Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
27 commits
Select commit Hold shift + click to select a range
f71612d
Add pyproject.toml and poetry.lock files
george42-ctds Jan 24, 2025
bbe3d90
Update .secrets.baseline
george42-ctds Jan 24, 2025
5e4219f
Remove image-build from ci
george42-ctds Jan 24, 2025
a111f48
Add workflow pypi.yaml
george42-ctds Jan 24, 2025
9020c96
Add docstrings to test methods
george42-ctds Jan 24, 2025
89cce98
Use f-strings
george42-ctds Jan 24, 2025
91e26bc
Add docstrings
george42-ctds Jan 25, 2025
504d531
Add docstrings, use f-strings
george42-ctds Jan 25, 2025
bde9be5
Change header tag
george42-ctds Jan 27, 2025
2e0cdb5
Specify 'from err', use f-strings
george42-ctds Jan 27, 2025
e970c45
Specify 'from err'
george42-ctds Jan 29, 2025
731db8c
Change variable name, disable protected-access warning
george42-ctds Jan 29, 2025
e775e69
Remove 'Pipfile' and 'Pipfile.lock'
george42-ctds Jan 29, 2025
d01a15a
Update docstring
george42-ctds Jan 31, 2025
2834723
Update imports
george42-ctds Jan 31, 2025
1f2991c
Use function to remove extra hashes from set
george42-ctds Jan 31, 2025
53bfe27
Specify from err
george42-ctds Jan 31, 2025
a40c24f
Add docstring
george42-ctds Jan 31, 2025
7e4e95d
Remove travis.yml
george42-ctds Jan 31, 2025
91ed15e
Move code for param reformatting to method
george42-ctds Feb 3, 2025
666d00f
Move pylint statement
george42-ctds Feb 3, 2025
2f036b9
sort imports, use f-strings, rename variable
george42-ctds Feb 3, 2025
6eb10ba
Add 'clean.sh' script, add linter dev dependencies
george42-ctds Feb 3, 2025
d74681e
Move 'extra-hashes' method to 'utils' module
george42-ctds Feb 3, 2025
784813d
Add parsers.utils module
george42-ctds Feb 3, 2025
f461473
Bump version
george42-ctds Feb 3, 2025
995ba78
Recover travis remove pypi.yaml
george42-ctds Feb 14, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
48 changes: 48 additions & 0 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
# push will run on every pushed commit to any branch (so this will rerun the tests
# once a branch gets merged to main in addition to any new commits on any branch)
on: push

name: CI

concurrency:
group: '${{ github.workflow }} @ ${{ github.event.pull_request.head.label || github.head_ref || github.ref }}'
cancel-in-progress: true

jobs:
Security:
name: Security Pipeline
uses: uc-cdis/.github/.github/workflows/securitypipeline.yaml@master
with:
python-poetry: 'true'
secrets: inherit

UnitTest:
name: Python Unit Test with Postgres
uses: uc-cdis/.github/.github/workflows/python_unit_test.yaml@master
with:
python-version: '3.9'
use-cache: true

# this creates linter settings and uploads to an artifact so the configs can be pulled and used across jobs
LintConfig:
name: Get Lint Config
uses: uc-cdis/.github/.github/workflows/lint-create-config.yaml@master
with:
python-module-name: "indexclient"

RequiredLint:
name: Run Required Linters
needs: [ LintConfig ]
uses: uc-cdis/.github/.github/workflows/required_lint_check.yaml@master
with:
python-version: '3.9'
use-cache: true

InformationalLint:
name: Run Informational Linters
needs: [ LintConfig ] #TODO Add UnitTest
if: github.ref != 'refs/heads/main'
uses: uc-cdis/.github/.github/workflows/optional_lint_check.yaml@master
with:
python-version: '3.9'
use-cache: true
2 changes: 1 addition & 1 deletion .pre-commit-config.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
repos:
- repo: git@github.com:Yelp/detect-secrets
rev: v1.4.0
rev: v1.5.0
hooks:
- id: detect-secrets
args: ['--baseline', '.secrets.baseline']
Expand Down
74 changes: 53 additions & 21 deletions .secrets.baseline
Original file line number Diff line number Diff line change
@@ -1,12 +1,15 @@
{
"version": "1.4.0",
"version": "1.5.0",
"plugins_used": [
{
"name": "ArtifactoryDetector"
},
{
"name": "AWSKeyDetector"
},
{
"name": "AzureStorageKeyDetector"
},
{
"name": "Base64HighEntropyString",
"limit": 4.5
Expand All @@ -17,16 +20,28 @@
{
"name": "CloudantDetector"
},
{
"name": "DiscordBotTokenDetector"
},
{
"name": "GitHubTokenDetector"
},
{
"name": "GitLabTokenDetector"
},
{
"name": "HexHighEntropyString",
"limit": 3
"limit": 3.0
},
{
"name": "IbmCloudIamDetector"
},
{
"name": "IbmCosHmacDetector"
},
{
"name": "IPPublicDetector"
},
{
"name": "JwtTokenDetector"
},
Expand All @@ -37,18 +52,36 @@
{
"name": "MailchimpDetector"
},
{
"name": "NpmDetector"
},
{
"name": "OpenAIDetector"
},
{
"name": "PrivateKeyDetector"
},
{
"name": "PypiTokenDetector"
},
{
"name": "SendGridDetector"
},
{
"name": "SlackDetector"
},
{
"name": "SoftlayerDetector"
},
{
"name": "SquareOAuthDetector"
},
{
"name": "StripeDetector"
},
{
"name": "TelegramBotTokenDetector"
},
{
"name": "TwilioKeyDetector"
}
Expand All @@ -57,10 +90,6 @@
{
"path": "detect_secrets.filters.allowlist.is_line_allowlisted"
},
{
"path": "detect_secrets.filters.common.is_baseline_file",
"filename": ".secrets.baseline"
},
{
"path": "detect_secrets.filters.common.is_ignored_due_to_verification_policies",
"min_level": 2
Expand Down Expand Up @@ -94,21 +123,29 @@
}
],
"results": {
".github/workflows/ci.yml": [
{
"type": "Secret Keyword",
"filename": ".github/workflows/ci.yml",
"hashed_secret": "3e26d6750975d678acb8fa35a0f69237881576b0",
"is_verified": false,
"line_number": 17
}
],
".travis.yml": [
{
"type": "Base64 High Entropy String",
"filename": ".travis.yml",
"hashed_secret": "f7c7521de09503540ad0e35bbb8119ad4c79f64d",
"is_verified": false,
"line_number": 8
"line_number": 9
},
{
"type": "Base64 High Entropy String",
"filename": ".travis.yml",
"hashed_secret": "c0f6a9c34a9785144815d1663bf345f32ad0d411",
"hashed_secret": "0a07c49ccea860a1045516e575cec330980bb2b4",
"is_verified": false,
"line_number": 28,
"is_secret": false
"line_number": 29
}
],
"README.md": [
Expand All @@ -117,24 +154,21 @@
"filename": "README.md",
"hashed_secret": "4699f6728b23ee847a94d46c8c88845c0d010810",
"is_verified": false,
"line_number": 66,
"is_secret": false
"line_number": 67
},
{
"type": "Hex High Entropy String",
"filename": "README.md",
"hashed_secret": "44cc59c23214afd591bdc879f8aa22094e39424d",
"is_verified": false,
"line_number": 67,
"is_secret": false
"line_number": 68
},
{
"type": "Hex High Entropy String",
"filename": "README.md",
"hashed_secret": "b6f6eef3865774de17320e862df503a2bafff715",
"is_verified": false,
"line_number": 68,
"is_secret": false
"line_number": 69
}
],
"tests/test_client.py": [
Expand All @@ -143,18 +177,16 @@
"filename": "tests/test_client.py",
"hashed_secret": "301918c8b904630da85e75ee32e9ba68ff925b73",
"is_verified": false,
"line_number": 16,
"is_secret": false
"line_number": 17
},
{
"type": "Hex High Entropy String",
"filename": "tests/test_client.py",
"hashed_secret": "27860ead00d0b07e86f0819703c8ea31113025a4",
"is_verified": false,
"line_number": 58,
"is_secret": false
"line_number": 61
}
]
},
"generated_at": "2023-01-30T20:56:37Z"
"generated_at": "2025-01-27T15:12:02Z"
}
17 changes: 0 additions & 17 deletions Pipfile

This file was deleted.

Loading