Affected by GO-2024-3269
and 3 other vulnerabilities
GO-2024-3269: Connecting to a malicious Codespaces via GH CLI could allow command execution on the user's computer in github.com/cli/cli
GO-2024-3296: Recursive repository cloning can leak authentication tokens to non-GitHub submodule hosts in github.com/cli/cli
GO-2024-3310: Downloading malicious GitHub Actions workflow artifact results in path traversal vulnerability in github.com/cli/cli
GO-2025-3467: `gh attestation verify` returns incorrect exit code during verification if no attestations are present in github.com/cli/cli

The highest tagged major version is
v2.
package
Version:
v1.14.0
Opens a new window with list of versions in this module.
Published: Aug 4, 2021
License: MIT
Opens a new window with license information.
Imports: 11
Opens a new window with list of imports.
Imported by: 3
Opens a new window with list of known importers.
Documentation
¶
EXTENDED to change prompt text
func DefaultEditorName() string
type EditorTemplateData struct {
survey.Editor
EditorCommand string
BlankAllowed bool
Answer string
ShowAnswer bool
ShowHelp bool
Config *survey.PromptConfig
}
EXTENDED to pass editor name (to use in prompt)
type GhEditor struct {
*survey.Editor
EditorCommand string
BlankAllowed bool
}
EXTENDED to enable different prompting behavior
func (e *GhEditor) Prompt(config *survey.PromptConfig) (interface{}, error)
EXTENDED This is straight copypasta from survey to get our overridden prompt called.;
Source Files
¶
Click to show internal directories.
Click to hide internal directories.