Skip to content

fix: Fixed nvLinkLogicalPartitionId typo in nvLinkInterface schema#80

Open
hwadekar-nv wants to merge 1 commit intomainfrom
fix/attribute-name-change
Open

fix: Fixed nvLinkLogicalPartitionId typo in nvLinkInterface schema#80
hwadekar-nv wants to merge 1 commit intomainfrom
fix/attribute-name-change

Conversation

@hwadekar-nv
Copy link
Contributor

No description provided.

@copy-pr-bot
Copy link

copy-pr-bot bot commented Jan 29, 2026

This pull request requires additional validation before any workflows can run on NVIDIA's runners.

Pull request vetters can view their responsibilities here.

Contributors can view more details about this message here.

@github-actions
Copy link

github-actions bot commented Jan 29, 2026

Test Results

6 395 tests  ±0   6 395 ✅ ±0   8m 5s ⏱️ - 1m 36s
   91 suites ±0       0 💤 ±0 
   11 files   ±0       0 ❌ ±0 

Results for commit 385d0d3. ± Comparison against base commit cd44a77.

♻️ This comment has been updated with latest results.

@github-actions
Copy link

🔐 TruffleHog Secret Scan

No secrets or credentials found!

Your code has been scanned for 700+ types of secrets and credentials. All clear! 🎉

🔗 View scan details

🕐 Last updated: 2026-01-29 10:28:42 UTC | Commit: fe7ba35

@github-actions
Copy link

🛡️ Vulnerability Scan

🚨 Found 60 vulnerability(ies)

Severity Breakdown:

  • 🔴 Critical/High: 60
  • 🟡 Medium: 0
  • 🔵 Low/Info: 0
📋 Top Vulnerabilities
  • CVE-2023-45142: Package: go.opentelemetry.io/contrib/instrumentation/github.com/labstack/echo/otelecho
    Installed Version: v0.37.0
    Vulnerability CVE-2023-45142
    Severity: HIGH
    Fixed Version: 0.44.0
    Link: CVE-2023-45142 (go.mod)
  • KSV014: Artifact: api/kustomize/base/deployment.yaml
    Type: kubernetes
    Vulnerability KSV014
    Severity: HIGH
    Message: Container 'cloud-api' of Deployment 'cloud-api' should set 'securityContext.readOnlyRootFilesystem' to true
    Link: KSV014 (api/kustomize/base/deployment.yaml)
  • KSV014: Artifact: cert-manager/kustomize/deployment.yaml
    Type: kubernetes
    Vulnerability KSV014
    Severity: HIGH
    Message: Container 'credsmgr' of Deployment 'credsmgr' should set 'securityContext.readOnlyRootFilesystem' to true
    Link: KSV014 (cert-manager/kustomize/deployment.yaml)
  • KSV014: Artifact: cert-manager/kustomize/deployment.yaml
    Type: kubernetes
    Vulnerability KSV014
    Severity: HIGH
    Message: Container 'vault' of Deployment 'credsmgr' should set 'securityContext.readOnlyRootFilesystem' to true
    Link: KSV014 (cert-manager/kustomize/deployment.yaml)
  • KSV118: Artifact: cert-manager/kustomize/deployment.yaml
    Type: kubernetes
    Vulnerability KSV118
    Severity: HIGH
    Message: container credsmgr in cert-manager namespace is using the default security context
    Link: KSV118 (cert-manager/kustomize/deployment.yaml)
  • KSV118: Artifact: cert-manager/kustomize/deployment.yaml
    Type: kubernetes
    Vulnerability KSV118
    Severity: HIGH
    Message: deployment credsmgr in cert-manager namespace is using the default security context, which allows root privileges
    Link: KSV118 (cert-manager/kustomize/deployment.yaml)
  • KSV045: Artifact: cert-manager/kustomize/sa-role.yaml
    Type: kubernetes
    Vulnerability KSV045
    Severity: CRITICAL
    Message: Role permits wildcard verb on specific resources
    Link: KSV045 (cert-manager/kustomize/sa-role.yaml)
  • KSV014: Artifact: db/kustomize/base/job.yaml
    Type: kubernetes
    Vulnerability KSV014
    Severity: HIGH
    Message: Container 'cloud-db' of Job 'cloud-db-migration-0-1-47' should set 'securityContext.readOnlyRootFilesystem' to true
    Link: KSV014 (db/kustomize/base/job.yaml)
  • AVD-KSV-0109: Artifact: deploy/kustomize/base/api/configmap.yaml
    Type: kubernetes
    Vulnerability AVD-KSV-0109
    Severity: HIGH
    Message: ConfigMap 'carbide-rest-api-config' in 'default' namespace stores secrets in key(s) or value(s) '{" password"}'
    Link: AVD-KSV-0109 (deploy/kustomize/base/api/configmap.yaml)
  • KSV014: Artifact: deploy/kustomize/base/api/deployment.yaml
    Type: kubernetes
    Vulnerability KSV014
    Severity: HIGH
    Message: Container 'api' of Deployment 'carbide-rest-api' should set 'securityContext.readOnlyRootFilesystem' to true
    Link: KSV014 (deploy/kustomize/base/api/deployment.yaml)

💡 Note: Enable GitHub Advanced Security to see full details in the Security tab.

🕐 Last updated: 2026-01-29 10:28:44 UTC | Commit: fe7ba35

@hwadekar-nv hwadekar-nv changed the title fix: Fix the type on NvLinkInterface attribute fix: Fixed nvLinklogicalPartitionId typo in nvLinkInterface json schema Jan 29, 2026
@thossain-nv thossain-nv changed the title fix: Fixed nvLinklogicalPartitionId typo in nvLinkInterface json schema fix: Fixed nvLinklogicalPartitionId typo in nvLinkInterface schema Jan 29, 2026
@thossain-nv thossain-nv changed the title fix: Fixed nvLinklogicalPartitionId typo in nvLinkInterface schema fix: Fixed nvLinkLogicalPartitionId typo in nvLinkInterface schema Jan 29, 2026
Copy link
Contributor

@pbreton pbreton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

@hwadekar-nv hwadekar-nv force-pushed the fix/attribute-name-change branch from fe7ba35 to 385d0d3 Compare January 30, 2026 13:34
@thossain-nv
Copy link
Contributor

@hwadekar-nv Let's hold off from merging this until I have a way of coordinating the change.

@github-actions
Copy link

This PR has been inactive for 30 days and will be closed soon.
Please push commits or comment to keep it open.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants