Skip to content

Conversation

@NimRegev
Copy link
Contributor

No description provided.

Added bucket pipelines for CI pipelines and renamed "pipelines" in ProjectOne to workflows
Xrefs to new bucket
Fixed x-refs, formatting, and ported pipeline settings from Classic and moved to Pipeline bucket
Added entries to home and nav yamls for pipeline topics
Copied set disk space from Classic to pipeline topic and git triggers
Changed bucket name to workflows and updated x-refs and nav files accordingly
Added missing images and replaced sidebar with new design
@gitguardian
Copy link

gitguardian bot commented Dec 19, 2022

⚠️ GitGuardian has uncovered 8 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id Secret Commit Filename
5145815 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145816 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145817 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145817 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145818 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145815 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145817 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145815 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

Our GitHub checks need improvements? Share your feedbacks!

1 similar comment
@gitguardian
Copy link

gitguardian bot commented Dec 19, 2022

⚠️ GitGuardian has uncovered 8 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id Secret Commit Filename
5145815 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145816 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145817 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145817 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145818 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145815 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145817 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
5145815 PostgreSQL Credentials 1ae495c _docs/installation/codefresh-on-prem.md View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

Our GitHub checks need improvements? Share your feedbacks!

@NimRegev NimRegev merged commit 1d3a819 into project-one Dec 19, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants