-
Notifications
You must be signed in to change notification settings - Fork 64
update recreate branch with updated restvv #21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: re-create2
Are you sure you want to change the base?
Conversation
|
| Secret | Commit | Filename | Detected At | |
|---|---|---|---|---|
| Generic High Entropy Secret | b6eb212 | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
| Generic High Entropy Secret | 5ae2af7 | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
| Generic High Entropy Secret | cfd08e3 | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
| Generic High Entropy Secret | 64d6d8a | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
| Generic High Entropy Secret | 2d1e6bd | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
| Generic High Entropy Secret | 2d1e6bd | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
| Generic High Entropy Secret | 33c3cd2 | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
| Generic High Entropy Secret | 33c3cd2 | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
| Generic High Entropy Secret | a837436 | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
| Generic High Entropy Secret | a837436 | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
| Generic High Entropy Secret | 2a4601c | configuration/docker.ini | 12:28 July 26th, 2021 | View secret |
🛠 How to resolve this
-
Understand the implications of revoking this secret by examining where it is used in your code.
-
Replace and store your secret safely. Learn here the best practices
-
Revoke and rotate this secret
-
If possible, rewrite your git history to remove all evidence of the secret leak. Please beware this is not a trivial operation. You might completely break other contributing developers’ workflow and you risk accidentally deleting work in progress.
💡 To avoid such incidents in the future, consider following these best practices for managing and storing secrets including API keys and other credentials.
You are seeing this because you or someone else has authorized GitGuardian to scan pull requests
Develop 2 0
…in requirements.txt.
periodic update to add new 2002_02 database info
Fix up docker install for new version 2.1.0
… weird. For some reason the live server thinks a SeqObject is passed in the dict not string
Fix setup.py
Update to flask_restx and update REQUIREMENTS.txt
… flask-restx and Python 10
update copyright statement for 2023
Merge into develop
Merge pull request #89 from openvar/master
Update to use select_transcripts = raw field
Update vdb docker to FROM mysql:5.7-debian
update hello endpoint
Tweak docker workflow to deal with issue https://github.com/openvar/r…
Add in LOVD to g2t
update to python 3.12
Tweaks to new env setup
update version capture
Add code from Genomenon that allows flask to load config from environment variables as standard, this can be used to disable the rate limits for endpoints if wanted (e.g if running on internal servers). (see #192) This may be replaced/supplemented later with VV endpoint specific config options.
Add tests for curl requests into swarms
Develop 3.0.0
Dynamic limiting
No description provided.