Skip to content
This repository has been archived by the owner on Jul 6, 2023. It is now read-only.

Commit

Permalink
Portworx module support
Browse files Browse the repository at this point in the history
  • Loading branch information
umarali-nagoor authored and hkantare committed Dec 6, 2021
1 parent 7fe8d36 commit ed8a31a
Show file tree
Hide file tree
Showing 45 changed files with 1,663 additions and 628 deletions.
48 changes: 0 additions & 48 deletions .github/workflows/test.yml

This file was deleted.

3 changes: 3 additions & 0 deletions .github/workflows/validate_terraform.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,9 @@ jobs:
-
name: Install pre-commit
run: pip install pre-commit
-
name: Upgrade hooks
run: pre-commit autoupdate
-
name: Run pre-commit command
run: pre-commit run -a
Expand Down
18 changes: 16 additions & 2 deletions .pre-commit-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,12 +6,26 @@ default_stages: [commit]
# Terraform Validate : Validates the configuration files in a directory, referring only to the configuration and not accessing any remote services such as remote state, provider APIs, etc
repos:
- repo: git://github.com/antonbabenko/pre-commit-terraform
rev: v1.45.0
rev: v1.52.0
hooks:
- id: terraform_fmt
- repo: git://github.com/pre-commit/pre-commit-hooks
rev: v3.4.0
rev: v4.0.1
hooks:
- id: check-merge-conflict
- id: trailing-whitespace
- id: detect-private-key
- repo: https://github.com/ibm/detect-secrets
# If you desire to use a specific version of detect-secrets, you can replace `master` with other git revisions such as branch, tag or commit sha.
# You are encouraged to use static refs such as tags, instead of branch name
#
# Running "pre-commit autoupdate" would automatically updates rev to latest tag
rev: 0.13.1+ibm.46.dss
hooks:
- id: detect-secrets # pragma: whitelist secret
# Add options for detect-secrets-hook binary. You can run `detect-secrets-hook --help` to list out all possible options.
# You may also run `pre-commit run detect-secrets` to preview the scan result.
# when "--baseline" without "--use-all-plugins", pre-commit scan with just plugins in baseline file
# when "--baseline" with "--use-all-plugins", pre-commit scan with all available plugins
# add "--fail-on-non-audited" to fail pre-commit for unaudited potential secrets
args: [--baseline, .secrets.baseline, --use-all-plugins ]
118 changes: 118 additions & 0 deletions .secrets.baseline
Original file line number Diff line number Diff line change
@@ -0,0 +1,118 @@
{
"exclude": {
"files": "^.secrets.baseline$",
"lines": null
},
"generated_at": "2021-12-03T11:05:33Z",
"plugins_used": [
{
"name": "AWSKeyDetector"
},
{
"name": "ArtifactoryDetector"
},
{
"name": "AzureStorageKeyDetector"
},
{
"base64_limit": 4.5,
"name": "Base64HighEntropyString"
},
{
"name": "BasicAuthDetector"
},
{
"name": "BoxDetector"
},
{
"name": "CloudantDetector"
},
{
"ghe_instance": "github.ibm.com",
"name": "GheDetector"
},
{
"name": "GitHubTokenDetector"
},
{
"hex_limit": 3,
"name": "HexHighEntropyString"
},
{
"name": "IbmCloudIamDetector"
},
{
"name": "IbmCosHmacDetector"
},
{
"name": "JwtTokenDetector"
},
{
"keyword_exclude": null,
"name": "KeywordDetector"
},
{
"name": "MailchimpDetector"
},
{
"name": "NpmDetector"
},
{
"name": "PrivateKeyDetector"
},
{
"name": "SlackDetector"
},
{
"name": "SoftlayerDetector"
},
{
"name": "SquareOAuthDetector"
},
{
"name": "StripeDetector"
},
{
"name": "TwilioKeyDetector"
}
],
"results": {
"README.md": [
{
"hashed_secret": "91199272d5d6a574a51722ca6f3d1148edb1a0e7",
"is_verified": false,
"line_number": 22,
"type": "Secret Keyword",
"verified_result": null
},
{
"hashed_secret": "af50bf947c115b7868fa982481655fdbd2338007",
"is_verified": false,
"line_number": 33,
"type": "Secret Keyword",
"verified_result": null
}
],
"examples/portworx/README.md": [
{
"hashed_secret": "91199272d5d6a574a51722ca6f3d1148edb1a0e7",
"is_verified": false,
"line_number": 12,
"type": "Secret Keyword",
"verified_result": null
},
{
"hashed_secret": "af50bf947c115b7868fa982481655fdbd2338007",
"is_verified": false,
"line_number": 23,
"type": "Secret Keyword",
"verified_result": null
}
]
},
"version": "0.13.1+ibm.46.dss",
"word_list": {
"file": null,
"hash": null
}
}
2 changes: 1 addition & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,4 @@ corresponding pull request appended.

## [1.0.0] - 2021-03-18

This is the initial release of the module, with support for <module_name_here> resources.
This is the initial release of the module, with support for storage classes for IKS cluster resources.
Loading

0 comments on commit ed8a31a

Please sign in to comment.