Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Self-Hosted Ingest #309

Open
wants to merge 22 commits into
base: main
Choose a base branch
from
Open

Self-Hosted Ingest #309

wants to merge 22 commits into from

Conversation

star-nox
Copy link
Member

@star-nox star-nox commented Oct 7, 2024

Using Redis Queue to self-host ingest module

@star-nox star-nox self-assigned this Oct 7, 2024
Copy link

You need to setup a payment method to use Lintrule

You can fix that by putting in a card here.

@star-nox star-nox marked this pull request as draft October 7, 2024 18:09
Copy link

gitguardian bot commented Oct 16, 2024

⚠️ GitGuardian has uncovered 2 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

Since your pull request originates from a forked repository, GitGuardian is not able to associate the secrets uncovered with secret incidents on your GitGuardian dashboard.
Skipping this check run and merging your pull request will create secret incidents on your GitGuardian dashboard.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
14175436 Triggered Redis Credentials d0440a0 run-dev-local.sh View secret
14175436 Triggered Redis Credentials ee0a5d0 run-dev-local.sh View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

@star-nox
Copy link
Member Author

Accidently uploaded my run-dev-local.sh file with Redis vars exposed, have deleted it now!

@star-nox star-nox marked this pull request as ready for review October 16, 2024 23:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants