Skip to content

Conversation

@prkhrkat
Copy link
Contributor

@prkhrkat prkhrkat commented May 28, 2025

@gitguardian
Copy link

gitguardian bot commented May 28, 2025

⚠️ GitGuardian has uncovered 2 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
2303650 Triggered Generic High Entropy Secret 0bcc13c ci-runner/vendor/github.com/go-resty/resty/v2/request.go View secret
9416345 Triggered Company Email Password 0bcc13c ci-runner/vendor/github.com/go-resty/resty/v2/request.go View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

@github-actions
Copy link

github-actions bot commented Jun 4, 2025

Some linked issues are invalid. Please update the issue links:\nIssue # in is not found or invalid (HTTP 404).\n

# Conflicts:
#	chart-sync/go.mod
#	chart-sync/go.sum
#	chart-sync/vendor/modules.txt
#	ci-runner/go.mod
#	ci-runner/go.sum
#	ci-runner/vendor/modules.txt
#	git-sensor/go.mod
#	git-sensor/go.sum
#	git-sensor/vendor/modules.txt
#	image-scanner/go.mod
#	image-scanner/go.sum
#	image-scanner/vendor/modules.txt
#	kubelink/go.mod
#	kubelink/go.sum
#	kubelink/vendor/modules.txt
#	kubewatch/go.mod
#	kubewatch/go.sum
#	kubewatch/vendor/modules.txt
#	lens/go.mod
#	lens/go.sum
#	lens/vendor/modules.txt
@github-actions
Copy link

github-actions bot commented Jun 4, 2025

Some linked issues are invalid. Please update the issue links:\nIssue # in is not found or invalid (HTTP 404).\n

@github-actions
Copy link

github-actions bot commented Jun 4, 2025

Some linked issues are invalid. Please update the issue links:\nIssue # in is not found or invalid (HTTP 404).\n

@github-actions
Copy link

github-actions bot commented Jun 5, 2025

Some linked issues are invalid. Please update the issue links:\nIssue # in is not found or invalid (HTTP 404).\n

@prkhrkat prkhrkat changed the title fix: Dependa fix fix: Dependabot changes to fix vulnerabilities Jun 5, 2025
@github-actions
Copy link

github-actions bot commented Jun 5, 2025

Some linked issues are invalid. Please update the issue links:\nIssue # in is not found or invalid (HTTP 404).\n

1 similar comment
@github-actions
Copy link

github-actions bot commented Jun 5, 2025

Some linked issues are invalid. Please update the issue links:\nIssue # in is not found or invalid (HTTP 404).\n

@prkhrkat prkhrkat changed the title fix: Dependabot changes to fix vulnerabilities misc: Dependabot changes to fix vulnerabilities Jun 5, 2025
@prkhrkat prkhrkat merged commit 3c18cce into develop Jun 5, 2025
3 of 5 checks passed
@prkhrkat prkhrkat deleted the dependa-fix branch June 5, 2025 11:50
vikramdevtron added a commit that referenced this pull request Jun 19, 2025
* SecretFieldClusterId to CmFieldClusterId

* replace secret informer with field selector to configmap informer with label selector

* CreateConfigMapObject

* ClusterModifyEventSecretTypeKey

* DeleteConfigMap k8s util func

* correct label selector

* add extra validation in add , update and delete func
if labelValue, exists := cmObject.Labels["type"]; !exists || labelValue != informerBean.ClusterModifyEventSecretType {
						return
					}

* cm informer instead of secret informer for cluster

* bump common lib

* bump common lib

* bump common lib

* bump common lib

* fix

* bump common lib

* bump common lib

* r

* ClusterModifyEventCmLabelValue  = "cluster-request-modify"

* ClusterModifyEventCmLabelValue  = "type=cluster-request-modify"

* import label selector from commonb lib

* import label selector from commonb lib

* ClusterModifyEventCmLabelKeyValue and ClusterModifyEventCmLabelValue

* small fix

* small fix

* add logger for ignoring cluster change event in case label not found

* fix

* logger

* refactoring of CreateConfigMapObject

* fix

* bump common lib

* bump common lib

* remove WithCmName and make cmname as func signature

* code review incorporation

* bump common lib

* make

* bump common lib

* Merge pull request #282 from devtron-labs/dependa-fix

misc: Dependabot changes to fix vulnerabilities

* chore: http shutdown timeout configurable (#291) (#293)

* feat: add server shutdown timeout configuration and improve logging

* feat: add SERVER_SHUTDOWN_TIMEOUT to configuration

Co-authored-by: Shivam Nagar <[email protected]>

* restored mod changes for kubelink and kubewatch (#294)

* vendor update on rc 38 (#295)

* chore: port forward tls client server name (#296)

* chore-port-forward-debug

* review comments resolved

---------

Co-authored-by: Prakash Kumar <[email protected]>
Co-authored-by: kartik-579 <[email protected]>
Co-authored-by: prakhar katiyar <[email protected]>
Co-authored-by: Shivam Nagar <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants