diff --git a/stable/code-server/2.0.20/CHANGELOG.md b/stable/code-server/2.1.0/CHANGELOG.md
similarity index 91%
rename from stable/code-server/2.0.20/CHANGELOG.md
rename to stable/code-server/2.1.0/CHANGELOG.md
index 26210965e56..a51bc99ffe8 100644
--- a/stable/code-server/2.0.20/CHANGELOG.md
+++ b/stable/code-server/2.1.0/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [code-server-2.1.0](https://github.com/truecharts/apps/compare/code-server-2.0.20...code-server-2.1.0) (2021-12-07)
+
+#### Feat
+
+* enable persistence and disable password ([#1483](https://github.com/truecharts/apps/issues/1483))
+
+
+
### [code-server-2.0.20](https://github.com/truecharts/apps/compare/code-server-2.0.19...code-server-2.0.20) (2021-12-06)
@@ -88,12 +97,3 @@
* update non-major deps helm releases ([#1432](https://github.com/truecharts/apps/issues/1432))
#### Fix
-
-* move conflicting ports to 10xxx range ([#1415](https://github.com/truecharts/apps/issues/1415))
-
-
-
-
-### [code-server-2.0.12](https://github.com/truecharts/apps/compare/code-server-2.0.11...code-server-2.0.12) (2021-11-23)
-
-#### Chore
diff --git a/stable/code-server/2.0.20/CONFIG.md b/stable/code-server/2.1.0/CONFIG.md
similarity index 100%
rename from stable/code-server/2.0.20/CONFIG.md
rename to stable/code-server/2.1.0/CONFIG.md
diff --git a/stable/code-server/2.0.20/Chart.lock b/stable/code-server/2.1.0/Chart.lock
similarity index 78%
rename from stable/code-server/2.0.20/Chart.lock
rename to stable/code-server/2.1.0/Chart.lock
index 7799298661a..a4055b3305f 100644
--- a/stable/code-server/2.0.20/Chart.lock
+++ b/stable/code-server/2.1.0/Chart.lock
@@ -3,4 +3,4 @@ dependencies:
repository: https://truecharts.org
version: 8.9.13
digest: sha256:0b3d55c3a990891d17a01fd96e44ecaffeddb933d41cfc296839ec67bad6d3b7
-generated: "2021-12-06T21:10:22.347984222Z"
+generated: "2021-12-07T13:00:13.169036303Z"
diff --git a/stable/code-server/2.0.20/Chart.yaml b/stable/code-server/2.1.0/Chart.yaml
similarity index 97%
rename from stable/code-server/2.0.20/Chart.yaml
rename to stable/code-server/2.1.0/Chart.yaml
index a5303202893..b463c88a4c7 100644
--- a/stable/code-server/2.0.20/Chart.yaml
+++ b/stable/code-server/2.1.0/Chart.yaml
@@ -21,7 +21,7 @@ name: code-server
sources:
- https://github.com/cdr/code-server
type: application
-version: 2.0.20
+version: 2.1.0
annotations:
truecharts.org/catagories: |
- media
diff --git a/stable/code-server/2.0.20/README.md b/stable/code-server/2.1.0/README.md
similarity index 100%
rename from stable/code-server/2.0.20/README.md
rename to stable/code-server/2.1.0/README.md
diff --git a/stable/code-server/2.0.20/app-readme.md b/stable/code-server/2.1.0/app-readme.md
similarity index 100%
rename from stable/code-server/2.0.20/app-readme.md
rename to stable/code-server/2.1.0/app-readme.md
diff --git a/stable/code-server/2.0.20/charts/common-8.9.13.tgz b/stable/code-server/2.1.0/charts/common-8.9.13.tgz
similarity index 100%
rename from stable/code-server/2.0.20/charts/common-8.9.13.tgz
rename to stable/code-server/2.1.0/charts/common-8.9.13.tgz
diff --git a/stable/code-server/2.0.20/helm-values.md b/stable/code-server/2.1.0/helm-values.md
similarity index 74%
rename from stable/code-server/2.0.20/helm-values.md
rename to stable/code-server/2.1.0/helm-values.md
index b571ad96b98..413e6679ce5 100644
--- a/stable/code-server/2.0.20/helm-values.md
+++ b/stable/code-server/2.1.0/helm-values.md
@@ -11,18 +11,18 @@ You will, however, be able to use all values referenced in the common chart here
| Key | Type | Default | Description |
|-----|------|---------|-------------|
-| env.DOCKER_USER | string | `"$USER"` | |
-| env.PUID | int | `568` | |
+| args[0] | string | `"--user-data-dir"` | |
+| args[1] | string | `"/config/.vscode"` | |
+| args[2] | string | `"--auth"` | |
+| args[3] | string | `"none"` | |
+| env | object | `{}` | |
| image.pullPolicy | string | `"IfNotPresent"` | |
| image.repository | string | `"tccr.io/truecharts/code-server"` | |
| image.tag | string | `"v3.12.0@sha256:2853a8bdd8eed9c09bcd4b100b9d4be20c42a307b9d1cbae1a204276e948f9ce"` | |
-| persistence.data.enabled | bool | `true` | |
-| persistence.data.mountPath | string | `"/home/coder"` | |
-| persistence.varrun.enabled | bool | `true` | |
-| podSecurityContext.runAsGroup | int | `0` | |
-| podSecurityContext.runAsUser | int | `0` | |
+| persistence.config.enabled | bool | `true` | |
+| persistence.config.mountPath | string | `"/config"` | |
+| securityContext.allowPrivilegeEscalation | bool | `true` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
-| securityContext.runAsNonRoot | bool | `false` | |
| service.main.ports.main.port | int | `10063` | |
| service.main.ports.main.targetPort | int | `8080` | |
diff --git a/stable/code-server/2.0.20/ix_values.yaml b/stable/code-server/2.1.0/ix_values.yaml
similarity index 60%
rename from stable/code-server/2.0.20/ix_values.yaml
rename to stable/code-server/2.1.0/ix_values.yaml
index 4a0c75a0fe1..2cafd555038 100644
--- a/stable/code-server/2.0.20/ix_values.yaml
+++ b/stable/code-server/2.1.0/ix_values.yaml
@@ -3,22 +3,18 @@ image:
pullPolicy: IfNotPresent
tag: v3.12.0@sha256:2853a8bdd8eed9c09bcd4b100b9d4be20c42a307b9d1cbae1a204276e948f9ce
-# PASSWORD: password
-# SUDO_PASSWORD: password
-# HASHED_PASSWORD
+args:
+ - --user-data-dir
+ - "/config/.vscode"
+ - --auth
+ - none
-env:
- PUID: 568
- DOCKER_USER: "$USER"
+env: {}
# PROXY_DOMAIN: code-server.my.domain
securityContext:
readOnlyRootFilesystem: false
- runAsNonRoot: false
-
-podSecurityContext:
- runAsUser: 0
- runAsGroup: 0
+ allowPrivilegeEscalation: true
service:
main:
@@ -28,8 +24,6 @@ service:
targetPort: 8080
persistence:
- data:
- enabled: true
- mountPath: "/home/coder"
- varrun:
+ config:
enabled: true
+ mountPath: "/config"
diff --git a/stable/code-server/2.0.20/questions.yaml b/stable/code-server/2.1.0/questions.yaml
similarity index 99%
rename from stable/code-server/2.0.20/questions.yaml
rename to stable/code-server/2.1.0/questions.yaml
index bcfc0be247f..fc8780aa2e3 100644
--- a/stable/code-server/2.0.20/questions.yaml
+++ b/stable/code-server/2.1.0/questions.yaml
@@ -591,9 +591,9 @@ questions:
schema:
type: dict
attrs:
- - variable: data
- label: "App Data Storage"
- description: "Stores the Application Data."
+ - variable: config
+ label: "App Config Storage"
+ description: "Stores the Application Config."
schema:
type: dict
attrs:
@@ -656,7 +656,7 @@ questions:
description: "Path inside the container the storage is mounted"
schema:
type: string
- default: "/home/coder"
+ default: "/config"
hidden: true
valid_chars: '^\/([a-zA-Z0-9._-]+(\s?[a-zA-Z0-9._-]+|\/?))+$'
- variable: medium
diff --git a/stable/code-server/2.0.20/security.md b/stable/code-server/2.1.0/security.md
similarity index 99%
rename from stable/code-server/2.0.20/security.md
rename to stable/code-server/2.1.0/security.md
index 2681e9e1d9b..7270255fcc7 100644
--- a/stable/code-server/2.0.20/security.md
+++ b/stable/code-server/2.1.0/security.md
@@ -17,8 +17,8 @@ hide:
| Type | Misconfiguration ID | Check | Severity | Explaination | Links |
|:----------------|:------------------:|:-----------:|:------------------:|-----------------------------------------|-----------------------------------------|
+| Kubernetes Security Check | KSV001 | Process can elevate its own privileges | MEDIUM | Expand...
A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.
Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.allowPrivilegeEscalation' to false | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
|
| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | Expand...
The container should drop all default capabilities and add only those that are needed for its execution.
Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should add 'ALL' to 'securityContext.capabilities.drop' | Expand...
https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
|
-| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | Expand...
'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.
Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsNonRoot' to true | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
|
| Kubernetes Security Check | KSV012 | Runs as root user | MEDIUM | Expand...
'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.
Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsNonRoot' to true | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
|
| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW | Expand...
It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.
Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should specify an image tag | Expand...
https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
|
| Kubernetes Security Check | KSV013 | Image tag ':latest' used | LOW | Expand...
It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.
Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should specify an image tag | Expand...
https://kubernetes.io/docs/concepts/configuration/overview/#container-images
https://avd.aquasec.com/appshield/ksv013
|
@@ -30,7 +30,6 @@ hide:
| Kubernetes Security Check | KSV020 | Runs with low user ID | MEDIUM | Expand...
Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.
Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsUser' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
|
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | Expand...
Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.
Container 'RELEASE-NAME-code-server' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsGroup' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
|
| Kubernetes Security Check | KSV021 | Runs with low group ID | MEDIUM | Expand...
Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.
Container 'autopermissions' of Deployment 'RELEASE-NAME-code-server' should set 'securityContext.runAsGroup' > 10000 | Expand...
https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
|
-| Kubernetes Security Check | KSV029 | A root primary or supplementary GID set | LOW | Expand...
Containers should be forbidden from running with a root primary or supplementary GID.
Deployment 'RELEASE-NAME-code-server' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0 | Expand...
https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029
|
## Containers
@@ -253,6 +252,7 @@ hide:
| vim-common | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | | Expand...
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
|
| vim-common | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
|
| vim-common | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
|
+| vim-common | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | | Expand...
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
|
| vim-common | CVE-2008-4677 | LOW | 2:8.2.2434-3 | | Expand...
http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
|
| vim-common | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | | Expand...
http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
|
| vim-tiny | CVE-2021-3770 | HIGH | 2:8.2.2434-3 | | Expand...
http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
|
@@ -267,6 +267,7 @@ hide:
| vim-tiny | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | | Expand...
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
|
| vim-tiny | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
|
| vim-tiny | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
|
+| vim-tiny | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | | Expand...
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
|
| vim-tiny | CVE-2008-4677 | LOW | 2:8.2.2434-3 | | Expand...
http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
|
| vim-tiny | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | | Expand...
http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
|
| xxd | CVE-2021-3770 | HIGH | 2:8.2.2434-3 | | Expand...
http://www.openwall.com/lists/oss-security/2021/10/01/1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3770
https://github.com/vim/vim/commit/2ddb89f8a94425cda1e5491efc80c1ccccb6e08e
https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J2CJLY3CF55I2ULG2X4ENXLSXAXYW5J4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4FFQARG3LGREPDZRI4C7ERQL3RJKEWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNTMVZCN4TRTTCAXRLVQ7H2P7FYAIZQ/
https://ubuntu.com/security/notices/USN-5093-1
|
@@ -281,6 +282,7 @@ hide:
| xxd | CVE-2021-3974 | HIGH | 2:8.2.2434-3 | | Expand...
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
|
| xxd | CVE-2021-3984 | HIGH | 2:8.2.2434-3 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
|
| xxd | CVE-2021-4019 | HIGH | 2:8.2.2434-3 | | Expand...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
|
+| xxd | CVE-2021-4069 | HIGH | 2:8.2.2434-3 | | Expand...
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
|
| xxd | CVE-2008-4677 | LOW | 2:8.2.2434-3 | | Expand...
http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://secunia.com/advisories/31464
http://secunia.com/advisories/34418
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
http://www.securityfocus.com/archive/1/495432
http://www.securityfocus.com/archive/1/495436
http://www.securityfocus.com/bid/30670
http://www.vupen.com/english/advisories/2008/2379
https://bugzilla.redhat.com/show_bug.cgi?id=461750
https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
|
| xxd | CVE-2017-1000382 | LOW | 2:8.2.2434-3 | | Expand...
http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
|
diff --git a/stable/code-server/2.0.20/templates/common.yaml b/stable/code-server/2.1.0/templates/common.yaml
similarity index 100%
rename from stable/code-server/2.0.20/templates/common.yaml
rename to stable/code-server/2.1.0/templates/common.yaml
diff --git a/stable/code-server/2.0.20/values.yaml b/stable/code-server/2.1.0/values.yaml
similarity index 100%
rename from stable/code-server/2.0.20/values.yaml
rename to stable/code-server/2.1.0/values.yaml