1. 06 6月, 2017 1 次提交
  2. 20 3月, 2017 1 次提交
    • Evan Felix's avatar
      Add a no commit to specific branch hook. (#185) · a8592669
      Evan Felix 创作于
      * add no commit code and config
      
      * add the code
      
      * remove version tweak
      
      * fix logic, remove newline
      
      * add Tests and cleanup testing issues
      
      * remove extraneous modules
      
      * cleanup some pep8 and flake issues
      
      * reorder imports
      
      * more fixes for syntax checking
      
      * code cleanup based off asottile comments
      
      * Use Contractions Properly, alphabatize new hook.
      
      * Adding support for branches with a slash in them.
      a8592669
  3. 25 2月, 2017 1 次提交
  4. 01 2月, 2017 1 次提交
  5. 30 12月, 2016 2 次提交
    • Daniel Roschka's avatar
      Fix a typo in the README · 53697318
      Daniel Roschka 创作于
      53697318
    • Daniel Roschka's avatar
      Improve searching for configured AWS credentials · b0d4cdb1
      Daniel Roschka 创作于
      The previous approach for finding AWS credentials was pretty naive and
      only covered contents of a single file (~/.aws/credentials by
      default).
      
      The AWS CLI documentation states various other ways to configure
      credentials which weren't covered:
      https://docs.aws.amazon.com/cli/latest/topic/config-vars.html#credentials
      Even that aren't all ways, a look into the code shows:
      https://github.com/boto/botocore/blob/develop/botocore/credentials.py
      
      This commit changes the behavior so the hook will behave in a way
      that if the AWS CLI is able to obtain credentials from local files,
      the hook will find them as well.
      
      The changes in detail are:
      - detect AWS session tokens and handle them like secret keys.
      - always search credentials in the default AWS CLI file locations
        ( ~/.aws/config, ~/.aws/credentials, /etc/boto.cfg and ~/.boto)
      - detect AWS credentials configured via environment variables in
        AWS_SECRET_ACCESS_KEY, AWS_SECURITY_TOKEN and AWS_SESSION_TOKEN
      - check additional configuration files configured via environment
        variables (AWS_CREDENTIAL_FILE, AWS_SHARED_CREDENTIALS_FILE and
        BOTO_CONFIG)
      - print out the first four characters of each secret found in files to
        be checked in, to make it easier to figure out, what the secrets
        were, which were going to be checked in
      - improve error handling for parsing ini-files
      - improve tests
      
      There is a major functional change introduced by this commit:
      Locations the AWS CLI gets credentials from are always searched and
      there is no way to disable them. --credentials-file is still there to
      specify one or more additional files to search credentials in. It's
      the purpose of this hook to find and check files for found
      credentials, so it should work in any case. As this commit also
      improves error handling for not-existing or malformed configuration
      files, it should be no big deal.
      
      Receiving credentials via the EC2 and ECS meta data services is not
      covered intentionally, to not further increase the amount of changes
      in this commit and as it's probably an edge case anyway to have this
      hook running in such an environment.
      b0d4cdb1
  6. 07 12月, 2016 1 次提交
  7. 30 11月, 2016 1 次提交
  8. 22 8月, 2016 1 次提交
  9. 27 4月, 2016 1 次提交
  10. 18 3月, 2016 1 次提交
  11. 12 3月, 2016 1 次提交
  12. 15 1月, 2016 1 次提交
  13. 01 12月, 2015 1 次提交
  14. 13 11月, 2015 1 次提交
  15. 18 10月, 2015 1 次提交
  16. 04 8月, 2015 1 次提交
  17. 13 6月, 2015 1 次提交
  18. 11 6月, 2015 1 次提交
    • Léo Cavaillé's avatar
      Add new hook pretty-format-json · 55bf22dc
      Léo Cavaillé 创作于
      This new hook allows to standardize one's JSON files (sorted key/4
      spaces indent).
      By default it just fails if any file is not complying with the standard,
      but you can also pass the arg `--autofix` and the hook will
      pretty-format the file itself.
      
      Good in use combined with the `check-json` hook.
      55bf22dc
  19. 01 6月, 2015 1 次提交
  20. 11 5月, 2015 1 次提交
    • Alexander Dupuy's avatar
      Implement Markdown trailing space line break preservation · a6023ac0
      Alexander Dupuy 创作于
      Markdown uses two or more trailing spaces on a line to indicate a forced
      line break `<br/>` - these will be preserved for files with a markdown
      extension (default = `.md` or `.markdown`).
      
      Add `--markdown-linebreak-ext=X,Y` to add extensions (`*` matches any),
      and `--no-markdown-linebreak-ext` to disable this feature.
      
      If you want to set specific extension `foo` only (and not md/markdown),
      use `--no-markdown-linebreak-ext --markdown-linebreak-ext=foo`
      
      Tries to prevent --markdown-linebreak-ext from eating filenames as if they were
      extensions by rejecting any with '.' or '/' (or even Windows-style '\' or ':')
      
      Update README.md to include information on these arguments as well as
      arguments added to other hooks
      
      Add extensive tests using pytest.mark.parametrize
      
      test that `txt` file is not considered as 'txt' extension
      test that `.txt` file is not considered as 'txt' extension
      
      The latter is the (correct) behavior of os.path.splitext(), and an example
      of why it is better to use the libraries than to mangle strings yourself.
      a6023ac0
  21. 13 3月, 2015 1 次提交
  22. 07 3月, 2015 1 次提交
  23. 27 2月, 2015 1 次提交
  24. 22 2月, 2015 1 次提交
  25. 09 2月, 2015 1 次提交
  26. 20 1月, 2015 1 次提交
  27. 17 1月, 2015 1 次提交
  28. 13 1月, 2015 1 次提交
  29. 12 1月, 2015 1 次提交
  30. 04 1月, 2015 1 次提交
  31. 31 12月, 2014 1 次提交
  32. 16 12月, 2014 1 次提交
  33. 22 8月, 2014 1 次提交
  34. 20 8月, 2014 1 次提交
  35. 18 6月, 2014 1 次提交
  36. 05 6月, 2014 1 次提交
  37. 23 3月, 2014 1 次提交
  38. 13 3月, 2014 2 次提交