Skip to content

Comments

Master#103

Open
ymugoder wants to merge 14 commits intoazure-aks-ocean-examplefrom
master
Open

Master#103
ymugoder wants to merge 14 commits intoazure-aks-ocean-examplefrom
master

Conversation

@ymugoder
Copy link

This is the default pull request template. You can customize it by adding a pull_request_template.md at the root of your repo or inside the .github folder.

Jira Ticket

Include a link to your Jira Ticket
Example: JIRAISS-1234

Demo

Please add a recording of the feature/bug fix in work. if you added new routes, the recording should show the request and response for each new/changed route

Checklist:

  • I have filled relevant self assessment (NodeJS, Frontend, Backend)
  • I have run ESlint on my changes and fixed all warnings and errors (NodeJS & Frontend Services)
  • My code follows the style guidelines of this project
  • I have performed a self-review of my own code
  • I have validated all the requirements in the Jira task were answered
  • I have all neccessary approvals for the design/mini design of this task
  • I have approved the API changes and granular permission patterns (documentation subtask) (For public services only)

dependabot bot and others added 10 commits October 3, 2023 06:21
Bumps [urllib3](https://github.com/urllib3/urllib3) from 2.0.3 to 2.0.6.
- [Release notes](https://github.com/urllib3/urllib3/releases)
- [Changelog](https://github.com/urllib3/urllib3/blob/main/CHANGES.rst)
- [Commits](urllib3/urllib3@2.0.3...2.0.6)

---
updated-dependencies:
- dependency-name: urllib3
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Added 2 permissions for AccessEKS.
DescribeNodegroup and ListNodegroups
These 2 allow the new Spot Console Integration to auto-create VNGs for each EKS Cluster
…CLI (#89)

Bumps [cryptography](https://github.com/pyca/cryptography) from 41.0.3 to 41.0.4.
- [Changelog](https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst)
- [Commits](pyca/cryptography@41.0.3...41.0.4)

---
updated-dependencies:
- dependency-name: cryptography
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
* SF-8332 - Add support for onboarding all subscriptions in a tenant. A… (#1)

* SF-8332 - Add support for onboarding all subscriptions in a tenant. Add support for onboarding the Cost Intelligence product.

* PR comments.

* SF-9925 - Added error handling for individual subscriptions. Updated (#2)

* SF-9925 - Added error handling for individual subscriptions. Updated
logging.

* Added comments. Added failed subscriptions to output.

* logging tweaks

* renamed extension install method
* Updating custom role definition source for core products.

* Clean up comments.

* More cleanup.
We do required the following to get allow STS
iam:PassRole


def log(message, log_level=LogLevel.INFO):
print(f"{datetime.now().strftime('%H:%M:%S.%f')[:-3]} [{log_level}] {message}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.
This expression logs
sensitive data (secret)
as clear text.
This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (secret)
as clear text.
This expression logs
sensitive data (secret)
as clear text.
wesctl and others added 3 commits July 18, 2024 10:59
* add ListAccountAliases to EKS StackSet

* remove buggy output code

* add gc onboarder script

* fix format

* format fix

* fix format

* fix formatting

* fix wording

* fix url

* fix content

* fix content

* update readme

* fix examples

* update read-only default to false

* download role once

* remove spot_account_id

* grammar fixes

* add csv list option for subscription onboarding

* add file based onboarding

* remove unused import

* clean up comments
* [src] SF-21801: Add Eco terraform setup scripts.

* [src] SF-21801: Add Eco onboarding setup scripts.

* [src] SF-21801: Remove unused policies for Eco.


print(f"App ID: {app_id}")
print(f"Secret Key: {secret_key}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.


print(f"App ID: {app_id}")
print(f"Secret Key: {secret_key}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.


print(f"App ID: {app_id}")
print(f"Secret Key: {secret_key}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.


print(f"App ID: {app_id}")
print(f"Secret Key: {secret_key}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.


print(f"App ID: {app_id}")
print(f"Secret Key: {secret_key}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.


print(f"App ID: {app_id}")
print(f"Secret Key: {secret_key}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.


print(f"App ID: {app_id}")
print(f"Secret Key: {secret_key}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.


print(f"App ID: {app_id}")
print(f"Secret Key: {secret_key}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants