Skip to content

Conversation

@Nayana-R-Gowda
Copy link
Collaborator

Signed-off-by: NAYANAR nayana.r5@ibm.com

🐛 Bug-fix PR

📌 Summary

What problem does this PR fix and why?
Make users change default admin passwords and secrets for production deployments

🧪 Verification

Check Command Status
Lint suite make lint pass
Unit tests make test pass

📐 MCP Compliance (if relevant)

  • Matches current MCP spec
  • No breaking change to MCP clients

✅ Checklist

  • Code formatted (make black isort pre-commit)
  • No secrets/credentials committed

…deployments

Signed-off-by: NAYANAR <nayana.r5@ibm.com>
Signed-off-by: NAYANAR <nayana.r5@ibm.com>
Signed-off-by: NAYANAR <nayana.r5@ibm.com>
@jonpspri
Copy link
Contributor

I just plowed through a whole bunch of passwords and other secrets in config.py that were not using SecretStr, so you may want to look at #1330 and rebase or integrate to it, perhaps with SecretStr conditional logic.

…afe environment, sends input, and ensures proper cleanup

Signed-off-by: NAYANAR <nayana.r5@ibm.com>
…n for the “hardcoded password string” rule

Signed-off-by: NAYANAR <nayana.r5@ibm.com>
Signed-off-by: NAYANAR <nayana.r5@ibm.com>
…t, or remove its shebang

Signed-off-by: NAYANAR <nayana.r5@ibm.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants