-
-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Controle de produção #26
Conversation
Soon to determine max page default.
Add current day pending order jog nad weekly pending order job.
do not need pluck. It consumes 1 second in big O cases.
record once.
[/318] Exibe toastr quando ocorre falha no login
…mance Feat/396 pending job performance
remove byebug
….rb: task #security Add account reference to bling_order_items table
expect account id on the final result.
creat and update with account id.
query also by account id.
query also by account id.
query also by account id.
query also by account id SheinOrder.
query also by account id SheinOrder.
add account id with created user account.
foreign key false
optional true
account association is optional
Fix/security
add tenant
open the endpoint
require daily and quantity revenues
add canceled section container.
add action canceled_revenue
add function plot chart bar
require canceled revenue chart file
adjust min-height
require chart-container
remove padding 0
…revenue Feat/428 canceled estimate revenue
create a filter for pending products
|
GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
---|---|---|---|---|---|
9127219 | Triggered | PostgreSQL Credentials | cdc4397 | config/database.yml | View secret |
9127219 | Triggered | PostgreSQL Credentials | 92895b8 | config/database.yml | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secrets safely. Learn here the best practices.
- Revoke and rotate these secrets.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
92895b8
to
0f6a469
Compare
0f6a469
to
92895b8
Compare
0839790
to
3744774
Compare
3744774
to
0839790
Compare
No description provided.