Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 1 addition & 2 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,5 @@ jobs:
name: Python Unit Test with Postgres
uses: uc-cdis/.github/.github/workflows/python_unit_test.yaml@master
with:
test-script: 'test/ci_commands_script.sh'
python-version: '3.9'
python-version: '3.13'
use-cache: true
4 changes: 2 additions & 2 deletions .github/workflows/pypi.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,9 @@ jobs:
name: PyPI Poetry Publish
uses: uc-cdis/.github/.github/workflows/python_package_index_publish.yaml@master
with:
PYTHON_VERSION: '3.9'
PYTHON_VERSION: '3.13'
# This will attempt push to test PyPI first and only push to prod if it works
DO_TEST_PUBLISH_FIRST: true
secrets:
PYPI_TEST_API_TOKEN: ${{ secrets.PYPI_TEST_API_TOKEN }}
PYPI_PROD_API_TOKEN: ${{ secrets.PYPI_PROD_API_TOKEN }}
PYPI_PROD_API_TOKEN: ${{ secrets.PYPI_PROD_API_TOKEN }}
145 changes: 75 additions & 70 deletions .secrets.baseline
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{
"generated_at": "2021-07-02T16:04:40Z",
"version": "1.5.0",
"plugins_used": [
{
"name": "AWSKeyDetector"
"name": "ArtifactoryDetector"
},
{
"name": "ArtifactoryDetector"
"name": "AWSKeyDetector"
},
{
"name": "Base64HighEntropyString",
Expand All @@ -31,8 +31,8 @@
"name": "JwtTokenDetector"
},
{
"keyword_exclude": null,
"name": "KeywordDetector"
"name": "KeywordDetector",
"keyword_exclude": ""
},
{
"name": "MailchimpDetector"
Expand All @@ -53,99 +53,104 @@
"name": "TwilioKeyDetector"
}
],
"filters_used": [
{
"path": "detect_secrets.filters.allowlist.is_line_allowlisted"
},
{
"path": "detect_secrets.filters.common.is_baseline_file",
"filename": ".secrets.baseline"
},
{
"path": "detect_secrets.filters.common.is_ignored_due_to_verification_policies",
"min_level": 2
},
{
"path": "detect_secrets.filters.heuristic.is_indirect_reference"
},
{
"path": "detect_secrets.filters.heuristic.is_likely_id_string"
},
{
"path": "detect_secrets.filters.heuristic.is_lock_file"
},
{
"path": "detect_secrets.filters.heuristic.is_not_alphanumeric_string"
},
{
"path": "detect_secrets.filters.heuristic.is_potential_uuid"
},
{
"path": "detect_secrets.filters.heuristic.is_prefixed_with_dollar_sign"
},
{
"path": "detect_secrets.filters.heuristic.is_sequential_string"
},
{
"path": "detect_secrets.filters.heuristic.is_swagger_file"
},
{
"path": "detect_secrets.filters.heuristic.is_templated_secret"
}
],
"results": {
"Pipfile.lock": [
".github/workflows/ci.yml": [
{
"type": "Hex High Entropy String",
"filename": "Pipfile.lock",
"hashed_secret": "f84f5e7ad363cd23405ba19c5d1ece94601865ce",
"type": "Secret Keyword",
"filename": ".github/workflows/ci.yml",
"hashed_secret": "3e26d6750975d678acb8fa35a0f69237881576b0",
"is_verified": false,
"line_number": 4,
"is_secret": false
"line_number": 17
}
],
"test/auth/test_private_key.pem": [
"tests/auth/test_private_key.pem": [
{
"type": "Private Key",
"filename": "test/auth/test_private_key.pem",
"filename": "tests/auth/test_private_key.pem",
"hashed_secret": "be4fc4886bd949b369d5e092eb87494f12e57e5b",
"is_verified": false,
"line_number": 1,
"is_secret": false
"line_number": 1
}
],
"test/auth/test_private_key_2.pem": [
"tests/auth/test_private_key_2.pem": [
{
"type": "Private Key",
"filename": "test/auth/test_private_key_2.pem",
"filename": "tests/auth/test_private_key_2.pem",
"hashed_secret": "be4fc4886bd949b369d5e092eb87494f12e57e5b",
"is_verified": false,
"line_number": 1,
"is_secret": false
"line_number": 1
}
],
"test/hmac4/test_hmac4.py": [
"tests/hmac4/test_hmac4.py": [
{
"type": "Hex High Entropy String",
"filename": "test/hmac4/test_hmac4.py",
"hashed_secret": "62c2d5271399e315bf07038e7d538f1f2e947e6b",
"type": "Base64 High Entropy String",
"filename": "tests/hmac4/test_hmac4.py",
"hashed_secret": "56c1d3d608e82b0d0153eb3912cdfcf33b61b4ea",
"is_verified": false,
"line_number": 188,
"is_secret": false
"line_number": 64
},
{
"type": "Secret Keyword",
"filename": "test/hmac4/test_hmac4.py",
"hashed_secret": "110e32fb8e6cb58dabbe8462821c66da052e0282",
"filename": "tests/hmac4/test_hmac4.py",
"hashed_secret": "56c1d3d608e82b0d0153eb3912cdfcf33b61b4ea",
"is_verified": false,
"line_number": 230,
"is_secret": false
"line_number": 64
},
{
"type": "Base64 High Entropy String",
"filename": "test/hmac4/test_hmac4.py",
"type": "Hex High Entropy String",
"filename": "tests/hmac4/test_hmac4.py",
"hashed_secret": "62c2d5271399e315bf07038e7d538f1f2e947e6b",
"is_verified": false,
"line_number": 188
},
{
"type": "AWS Access Key",
"filename": "tests/hmac4/test_hmac4.py",
"hashed_secret": "56c1d3d608e82b0d0153eb3912cdfcf33b61b4ea",
"is_verified": false,
"line_number": 230,
"is_secret": false
"line_number": 195
}
]
},
"version": "1.5.0",
"filters_used": [
{
"path": "detect_secrets.filters.allowlist.is_line_allowlisted"
},
{
"path": "detect_secrets.filters.heuristic.is_sequential_string"
},
{
"path": "detect_secrets.filters.heuristic.is_potential_uuid"
},
{
"path": "detect_secrets.filters.heuristic.is_likely_id_string"
},
{
"path": "detect_secrets.filters.heuristic.is_templated_secret"
},
{
"path": "detect_secrets.filters.heuristic.is_prefixed_with_dollar_sign"
},
{
"path": "detect_secrets.filters.heuristic.is_indirect_reference"
},
{
"path": "detect_secrets.filters.common.is_ignored_due_to_verification_policies",
"min_level": 2
},
{
"path": "detect_secrets.filters.heuristic.is_lock_file"
},
{
"path": "detect_secrets.filters.heuristic.is_not_alphanumeric_string"
},
{
"path": "detect_secrets.filters.heuristic.is_swagger_file"
}
]
"generated_at": "2026-01-09T19:27:53Z"
}
Loading