Skip to content

Commit

Permalink
Merge pull request #306 from IBM-Cloud/promote-v0.9.0
Browse files Browse the repository at this point in the history
Release v0.9.0 promotion
  • Loading branch information
jorge-ibm authored Feb 28, 2022
2 parents 8556681 + 8e45f8b commit 93db41b
Show file tree
Hide file tree
Showing 12 changed files with 274 additions and 637 deletions.
319 changes: 11 additions & 308 deletions .secrets.baseline
Original file line number Diff line number Diff line change
@@ -1,16 +1,19 @@
{
"exclude": {
"files": "^.secrets.baseline$",
"files": "^.secrets.baseline$|go.sum",
"lines": null
},
"generated_at": "2022-01-05T21:44:36Z",
"generated_at": "2022-02-28T20:29:11Z",
"plugins_used": [
{
"name": "AWSKeyDetector"
},
{
"name": "ArtifactoryDetector"
},
{
"name": "AzureStorageKeyDetector"
},
{
"base64_limit": 4.5,
"name": "Base64HighEntropyString"
Expand Down Expand Up @@ -48,6 +51,9 @@
{
"name": "MailchimpDetector"
},
{
"name": "NpmDetector"
},
{
"name": "PrivateKeyDetector"
},
Expand All @@ -57,6 +63,9 @@
{
"name": "SoftlayerDetector"
},
{
"name": "SquareOAuthDetector"
},
{
"name": "StripeDetector"
},
Expand Down Expand Up @@ -342,312 +351,6 @@
"type": "Hex High Entropy String",
"verified_result": null
}
],
"vendor/vendor.json": [
{
"hashed_secret": "e4d1e6e14581bc94844fc2ede3d886ab480d0947",
"is_secret": false,
"is_verified": false,
"line_number": 6,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "4eab51e39eb4d193df2efcf7c5a4e688cd06dfd1",
"is_secret": false,
"is_verified": false,
"line_number": 8,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "96265bbcffaac8b84b78220e1ba652edb155195e",
"is_secret": false,
"is_verified": false,
"line_number": 14,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "f56b0cc50a9c70714b7a7d52acb6de8672734bca",
"is_secret": false,
"is_verified": false,
"line_number": 20,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "c1975f22cd3b327e25e8aa9e5d531174f5b2b14c",
"is_secret": false,
"is_verified": false,
"line_number": 24,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "f1c8a2871ce5c2e5540860ce9cc3af12b6b64106",
"is_secret": false,
"is_verified": false,
"line_number": 26,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "fb8c723cbe706b661e0eaf9438fb4ab733973bac",
"is_secret": false,
"is_verified": false,
"line_number": 32,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "064a8caf3feb1e88ff12f0ba5bcd375e718e4432",
"is_secret": false,
"is_verified": false,
"line_number": 36,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "b7aba55df9902e932f88dd5e32dd63e2eaf2d050",
"is_secret": false,
"is_verified": false,
"line_number": 38,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "e921e69b2a7484c29f6cfb69cd32284273e3bb4f",
"is_secret": false,
"is_verified": false,
"line_number": 44,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "7fe6b120f9c4ddfe8d750386b15dc055b1fa0b45",
"is_secret": false,
"is_verified": false,
"line_number": 48,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "0a90bbb11c3be56e9c87541fbb8b237f611a2a1c",
"is_secret": false,
"is_verified": false,
"line_number": 60,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "fe270c72661342f474c10905836f61e691e8d244",
"is_secret": false,
"is_verified": false,
"line_number": 66,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "1406564ca35b872bade5af52231ce26cd8f4deca",
"is_secret": false,
"is_verified": false,
"line_number": 68,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "8afec50df78e11b83254bc7cf29847be1136883b",
"is_secret": false,
"is_verified": false,
"line_number": 84,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "bc3ffcb9413d1619886803fc75f66e789e51dabe",
"is_secret": false,
"is_verified": false,
"line_number": 90,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "afed73480cde1be02a91c172f368d2c08cf88326",
"is_secret": false,
"is_verified": false,
"line_number": 120,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "d95d8b9fa6c31ad40c7e5d685e0a7581ae895db3",
"is_secret": false,
"is_verified": false,
"line_number": 132,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "7dfa04e9ceba128245a269547b4e0d8d9aebee4e",
"is_secret": false,
"is_verified": false,
"line_number": 176,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "a03ef80c628671d37a441e4395c8ebc86d1965cf",
"is_secret": false,
"is_verified": false,
"line_number": 180,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "5e0fadce60f1e5f43b10467922180baf2362512d",
"is_secret": false,
"is_verified": false,
"line_number": 186,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "1e1b67eece3c750066cf2bced2bfd914320fc86f",
"is_secret": false,
"is_verified": false,
"line_number": 192,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "4dbda16330d8b8b50074a57e871ca7365f232c3a",
"is_secret": false,
"is_verified": false,
"line_number": 198,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "97a1dd600750285d424b01ddcfcb1aad9c599bb5",
"is_secret": false,
"is_verified": false,
"line_number": 204,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "85a211e0f553acba3e3bfee71ca127ae8d1ff119",
"is_secret": false,
"is_verified": false,
"line_number": 210,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "4cbbbb6d286b9c4f0c46919953d2122d10029ce1",
"is_secret": false,
"is_verified": false,
"line_number": 252,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "68b5906209968d932eaa506f3ef44dc0e6cb482b",
"is_secret": false,
"is_verified": false,
"line_number": 254,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "77223fdb39916695b9b28e812daff9949ebe196d",
"is_secret": false,
"is_verified": false,
"line_number": 260,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "01618bfed925fa802b4037d183b5c656e7e09fe0",
"is_secret": false,
"is_verified": false,
"line_number": 270,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "46b8a0f25eeaf8903767fca6b27eb22127474d97",
"is_secret": false,
"is_verified": false,
"line_number": 276,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "87b87581f0002d709b50a85f7b2c8afaca307fea",
"is_secret": false,
"is_verified": false,
"line_number": 278,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "8a6ce2bb8ca00141098b038b1f73f33ba1dc0090",
"is_secret": false,
"is_verified": false,
"line_number": 282,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "44e330f0334bb3b09902c5fe7172b39fc08cf918",
"is_secret": false,
"is_verified": false,
"line_number": 284,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "bf9959bc830a53df775617dcf56d32374a869cea",
"is_secret": false,
"is_verified": false,
"line_number": 296,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "58c75e1ff3ec1e9e0be2b9d0ba96b87a69fd2a91",
"is_secret": false,
"is_verified": false,
"line_number": 302,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "672aca7abcf09d14c312a489997e3747bf2eb370",
"is_secret": false,
"is_verified": false,
"line_number": 306,
"type": "Base64 High Entropy String",
"verified_result": null
},
{
"hashed_secret": "2a7042386a2978cfa924f0a113a62536dcc56c3a",
"is_secret": false,
"is_verified": false,
"line_number": 308,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "8072f323c55a6892918a692e58cd0ac31bc7063b",
"is_secret": false,
"is_verified": false,
"line_number": 314,
"type": "Hex High Entropy String",
"verified_result": null
}
]
},
"version": "0.13.1+ibm.45.dss",
Expand Down
7 changes: 1 addition & 6 deletions .travis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,10 +10,6 @@ addons:
- python3-pip
- python3-setuptools

env:
global:
- GO111MODULE="off"

before_install:
- sudo apt-get update && sudo apt-get upgrade -y openssl

Expand All @@ -23,11 +19,10 @@ install:
- python3 -m pip install -U pip
- pip3 install --upgrade "git+https://github.com/ibm/detect-secrets.git@master#egg=detect-secrets"
- curl -sfL https://raw.githubusercontent.com/securego/gosec/master/install.sh | sh -s -- -b $GOPATH/bin
- go get -u github.com/kardianos/govendor

before_script:
- bin/detect_secrets.sh
- govendor sync
- go mod vendor

script:
- go test $(go list ./... | grep -v "plugin_examples" | grep -v "vendor")
Expand Down
6 changes: 3 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,12 +4,12 @@ IBM Cloud CLI plugin SDK provides predefined plugin interface, utilities and lib

# Get started

You firstly need [Go](http://www.golang.org) installed on your machine, and set up a [GOPATH](http://golang.org/doc/code.html#GOPATH). Then clone this repository into `$GOPATH/src/github.com/IBM-Cloud/ibm-cloud-cli-sdk`.
You firstly need [Go](http://www.golang.org) installed on your machine. Then clone this repository into `$GOPATH/src/github.com/IBM-Cloud/ibm-cloud-cli-sdk`.

This project uses [govendor](https://github.com/kardianos/govendor) to manage dependencies. Go to the project directory and run the following command to restore the dependencies into vendor folder:
This project uses [go modules](https://go.dev/blog/using-go-modules) to manage dependencies. Go to the project directory and run the following command to restore the dependencies into vendor folder:

```bash
$ govendor sync
$ go mod vendor
```

and then run tests:
Expand Down
Loading

0 comments on commit 93db41b

Please sign in to comment.