │ │ libxml: Null pointer dereference leads to Denial of service │ │ │ │ │ │ │ │ (DoS) │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-49795 │ │ ├────────────────┤ │ │ ├───────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2025-49796 │ │ │ │ │ libxml: Type confusion leads to Denial of service (DoS) │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-49796 │ └─────────┴────────────────┴──────────┴──────────┴─────────────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘ ``` the vulnerabilities in libxml2 do not affect fleetctl, since the attack vector is DoS and fleetctl is not a server tool. Additionally the libxml2 package isn't used by fleetctl directly, but by the tools it uses for code signing, which don't parse untrusted XML.
Related to: - #29789 --------- Co-authored-by: Rachael Shaw <r@rachael.wtf>
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## docs-v4.71.0 #29992 +/- ##
================================================
+ Coverage 60.45% 64.10% +3.65%
================================================
Files 1865 1865
Lines 182331 182345 +14
Branches 5255 5332 +77
================================================
+ Hits 110232 116897 +6665
+ Misses 63496 56246 -7250
- Partials 8603 9202 +599
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
Merged in |
WIP for #23899