Skip to content

Commit 33f5ba0

Browse files
authored
Merge branch 'main' into 2024-12-05_more_error_handling
2 parents 7eee7b2 + 39416eb commit 33f5ba0

File tree

2 files changed

+144
-0
lines changed

2 files changed

+144
-0
lines changed

.pre-commit-config.yaml

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
# Use 'pre-commit autoupdate' to upgrade them
2+
repos:
3+
- repo: https://github.com/pre-commit/pre-commit-hooks
4+
rev: v5.0.0
5+
hooks:
6+
# - id: no-commit-to-branch
7+
- id: check-yaml
8+
args:
9+
- "--unsafe"
10+
- id: end-of-file-fixer
11+
exclude: "(.whitesource|.patch|.drawio|apikey)"
12+
- id: trailing-whitespace
13+
exclude: ".patch"
14+
- id: check-merge-conflict
15+
- id: debug-statements
16+
- id: fix-byte-order-marker
17+
- id: check-case-conflict
18+
- id: check-symlinks
19+
- id: mixed-line-ending
20+
- id: check-added-large-files
21+
args:
22+
- --maxkb=1000
23+
- --enforce-all
24+
- id: forbid-submodules
25+
26+
- repo: https://github.com/doublify/pre-commit-rust
27+
rev: v1.0
28+
hooks:
29+
- id: fmt
30+
- id: cargo-check
31+
32+
- repo: https://github.com/ibm/detect-secrets
33+
rev: 0.13.1+ibm.62.dss
34+
hooks:
35+
- id: detect-secrets # pragma: whitelist secret
36+
# Update baseline file with:
37+
# detect-secrets scan --update .secrets.baseline
38+
# Add options for detect-secrets-hook binary. You can run `detect-secrets-hook --help` to list out all possible options.
39+
# add "--fail-on-unaudited" to fail pre-commit for unaudited potential secrets
40+
args: [--baseline, .secrets.baseline, --use-all-plugins]

.secrets.baseline

Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,104 @@
1+
{
2+
"exclude": {
3+
"files": "^.secrets.baseline$",
4+
"lines": null
5+
},
6+
"generated_at": "2024-12-09T10:13:16Z",
7+
"plugins_used": [
8+
{
9+
"name": "AWSKeyDetector"
10+
},
11+
{
12+
"name": "ArtifactoryDetector"
13+
},
14+
{
15+
"name": "AzureStorageKeyDetector"
16+
},
17+
{
18+
"base64_limit": 4.5,
19+
"name": "Base64HighEntropyString"
20+
},
21+
{
22+
"name": "BasicAuthDetector"
23+
},
24+
{
25+
"name": "BoxDetector"
26+
},
27+
{
28+
"name": "CloudantDetector"
29+
},
30+
{
31+
"ghe_instance": "github.ibm.com",
32+
"name": "GheDetector"
33+
},
34+
{
35+
"name": "GitHubTokenDetector"
36+
},
37+
{
38+
"hex_limit": 3,
39+
"name": "HexHighEntropyString"
40+
},
41+
{
42+
"name": "IbmCloudIamDetector"
43+
},
44+
{
45+
"name": "IbmCosHmacDetector"
46+
},
47+
{
48+
"name": "JwtTokenDetector"
49+
},
50+
{
51+
"keyword_exclude": null,
52+
"name": "KeywordDetector"
53+
},
54+
{
55+
"name": "MailchimpDetector"
56+
},
57+
{
58+
"name": "NpmDetector"
59+
},
60+
{
61+
"name": "PrivateKeyDetector"
62+
},
63+
{
64+
"name": "SlackDetector"
65+
},
66+
{
67+
"name": "SoftlayerDetector"
68+
},
69+
{
70+
"name": "SquareOAuthDetector"
71+
},
72+
{
73+
"name": "StripeDetector"
74+
},
75+
{
76+
"name": "TwilioKeyDetector"
77+
}
78+
],
79+
"results": {
80+
"src/client/app_configuration_client.rs": [
81+
{
82+
"hashed_secret": "fb34629c9af1ed4045b5d6f287426276b2be3a1e",
83+
"is_verified": false,
84+
"line_number": 303,
85+
"type": "Secret Keyword",
86+
"verified_result": null
87+
}
88+
],
89+
"src/client/http.rs": [
90+
{
91+
"hashed_secret": "91271e4ebcf7a9793e252299b9a2c77c8d964325",
92+
"is_verified": false,
93+
"line_number": 42,
94+
"type": "Secret Keyword",
95+
"verified_result": null
96+
}
97+
]
98+
},
99+
"version": "0.13.1+ibm.62.dss",
100+
"word_list": {
101+
"file": null,
102+
"hash": null
103+
}
104+
}

0 commit comments

Comments
 (0)