Skip to content

Conversation

@harshithad0703
Copy link
Contributor

No description provided.

aman19K and others added 30 commits October 13, 2025 12:18
feat: taxonomy localization support in export, import & migration plugin
feat: Added taxonomy localization support in export-to-csv
Fix: Added test cases for Entries helper
Fix: Added Tests for Stack module
Fix: Added Test cases for environments module
feat: add test cases base-class and asssets  for export module
Fix: Added Tests for Locales module
chore: add test cases for envs, extensions, locales,stacks, taxonomies and webhooks
chore: add test cases for global-fields, custom roles, workflows, content-types
naman-contentstack and others added 24 commits October 31, 2025 15:39
DX - 3671 - Added Unit Tests for Utilities
DX - 3623 - Fixed the Handling of Multiple Global Fields
Added taxonomy localization unit testcases
…lization

Feat/dx 3571 taxonomy localization
@harshithad0703 harshithad0703 requested a review from a team as a code owner November 7, 2025 06:49
@harshithad0703 harshithad0703 changed the title DX | 10-11-2025 | Release DX | 10-11-2025 | Staging Nov 7, 2025
@gitguardian
Copy link

gitguardian bot commented Nov 7, 2025

⚠️ GitGuardian has uncovered 1 secret following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secret in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
21937205 Triggered Generic Password c2b979a pnpm-lock.yaml View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secret safely. Learn here the best practices.
  3. Revoke and rotate this secret.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

@harshithad0703 harshithad0703 merged commit eb5db3b into staging Nov 7, 2025
10 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants