Skip to content
This repository has been archived by the owner on Nov 4, 2024. It is now read-only.

created detect-secrets baseline and added call to build locally script #230

Merged
merged 5 commits into from
Jun 3, 2024

Conversation

KirbyKatcher
Copy link
Contributor

Why?

This change is so that when a developer makes any changes to code, it can check that they have not introduced any secrets into the code-base that shouldn't be there.

Signed-off-by: Savvas Kyriacou <savvasky@uk.ibm.com>
Signed-off-by: Savvas Kyriacou <savvasky@uk.ibm.com>
@galasa-team
Copy link

Build successful

1 similar comment
@galasa-team
Copy link

Build successful

Signed-off-by: Savvas Kyriacou <savvasky@uk.ibm.com>
@galasa-team
Copy link

Build successful

Signed-off-by: Savvas Kyriacou <savvasky@uk.ibm.com>
@galasa-team
Copy link

Build failed, see http://localhost:8001/api/v1/namespaces/tekton-pipelines/services/tekton-dashboard:http/proxy/#/namespaces/galasa-build/pipelineruns/repo-extensions-pr-230-znklj for details. If you are unable to do so, please contact a member of the Galasa team.

@galasa-team
Copy link

Build successful

@KirbyKatcher KirbyKatcher merged commit caf4920 into main Jun 3, 2024
5 checks passed
@KirbyKatcher KirbyKatcher deleted the issue-1884-detect-secrets branch June 3, 2024 10:20
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants