Skip to content
Snippets Groups Projects
  1. Apr 25, 2024
  2. Oct 26, 2023
  3. Sep 15, 2023
  4. Sep 12, 2023
  5. Jun 30, 2023
  6. Jun 29, 2023
  7. Jun 28, 2023
    • Levente Polyak's avatar
      feat(token): accept sensitive data only via env vars · 74ebecfd
      Levente Polyak authored
      It's an anti pattern to allow providing sensitive data via CLI options.
      The best practice is to only allow a bool option at best and read the
      actual secret from stdin instead. Otherwise sensitive data easily leaks
      into proc, as argv is never secret but available on the whole system.
      
      In this case we even print the struct in debug mode, which may lead to
      disclosing and logging tokens in the journal as well.
      
      For now we do it simple by just allowing env vars for the token, in case
      we really want to allow for alternative way we can add a bool option and
      read it from stdin instead.
      Verified
      74ebecfd
    • Levente Polyak's avatar
      chore(deps): update all dependencies · 2d98dcec
      Levente Polyak authored
      Verified
      2d98dcec
    • Levente Polyak's avatar
      feat(retry): retry all graphql errors (http or graphql error) · 6d9e5aa9
      Levente Polyak authored and Levente Polyak's avatar Levente Polyak committed
      Use backon and check for GraphQL returned errors, which happen to have
      successful HTTP calls. We use a closure now to retry the operation for
      both, failed HTTP calls as well as errors in GraphQL.
      
      Default with exponential backoff (max times 3, delay 1s, factor 2)
      Verified
      6d9e5aa9
  8. Jun 08, 2023
  9. Jun 04, 2023
  10. Jun 03, 2023
  11. Jun 02, 2023
  12. May 29, 2023
  13. May 28, 2023
  14. May 24, 2023
  15. May 23, 2023
  16. May 20, 2023
  17. May 19, 2023
  18. May 17, 2023
  19. May 16, 2023
  20. May 12, 2023
  21. May 11, 2023
  22. May 10, 2023
  23. May 08, 2023
  24. Apr 19, 2023
Loading