Skip to content

Commit 7043de9

Browse files
authored
Merge pull request #8 from DecisionsDev/vnext-release
Vnext release
2 parents dc06c36 + affe85f commit 7043de9

File tree

6 files changed

+176
-2
lines changed

6 files changed

+176
-2
lines changed

.github/workflows/check-links.yml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: Check Markdown links
2+
3+
#on:
4+
# push:
5+
# branches:
6+
# - master
7+
# pull_request:
8+
# branches: [master]
9+
on: push
10+
jobs:
11+
markdown-link-check:
12+
runs-on: ubuntu-latest
13+
steps:
14+
- uses: actions/checkout@v4
15+
- uses: technote-space/get-diff-action@v6
16+
with:
17+
PATTERNS: |
18+
**/**.md
19+
20+
- uses: gaurav-nelson/github-action-markdown-link-check@v1
21+
with:
22+
use-quiet-mode: 'yes'
23+
use-verbose-mode: 'yes'
24+
config-file: '.md_check_config.json'
25+

.github/workflows/detect-secrets.yml

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
name: detect secrets
2+
3+
on: push
4+
5+
# A workflow run is made up of one or more jobs that can run sequentially or in parallel
6+
jobs:
7+
# This workflow contains a single job called "detect-secrets"
8+
detect-secrets:
9+
runs-on: ubuntu-latest
10+
11+
# Steps represent a sequence of tasks that will be executed as part of the job
12+
steps:
13+
14+
# Checks-out your repository under ${{github.workspace}}, so your job can access it
15+
- uses: actions/checkout@v4
16+
17+
- name: scan all the files (not just the ones committed), generate a report, and check that there are no actual or potential secret
18+
run: |
19+
docker run --pull=always -a stdout \
20+
-v ${{github.workspace}}:/code \
21+
--entrypoint /bin/sh \
22+
icr.io/git-defenders/detect-secrets:0.13.1.ibm.61.dss-redhat-ubi \
23+
-c "detect-secrets --version;
24+
detect-secrets scan --all-files --exclude-files "^.git/.*" --update .secrets.baseline;
25+
detect-secrets audit --report --fail-on-unaudited --fail-on-live --fail-on-audited-real .secrets.baseline"
26+
27+
- name: Report Status
28+
if: always()
29+
uses: ravsamhq/notify-slack-action@master
30+
with:
31+
status: ${{ job.status }}
32+
notify_when: 'failure'
33+
env:
34+
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}

.md_check_config.json

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
{
2+
"ignorePatterns": [
3+
{
4+
"pattern": "^http://localhost"
5+
}
6+
],
7+
"replacementPatterns": [
8+
{
9+
"pattern": "^/LICENSE",
10+
"replacement": "{{BASEURL}}/LICENSE"
11+
}
12+
],
13+
"timeout": "20s"
14+
}

.pre-commit-config.yaml

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
repos:
2+
- repo: https://github.com/ibm/detect-secrets
3+
# If you desire to use a specific version of detect-secrets, you can replace with other git revisions such as branch, tag or commit sha.
4+
# You are encouraged to use static refs such as tags, instead of branch name
5+
#
6+
# Running "pre-commit autoupdate" automatically updates rev to latest tag
7+
rev: master
8+
hooks:
9+
- id: detect-secrets # pragma: whitelist secret
10+
# Add options for detect-secrets-hook binary. You can run `detect-secrets-hook --help` to list out all possible options.
11+
# You may also run `pre-commit run detect-secrets` to preview the scan result.
12+
# when "--baseline" without "--use-all-plugins", pre-commit scan with just plugins in baseline file
13+
# when "--baseline" with "--use-all-plugins", pre-commit scan with all available plugins
14+
# add "--fail-on-unaudited" to fail pre-commit for unaudited potential secrets
15+
args: [--baseline, .secrets.baseline]
16+

.secrets.baseline

Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
{
2+
"exclude": {
3+
"files": "^.secrets.baseline$",
4+
"lines": null
5+
},
6+
"generated_at": "2024-07-18T07:10:46Z",
7+
"plugins_used": [
8+
{
9+
"name": "AWSKeyDetector"
10+
},
11+
{
12+
"name": "ArtifactoryDetector"
13+
},
14+
{
15+
"name": "AzureStorageKeyDetector"
16+
},
17+
{
18+
"base64_limit": 4.5,
19+
"name": "Base64HighEntropyString"
20+
},
21+
{
22+
"name": "BasicAuthDetector"
23+
},
24+
{
25+
"name": "BoxDetector"
26+
},
27+
{
28+
"name": "CloudantDetector"
29+
},
30+
{
31+
"ghe_instance": "github.ibm.com",
32+
"name": "GheDetector"
33+
},
34+
{
35+
"name": "GitHubTokenDetector"
36+
},
37+
{
38+
"hex_limit": 3,
39+
"name": "HexHighEntropyString"
40+
},
41+
{
42+
"name": "IbmCloudIamDetector"
43+
},
44+
{
45+
"name": "IbmCosHmacDetector"
46+
},
47+
{
48+
"name": "JwtTokenDetector"
49+
},
50+
{
51+
"keyword_exclude": null,
52+
"name": "KeywordDetector"
53+
},
54+
{
55+
"name": "MailchimpDetector"
56+
},
57+
{
58+
"name": "NpmDetector"
59+
},
60+
{
61+
"name": "PrivateKeyDetector"
62+
},
63+
{
64+
"name": "SlackDetector"
65+
},
66+
{
67+
"name": "SoftlayerDetector"
68+
},
69+
{
70+
"name": "SquareOAuthDetector"
71+
},
72+
{
73+
"name": "StripeDetector"
74+
},
75+
{
76+
"name": "TwilioKeyDetector"
77+
}
78+
],
79+
"results": {},
80+
"version": "0.13.1+ibm.62.dss",
81+
"word_list": {
82+
"file": null,
83+
"hash": null
84+
}
85+
}

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,13 +77,13 @@ You must accept the license before you launch the image. The license is availabl
7777
To install the product with the sample projects, you need to specify the option -e SAMPLE=true. To be able to run simulations, you need to increase the size of the memory. Use the following docker command to run the image:
7878

7979
```console
80-
docker run -e LICENSE=accept -p 9060:9060 -p 9443:9443 -m 2048M --memory-reservation 2048M -e SAMPLE=true icr.io/cpopen/odm-k8s/odm:9.0
80+
docker run -e LICENSE=accept -p 9060:9060 -p 9443:9443 -e SAMPLE=true icr.io/cpopen/odm-k8s/odm:9.0
8181
```
8282

8383
Some decision artifacts, like simulation definitions, version history, or snapshots, cannot be exported from the Decision Center or the Decision Server instances of the Docker image. To avoid losing this data when you delete the Docker image container, store the Decision Center and the Decision Server databases outside of the ODM for Developers Docker image container, in a local mounted host volume. To do so, run the following docker command from an empty local folder:
8484

8585
```console
86-
docker run -e LICENSE=accept -m 2048M --memory-reservation 2048M -p 9060:9060 -p 9443:9443 -v $PWD:/config/dbdata/ -e SAMPLE=false icr.io/cpopen/odm-k8s/odm:9.0
86+
docker run -e LICENSE=accept -p 9060:9060 -p 9443:9443 -v $PWD:/config/dbdata/ -e SAMPLE=false icr.io/cpopen/odm-k8s/odm:9.0
8787
```
8888

8989
When you first run this command, it creates the .db files in your local folder. The following times, it reads and updates these files.

0 commit comments

Comments
 (0)