-
-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
📢 Impacting changes in next v7 version: we need you :) #2608
Comments
Previously we didn't |
Agreed, I'll remove the part about yarn :) |
I tried the latest beta image with the following added to TYPESCRIPT_ES_CLI_EXECUTABLE: [yarn, run, eslint] I hit:
In debug mode, I noted: |
Hmmm double yarn run is indeed a bug, probably related to the fact that now cli_executable is a list and not a string, I'll reproduce and fix :) |
I have a feeling you already spotted this, but I suspect the double |
@Kurt-von-Laven nop hadn't spotted it yet, thanks for the tip :) Fixed in #2609 |
V7 released :) |
We need you to finalize V7 !
Next version v7 of MegaLinter will contain potentially impacting changes
So far with our current tests, most linters seems to behave well, but before releasing it would be best if there are more beta-testers from the MegaLinter community :)
You can test with beta version (replace v6 , v6.x.x.x or latest by beta in your workflows / scripts )
Major updates
Use of relative file paths to call linters
Now the linters are called with the relative file names, on contrary to the absolute file names used from the beginning of MegaLinter
Basically, for example we used to call
eslint /tmp/lint/myfolder/myfile.js
and now we calleslint myfolder/myfile.js
The only impacting issue seems to be with PRE_COMMANDS that install additonal npm dependencies.
cwd
valuecwd: root
, it will probably work withcwd: workspace
Improve secrets security
@josecelano , @cgbosse and @hosom were perfectly right in their article: using MegaLinter means trusting the authors of the 100+ linters with your secrets.
With v7, you just need to trust MegaLinter authors, not all the linters authors, thanks to its new capability to hide environment variables when calling the linters !
See advanced documentation -> environment variables security
Default masked variables list is the following: Do you see others that should be added ?
- GITHUB_TOKEN
- PAT
- SYSTEM_ACCESSTOKEN
- GIT_AUTHORIZATION_BEARER
- CI_JOB_TOKEN
- GITLAB_ACCESS_TOKEN_MEGALINTER
- GITLAB_CUSTOM_CERTIFICATE
- WEBHOOK_REPORTER_BEARER_TOKEN
- NPM_TOKEN
- DOCKER_USERNAME
- DOCKER_PASSWORD
- CODECOV_TOKEN
- GCR_USERNAME
- GCR_PASSWORD
- SMTP_PASSWORD
New linters
Other updates
You can see the many other changes list in the CHANGELOG
Many thanks to everyone for your help to make MegaLinter better everyday :)
Note: you can also share this post to spread the word :) https://www.linkedin.com/posts/nicolas-vuillamy_megalinter-major-v7-activity-7063547619163156480-aF1n?utm_source=share&utm_medium=member_desktop
The text was updated successfully, but these errors were encountered: