Litmus helps Kubernetes SREs and developers practice chaos engineering in a Kubernetes native way.

LitmusChaos

Litmus

Cloud-Native Chaos Engineering

Slack Channel CircleCI Docker Pulls GitHub stars GitHub issues Twitter Follow CII Best Practices BCH compliance FOSSA Status YouTube Channel



Read this in other languages.

🇰🇷 🇨🇳 🇧🇷 🇮🇳

Overview

Litmus is a toolset to do cloud-native chaos engineering. Litmus provides tools to orchestrate chaos on Kubernetes to help SREs find weaknesses in their deployments. SREs use Litmus to run chaos experiments initially in the staging environment and eventually in production to find bugs, vulnerabilities. Fixing the weaknesses leads to increased resilience of the system.

Litmus takes a cloud-native approach to create, manage and monitor chaos. Chaos is orchestrated using the following Kubernetes Custom Resource Definitions (CRDs):

  • ChaosEngine: A resource to link a Kubernetes application or Kubernetes node to a ChaosExperiment. ChaosEngine is watched by Litmus' Chaos-Operator which then invokes Chaos-Experiments
  • ChaosExperiment: A resource to group the configuration parameters of a chaos experiment. ChaosExperiment CRs are created by the operator when experiments are invoked by ChaosEngine.
  • ChaosResult: A resource to hold the results of a chaos-experiment. The Chaos-exporter reads the results and exports the metrics into a configured Prometheus server.

Chaos experiments are hosted on hub.litmuschaos.io. It is a central hub where the application developers or vendors share their chaos experiments so that their users can use them to increase the resilience of the applications in production.

Litmus workflow

Use cases

  • For Developers: To run chaos experiments during application development as an extension of unit testing or integration testing.
  • For CI pipeline builders: To run chaos as a pipeline stage to find bugs when the application is subjected to fail paths in a pipeline.
  • For SREs: To plan and schedule chaos experiments into the application and/or surrounding infrastructure. This practice identifies the weaknesses in the system and increases resilience.

Getting Started with Litmus

IMAGE ALT TEXT

Check out the Litmus Docs to get started.

Contributing to Chaos Hub

Check out the Contributing Guidelines for the Chaos Hub

Adopters

Check out the Adopters of LitmusChaos

(Send a PR to the above page if you are using Litmus in your chaos engineering practice)

Things to Consider

Some of the considerations that need to be made with Litmus (as a chaos framework), are broadly listed here. Many of these are already being worked on as mentioned in the ROADMAP. For details or limitations around specific experiments, refer to the respective experiments docs.

  • Litmus chaos operator and the chaos experiments run as kubernetes resources in the cluster. In case of airgapped environments, the chaos custom resources and images need to be hosted on premise.
  • When attempting to execute platform specific chaos experiments (like those on AWS, GCP cloud) the access details are passed via kubernetes secrets. Support for other modes of secret management with Litmus is yet to be tested/implemented.
  • Some chaos experiments make use of the docker api from within the experiment pods, and thereby require the docker socket to be mounted. User discretion is advised when allowing developers/devops admins/SREs access for running these experiments.
  • In (rare) cases where chaos experiments make use of privileged containers, the recommended security policies will be documented.

License

Litmus is licensed under the Apache License, Version 2.0. See LICENSE for the full license text. Some of the projects used by the Litmus project may be governed by a different license, please refer to its specific license.

FOSSA Status

Litmus Chaos is part of the CNCF Projects.

CNCF

Community

The Litmus community meets on the third wednesday of every month at 10:00PM IST/9.30 AM PST.

Community Resources:

Important Links

Litmus Docs Litmus Docs
CNCF Landscape Litmus on CNCF Landscape
Owner
Litmus Chaos
Cloud-Native Chaos Engineering for Kubernetes Developers and SREs. LitmusChaos is a CNCF sandbox project.
Litmus Chaos
Comments
  • (ui-frontend-implementation): Adding a

    (ui-frontend-implementation): Adding a "JOIN US ON SLACK" button

    UI-FRONTEND-IMPLEMENTATION

    What happens:

    • Adding a "JOIN US ON SLACK" which directs us to slack channel

    What you expected to happen:

    • The button goes in bottom-right corner when we open any window and should redirect to https://app.slack.com/client/T09NY5SBT/CNXNB0ZTN. The button will look like something like this :- https://www.stickpng.com/img/icons-logos-emojis/tech-companies/slack-new-logo-icon Anything else we need to know?:

    • Issue related to Repository : https://github.com/litmuschaos/charthub.litmuschaos.io

  • Authentication Module Refactor

    Authentication Module Refactor

    • Rewrite/Refactor the authentication server to make it lightweight and modular so that
      • It can be moved into a separate repository
      • Handle different authentication modules
        • Local
        • Gmail Auth (Mandatory)
        • Github (Optional)
    • Need a feature to reset the existing password.
  • Documentation outcome not working and not matching code basis

    Documentation outcome not working and not matching code basis

    What happened: I tried to follow several documentations now: first, second and none of the chaos experiments works. Nothing happens.

    What you expected to happen: The documentation actually describes steps that match the code basis in the git repos (links do not work, resources are named differently, yaml files have different content). I really wanted to give litmus a try as it seems to be a cool project. But if you cannot even use it as a noob following a simple documentation, it really is no good. What worked for me was this (external!) guide.

    How to reproduce it (as minimally and precisely as possible): Simply follow any of your documentations and tutorials step by step and try to understand what is (not) happening from the perspective of a noob.

    Anything else we need to know?: I cannot file any PRs because I do not understand the code basis and currently have no time to work myself into it. I really want to give Litmus a try though. How can I help?

  • chore(litmus-portal): Header and BreadCrumbs Refractor.

    chore(litmus-portal): Header and BreadCrumbs Refractor.

    What this PR does / why we need it:

    Code refactoring of header and BreadCrumbs.

    Which issue this PR fixes:

    fixes #1785

    Checklist

    • [x] Does this PR have a corresponding GitHub issue?
    • [ ] Have you included relevant README for the chaoslib/experiment with details?
    • [x] Have you added debug messages where necessary?
    • [x] Have you added task comments where necessary?
    • [x] Have you tested the changes for possible failure conditions?
    • [ ] Have you provided the positive & negative test logs for the litmusbook execution?
    • [ ] Does the litmusbook ensure idempotency of cluster state?, i.e., is cluster restored to original state?
    • [ ] Have you used non-shell/command modules for Kubernetes tasks?
    • [ ] Have you (jinja) templatized custom scripts that is run by the litmusbook, if any?
    • [ ] Have you (jinja) templatized Kubernetes deployment manifests used by the litmusbook, if any?
    • [ ] Have you reused/created util functions instead of repeating tasks in the litmusbook?
    • [x] Do the artifacts follow the appropriate directory structure?
    • [ ] Have you isolated storage (eg: OpenEBS) specific implementations, checks?
    • [ ] Have you isolated platform (eg: baremetal kubeadm/openshift/aws/gcloud) specific implementations, checks?
    • [ ] Are the ansible facts well defined? Is the scope explicitly set for playbook & included utils?
    • [ ] Have you ensured minimum/careful usage of shell utilities (awk, grep, sed, cut, xargs etc.,)?
    • [ ] Can the limtusbook be executed both from within & outside a container (configurable paths, no hardcode)?
    • [ ] Can you suggest the minimal resource requirements for the litmusbook execution?
    • [ ] Does the litmusbook job artifact carry comments/default options/range for the ENV tunables?
    • [ ] Has the litmusbooks been linted?

    Special notes for your reviewer:

  • chore: (litmus-portal): Updated Redux, Community Page, SideBar and BreadCrumbs. Added Header, Notification Dropdown, Profile Dropdown.

    chore: (litmus-portal): Updated Redux, Community Page, SideBar and BreadCrumbs. Added Header, Notification Dropdown, Profile Dropdown.

    What this PR does / why we need it:

    Updated Redux, Community Page, SideBar and BreadCrumbs. Added profile icon, time series plots for community page, header, profile drop-down and notifications drop-down.

    Which issue this PR fixes:

    fixes #1571 fixes partially #1607

    Checklist

    • [ ] Does this PR have a corresponding GitHub issue?
    • [ ] Have you included relevant README for the chaoslib/experiment with details?
    • [ ] Have you added debug messages where necessary?
    • [ ] Have you added task comments where necessary?
    • [ ] Have you tested the changes for possible failure conditions?
    • [ ] Have you provided the positive & negative test logs for the litmusbook execution?
    • [ ] Does the litmusbook ensure idempotency of cluster state?, i.e., is cluster restored to original state?
    • [ ] Have you used non-shell/command modules for Kubernetes tasks?
    • [ ] Have you (jinja) templatized custom scripts that is run by the litmusbook, if any?
    • [ ] Have you (jinja) templatized Kubernetes deployment manifests used by the litmusbook, if any?
    • [ ] Have you reused/created util functions instead of repeating tasks in the litmusbook?
    • [ ] Do the artifacts follow the appropriate directory structure?
    • [ ] Have you isolated storage (eg: OpenEBS) specific implementations, checks?
    • [ ] Have you isolated platform (eg: baremetal kubeadm/openshift/aws/gcloud) specific implementations, checks?
    • [ ] Are the ansible facts well defined? Is the scope explicitly set for playbook & included utils?
    • [ ] Have you ensured minimum/careful usage of shell utilities (awk, grep, sed, cut, xargs etc.,)?
    • [ ] Can the limtusbook be executed both from within & outside a container (configurable paths, no hardcode)?
    • [ ] Can you suggest the minimal resource requirements for the litmusbook execution?
    • [ ] Does the litmusbook job artifact carry comments/default options/range for the ENV tunables?
    • [ ] Has the litmusbooks been linted?

    Special notes for your reviewer:

  • CSS and other bug fixes for 2.0 beta 1

    CSS and other bug fixes for 2.0 beta 1

    Proposed changes

    • CSS bugs fixed
    • Minor bug fixes for UI

    Types of changes

    What types of changes does your code introduce to Litmus? Put an x in the boxes that apply

    • [x] Bugfix (non-breaking change which fixes an issue)

    Checklist

    • [x] I have read the CONTRIBUTING doc
    • [x] I have signed the commit for DCO to be passed.
    • [x] Lint and unit tests pass locally with my changes

    Special notes for your reviewer:

    Bug-fix PR

  • LitmusPortal subscriber fails to start

    LitmusPortal subscriber fails to start

    What happened:

    When connecting the LitmusPortal agent, the following occurs in the log of the subscriber pod:

    The fatal error is │ time="2021-07-13T01:54:30Z" level=fatal msg="invalid character 'p' after top-level value"

    This happens every time.

    The agent does not connect and every time, my subscriber fails on a CrashBackLoop. Could anyone advise?

    │ time="2021-07-13T02:05:14Z" level=info msg="Go OS/Arch: linux/amd64"                                                                                                                              │
    │ time="2021-07-13T02:05:14Z" level=info msg="all deployments up"                                                                                                                                   │
    │ time="2021-07-13T02:05:14Z" level=info msg="all components live...starting up subscriber"                                                                                                         │
    │ time="2021-07-13T02:05:14Z" level=fatal msg="invalid character 'p' after top-level value"                                                                                          
    

    What you expected to happen:

    The subscriber should start normally.

    How to reproduce it (as minimally and precisely as possible):

    Connect the litmusctl agent with the portal.

    Anything else we need to know?:

  • Namespace scope mode for litmus-portal and okteto cloud dev environment integration.

    Namespace scope mode for litmus-portal and okteto cloud dev environment integration.

    Proposed changes

    This PR adds namespace scope installation configuration and required code changes for it to litmus-portal and also adds Okteto cloud dev environment setup.

    fixes #2185 and #2186

    Types of changes

    What types of changes does your code introduce to Litmus? Put an x in the boxes that apply

    • [x] New feature (non-breaking change which adds functionality)
    • [x] Bugfix (non-breaking change which fixes an issue)
    • [x] Breaking change (fix or feature that would cause existing functionality to not work as expected)
    • [x] Documentation Update (if none of the other choices applies)

    Checklist

    Put an x in the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.

    • [x] I have read the CONTRIBUTING doc
    • [x] I have signed the commit for DCO to be passed.
    • [x] Lint and unit tests pass locally with my changes
    • [x] I have added tests that prove my fix is effective or that my feature works (if appropriate)
    • [x] I have added necessary documentation (if appropriate)

    Dependency

    • None.

    Special notes for your reviewer:

    Namespace mode for Litmus portal with Okteto cloud dev env setup and integration.

  • good color combination in the litmus-docs

    good color combination in the litmus-docs

    Litmus docs website has only black & white colors. It can be changed to attractive color combinations.

    Note: It is recommended to use 2-3 color only

  • (ui-frontend-implementation): fixing the spacing in the side panel of the charts and link styling changes

    (ui-frontend-implementation): fixing the spacing in the side panel of the charts and link styling changes

    (ui-frontend-implementation): fixing the spacing in the side panel of the charts and link styling changes

    What happens:

    • The labels don't have equal spacings. Requires changes in css : Screenshot from 2019-10-11 18-41-25

    • Also the repository link clips through the side panel div. This needs a fix as well.

    Anything else we need to know?:

  • Network latency is not injected into my application

    Network latency is not injected into my application

    What happened: Executed Pod Network Latency Experiment, i do not see latency injected into the application

    What you expected to happen: I have a very simple application deployed tom y K8S cluster. The demo application is based on this docker image

    How to reproduce it (as minimally and precisely as possible): Created a basic deployment file that includes the above mentioned image. Created a service account based exactly as specified in this link. Chaos engine manifest also exactly looks like what was in the above mentioned link. I have replaced the app labels wherever appropriate. When I apply my chaos engine manifest, i can see that k8s creates a pod-network-latency pod as expected. When i look at the logs for the network latency pod, it is able to find the Application pod to inject latency into. Pumba pod appears to get created successfully. I have verified that the network interface of my application pod is eth0. The log files from network latency pod appear to be normal. Here is a sample from it

    W0810 16:13:26.444004 1 client_config.go:541] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. time="2020-08-10T16:13:26Z" level=info msg="[PreReq]: Getting the ENV for the experiment" time="2020-08-10T16:13:26Z" level=info msg="[PreReq]: Updating the chaos result of pod-network-latency experiment (SOT)" time="2020-08-10T16:13:26Z" level=info msg="The application informations are as follows\n" Namespace=MyNameSPace Label="app=kuard" Ramp Time=0 time="2020-08-10T16:13:26Z" level=info msg="[Status]: Verify that the AUT (Application Under Test) is running (pre-chaos)" time="2020-08-10T16:13:26Z" level=info msg="[Status]: Checking whether application pods are in running state" time="2020-08-10T16:13:26Z" level=info msg="The running status of Pods are as follows" Pod=kuard-deployment-6c65d5c8fb-trllp Status=Running time="2020-08-10T16:13:26Z" level=info msg="[Status]: Checking whether application containers are in running state" time="2020-08-10T16:13:26Z" level=info msg="The running status of container are as follows" container=kuard Pod=kuard-deployment-6c65d5c8fb-trllp Status=Running time="2020-08-10T16:13:26Z" level=info msg="[Info]: Details of application under chaos injection" NodeName=ip-10-98-83-22.ec2.internal ContainerName=kuard PodName=kuard-deployment-6c65d5c8fb-trllp time="2020-08-10T16:13:26Z" level=info msg="[Status]: Checking the status of the helper pod" time="2020-08-10T16:13:26Z" level=info msg="[Status]: Checking whether application pods are in running state" time="2020-08-10T16:13:28Z" level=info msg="The running status of Pods are as follows" Status=Running Pod=pumba-netem-judhlx time="2020-08-10T16:13:28Z" level=info msg="[Status]: Checking whether application containers are in running state" time="2020-08-10T16:13:28Z" level=info msg="The running status of container are as follows" container=pumba Pod=pumba-netem-judhlx Status=Running time="2020-08-10T16:13:28Z" level=info msg="[Wait]: Waiting for 300s till the completion of the helper pod" time="2020-08-10T16:13:28Z" level=info msg="helper pod status: Running" time="2020-08-10T16:13:29Z" level=info msg="helper pod status: Running" time="2020-08-10T16:13:30Z" level=info msg="helper pod status: Running" time="2020-08-10T16:13:31Z" level=info msg="helper pod status: Running" time="2020-08-10T16:13:32Z" level=info msg="helper pod status: Running" time="2020-08-10T16:13:33Z" level=info msg="helper pod status: Running" time="2020-08-10T16:13:34Z" level=info msg="helper pod status: Running" time="2020-08-10T16:13:35Z" level=info msg="helper pod status: Running"

    I have port-forwarded my application on port 8080. When I access the website localhost:8080, i expect to see network latency, but i don't seem to see any. All XHR requests, that happens as part of the application are able to execute within 50 ms. Is this expected?

    Anything else we need to know?:

  • Container kill experiment failing

    Container kill experiment failing

    What happened: Container kill experiment failed with error err: application container is not in running state, unable to find the pod with name -776cb96ff6-gktkk, err: pods "-776cb96ff6-gktkk" not found" as pod suffix will change once pod got killed and new pod has been created.

    What you expected to happen: Experiment should pick newly created pod of set by ignoring pod suffix

    Where can this issue be corrected? (optional)

    How to reproduce it (as minimally and precisely as possible): By passing pod with suffix which changes when you kill the container into container kill experiment chaos engine

    Anything else we need to know?:

  • [Snyk] Security upgrade react-scripts from 3.4.4 to 4.0.0

    [Snyk] Security upgrade react-scripts from 3.4.4 to 4.0.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • litmus-portal/frontend/package.json
      • litmus-portal/frontend/package-lock.json

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- medium severity | 713/1000
    Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 6.4 | Prototype Pollution
    SNYK-JS-JSON5-3182856 | Yes | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Commit messages
    Package name: react-scripts The new version differs by 125 commits.
    • ed95893 Publish
    • 88ca4f6 Prepare 4.0.0 release
    • d23d615 Update react dom in error overlay
    • 95265c3 Update CHANGELOG
    • 523b416 Add link to Open Collective (#9864)
    • af616ab Update CHANGELOG
    • 014ca01 Prepare 4.0.0 release
    • 2b1161b Pass JSX runtime setting to Babel preset in Jest config (#9865)
    • f2aef41 Prepare 4.0.0 alpha release
    • 4bc639c Upgrade to React 17 (#9863)
    • d61347d Use new JSX setting with TypeScript 4.1.0 (#9734)
    • e63de79 New JSX Transform opt out (#9861)
    • fe785b2 feat: Update all dependencies (#9857)
    • 85ab02b feat: remove unused React imports (#9853)
    • 329f392 feat: Update ESLint dependencies (#9856)
    • 10fa972 feat(eslint-config-react-app): Add jest & testing-library rules (#8963)
    • ed919b1 Make eslint-plugin-jest an optional peerDependency (#9670)
    • 0a93e32 Fix refreshOverlayInterop module scope error (#9805)
    • 7965594 Bump resolve-url-loader version (#9841)
    • b1f8536 Add 3.4.4 to the changelog
    • d07b7d0 Replace deprecated eslint-loader with eslint-webpack-plugin (#9751)
    • 6f3e32e Upgrade Docusaurus to latest version (#9728)
    • 1f2d387 fix: resolve new JSX runtime issues (#9788)
    • 6a51dcd Add AVIF image support (#9611)

    See the full diff

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Prototype Pollution

  • kind: ChaosExperiment toleration

    kind: ChaosExperiment toleration

    I am currently using litmus Chaos 2.14.0 . Wanted to know how can I add toleration in image specification for kind: ChaosExperiment. https://litmuschaos.github.io/litmus/experiments/concepts/chaos-resources/chaos-experiment/contents/#experiment-scopeI am facing issue while starting the job using go runner coz of taints.

    For kind: Chaosengine the Runner Specification has the detail for toleration. but not able to see for ChaosExperiment. https://litmuschaos.github.io/litmus/experiments/concepts/chaos-resources/chaos-experiment/contents/#experiment-scope

    Any suggestion?

  • add: fix in createChaosWorkFlow function

    add: fix in createChaosWorkFlow function

    Proposed changes

    To implement the scenario name validation rules in the CreateChaosWorkflow function ,we can add a check for the validity of the scenario name before processing the workflow.

    Types of changes

    What types of changes does your code introduce to Litmus? Put an x in the boxes that apply

    • [ ] New feature (non-breaking change which adds functionality)
    • [ x] Bugfix (non-breaking change which fixes an issue)
    • [ ] Breaking change (fix or feature that would cause existing functionality to not work as expected)
    • [ ] Documentation Update (if none of the other choices applies)

    Checklist

    Put an x in the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.

    • [ x] I have read the CONTRIBUTING doc
    • [ ] I have signed the commit for DCO to be passed.
    • [ ] Lint and unit tests pass locally with my changes
    • [ ] I have added tests that prove my fix is effective or that my feature works (if appropriate)
    • [ ] I have added necessary documentation (if appropriate)

    Dependency

    • Please add the links to the dependent PR need to be merged before this (if any).

    Special notes for your reviewer:

  • [Snyk] Security upgrade react-scripts from 3.4.4 to 5.0.0

    [Snyk] Security upgrade react-scripts from 3.4.4 to 5.0.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • litmus-portal/frontend/package.json
      • litmus-portal/frontend/package-lock.json

    Vulnerabilities that will be fixed

    With an upgrade:

    Severity | Priority Score (*) | Issue | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:------------------------- medium severity | 713/1000
    Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 6.4 | Prototype Pollution
    SNYK-JS-JSON5-3182856 | Yes | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Commit messages
    Package name: react-scripts The new version differs by 238 commits.
    • 221e511 Publish
    • 6a3315b Update CONTRIBUTING.md
    • 5614c87 Add support for Tailwind (#11717)
    • 657739f chore(test): make all tests install with `npm ci` (#11723)
    • 20edab4 fix(webpackDevServer): disable overlay for warnings (#11413)
    • 69321b0 Remove cached lockfile (#11706)
    • 3afbbc0 Update all dependencies (#11624)
    • f5467d5 feat(eslint-config-react-app): support ESLint 8.x (#11375)
    • e8319da [WIP] Fix integration test teardown / cleanup and missing yarn installation (#11686)
    • c7627ce Update webpack and dev server (#11646)
    • f85b064 The default port used by `serve` has changed (#11619)
    • 544befe Update package.json (#11597)
    • 9d0369b Fix ESLint Babel preset resolution (#11547)
    • d7b23c8 test(create-react-app): assert for exit code (#10973)
    • 1465357 Prepare 5.0.0 alpha release
    • 3880ba6 Remove dependency pinning (#11474)
    • 8b9fbee Update CODEOWNERS
    • cacf590 Bump template dependency version (#11415)
    • 5cedfe4 Bump browserslist from 4.14.2 to 4.16.5 (#11476)
    • 50ea5ad allow CORS on webpack-dev-server (#11325)
    • 63bba07 Upgrade jest and related packages from 26.6.0 to 27.1.0 (#11338)
    • 960b21e Bump immer from 8.0.4 to 9.0.6 (#11364)
    • 134cd3c Resolve dependency issues in v5 alpha (#11294)
    • b45ae3c Update CONTRIBUTING.md

    See the full diff

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Prototype Pollution

  • Bump jsonwebtoken from 8.5.1 to 9.0.0 in /litmus-portal/frontend

    Bump jsonwebtoken from 8.5.1 to 9.0.0 in /litmus-portal/frontend

    Bumps jsonwebtoken from 8.5.1 to 9.0.0.

    Changelog

    Sourced from jsonwebtoken's changelog.

    9.0.0 - 2022-12-21

    Breaking changes: See Migration from v8 to v9

    Breaking changes

    Security fixes

    • security: fixes Arbitrary File Write via verify function - CVE-2022-23529
    • security: fixes Insecure default algorithm in jwt.verify() could lead to signature validation bypass - CVE-2022-23540
    • security: fixes Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC - CVE-2022-23541
    • security: fixes Unrestricted key type could lead to legacy keys usage - CVE-2022-23539
    Commits
    • e1fa9dc Merge pull request from GHSA-8cf7-32gw-wr33
    • 5eaedbf chore(ci): remove github test actions job (#861)
    • cd4163e chore(ci): configure Github Actions jobs for Tests & Security Scanning (#856)
    • ecdf6cc fix!: Prevent accidental use of insecure key sizes & misconfiguration of secr...
    • 8345030 fix(sign&verify)!: Remove default none support from sign and verify met...
    • 7e6a86b Upload OpsLevel YAML (#849)
    • 74d5719 docs: update references vercel/ms references (#770)
    • d71e383 docs: document "invalid token" error
    • 3765003 docs: fix spelling in README.md: Peak -> Peek (#754)
    • a46097e docs: make decode impossible to discover before verify
    • Additional commits viewable in compare view
    Maintainer changes

    This version was pushed to npm by julien.wollscheid, a new releaser for jsonwebtoken since your current version.


    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

An open-source, distributed, cloud-native CD (Continuous Delivery) product designed for developersAn open-source, distributed, cloud-native CD (Continuous Delivery) product designed for developers
An open-source, distributed, cloud-native CD (Continuous Delivery) product designed for developersAn open-source, distributed, cloud-native CD (Continuous Delivery) product designed for developers

Developer-oriented Continuous Delivery Product ⁣ English | 简体中文 Table of Contents Zadig Table of Contents What is Zadig Quick start How to use? How to

Oct 19, 2021
Multi cluster kubernetes dashboard with batteries included. Build by developers, for developers.

kubetower Multi cluster kubernetes dashboard with batteries included. Built by developers, for developers. Features Restart deployments with one click

Nov 28, 2022
ControllerMesh is a solution that helps developers manage their controllers/operators better.
ControllerMesh is a solution that helps developers manage their controllers/operators better.

ControllerMesh ControllerMesh is a solution that helps developers manage their controllers/operators better. Key Features Canary update: the controlle

Jan 6, 2023
First Go project. Backend hiring test for Array engineering.

BACKEND TEST 1 Submitted by: Mitchell Sullivan Intro This is basically my first-ever project in Go. As such, it's quite simple and bears little resemb

Jan 19, 2022
Test-at-scale - TAS - An intelligent test execution platform for engineering teams to achieve high development velocity
Test-at-scale - TAS - An intelligent test execution platform for engineering teams to achieve high development velocity

Test At Scale Test Smarter, Release Faster with test-at-scale. Status Table of c

Dec 22, 2022
Docker App Development & Command Practice
 Docker App Development & Command Practice

Docker App Development & Command Practice What is Docker? A platform for building,running and shipping applications. in a consistent manner so if your

Apr 7, 2022
⚡️ A dev tool for microservice developers to run local applications and/or forward others from/to Kubernetes SSH or TCP
⚡️ A dev tool for microservice developers to run local applications and/or forward others from/to Kubernetes SSH or TCP

Your new microservice development environment friend. This CLI tool allows you to define a configuration to work with both local applications (Go, Nod

Jan 4, 2023
kitex running in kubernetes cluster and discover each other in kubernetes Service way

Using kitex in kubernetes Kitex [kaɪt'eks] is a high-performance and strong-extensibility Golang RPC framework. This go module helps you to build mult

Feb 21, 2022
A Kubernetes Operator, that helps DevOps team accelerate their journey into the cloud and K8s.
A Kubernetes Operator, that helps DevOps team accelerate their journey into the cloud and K8s.

A Kubernetes Operator, that helps DevOps team accelerate their journey into the cloud and K8s. OAM operator scaffolds all of the code required to create resources across various cloud provides, which includes both K8s and Non-K8s resources

Nov 30, 2021
The OCI Service Operator for Kubernetes (OSOK) makes it easy to connect and manage OCI services from a cloud native application running in a Kubernetes environment.

OCI Service Operator for Kubernetes Introduction The OCI Service Operator for Kubernetes (OSOK) makes it easy to create, manage, and connect to Oracle

Sep 27, 2022
An Alert notification service is an application which can receive alerts from certain alerting systems like System_X and System_Y and send these alerts to developers in the form of SMS and emails.

Alert-System An Alert notification service is an application which can receive alerts from certain alerting systems like System_X and System_Y and sen

Dec 10, 2021
:bento: Highly Configurable Terminal Dashboard for Developers and Creators
:bento: Highly Configurable Terminal Dashboard for Developers and Creators

DevDash is a highly configurable terminal dashboard for developers and creators who want to choose and display the most up-to-date metrics they need,

Jan 3, 2023
k6 is a modern load testing tool for developers and testers in the DevOps era.
k6 is a modern load testing tool for developers and testers in the DevOps era.

k6 is a modern load testing tool, building on our years of experience in the load and performance testing industry. It provides a clean, approachable scripting API, local and cloud execution, and flexible configuration.

Jan 8, 2023
A simple webdev utility program that allows developers to quickly validate and format JSON code

Toolbox CLI A simple webdev utility program that allows developers to quickly validate and format JSON code, convert from UNIX epoch to timestamp and

Jan 4, 2022
Fluxcdproj - The Ultimate Swiss Army knife for DevOps, Developers and Platform Engineers
Fluxcdproj -  The Ultimate Swiss Army knife for DevOps, Developers and Platform Engineers

Fluxcdproj - The Ultimate Swiss Army knife for DevOps, Developers and Platform Engineers

Feb 1, 2022
Stackie enables developers to configure their local environment/toolchain with ease.

Stackie enables developers to configure their local environment/toolchain with ease. Made for Pulumi CLI, Google Cloud Platform (gcloud), and Amazon Web Services (aws-cli).

Sep 10, 2021
The open source public cloud platform. An AWS alternative for the next generation of developers.
The open source public cloud platform. An AWS alternative for the next generation of developers.

M3O M3O is an open source public cloud platform. We are building an AWS alternative for the next generation of developers. Overview AWS was a first ge

Jan 2, 2023