Skip to content

[manager-identity] Correct temporal worker deployment describe option#4338

Open
hu-dabao wants to merge 1 commit intotemporalio:mainfrom
hu-dabao:patch-2
Open

[manager-identity] Correct temporal worker deployment describe option#4338
hu-dabao wants to merge 1 commit intotemporalio:mainfrom
hu-dabao:patch-2

Conversation

@hu-dabao
Copy link
Copy Markdown
Contributor

@hu-dabao hu-dabao commented Mar 25, 2026

What does this PR do?

There is no option of --deployment-name for temporal worker deployment describe, in fact it is --name

 temporal worker deployment describe \
    --name YourDeploymentName

(in the describe section)

┆Attachments: EDU-6102 [manager-identity] Correct temporal worker deployment describe option

@hu-dabao hu-dabao requested a review from a team as a code owner March 25, 2026 17:39
@vercel
Copy link
Copy Markdown

vercel bot commented Mar 25, 2026

@hu-dabao is attempting to deploy a commit to the Temporal Team on Vercel.

A member of the Team first needs to authorize it.

@semgrep-managed-scans
Copy link
Copy Markdown

Semgrep found 1 ssc-09995be6-8422-43ba-9a1a-1642ad98bd96 finding:

Risk: Affected versions of svgo are vulnerable to Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion'). SVGO's XML parsing supports custom DOCTYPE entities and will expand them without limits, allowing a "Billion Laughs" style entity-expansion payload (recursive/nested entity references) in a tiny SVG to consume excessive CPU/memory and stall or crash the Node.js process when optimizing untrusted SVG input (e.g., user uploads) via optimize().

Manual Review Advice: A vulnerability from this advisory is reachable if you are using svgo on the CLI

Fix: Upgrade this library to at least version 2.8.1 at documentation/yarn.lock:10179.

Reference(s): GHSA-xpqw-6gx7-v673, CVE-2026-29074

Semgrep found 6 ssc-17eda294-146f-4ed3-91f7-5ef1b349d687 findings:

Risk: Affected versions of @babel/traverse and babel-traverse are vulnerable to Incomplete List of Disallowed Inputs / Incorrect Comparison. Compiling untrusted code with Babel using plugins that invoke the internal path.evaluate() or path.evaluateTruthy() methods (for example @babel/plugin-transform-runtime, @babel/preset-env with useBuiltIns, or any polyfill‐provider plugin) allows a maliciously crafted AST to execute arbitrary code on the build machine during compilation.

Manual Review Advice: A vulnerability from this advisory is reachable if you use Babel to compile untrusted JavaScript

Fix: There are no safe versions of this library available for upgrade. Library included at documentation/yarn.lock:3481.

Reference(s): GHSA-67hx-6x53-jw92, CVE-2023-45133

@hu-dabao
Copy link
Copy Markdown
Contributor Author

@lennessyy a super minor change, please give it a review. I don't have vercel access. I am an end-user did documentation enhancements on and off, not sure if the team can consider to grant vercel access. Anyway, happy to help.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants