Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ruff: Solve F821 #9751

Merged
merged 1 commit into from
Aug 13, 2024

Ruff: Solve F821

dfca758
Select commit
Loading
Failed to load commit list.
Merged

Ruff: Solve F821 #9751

Ruff: Solve F821
dfca758
Select commit
Loading
Failed to load commit list.
DryRunSecurity / Sensitive Files Analyzer succeeded Aug 8, 2024 in 1s

DryRun Security

Details

Sensitive Files Analyzer Findings: 1 detected

⚠️ Potential Sensitive File dojo/settings/settings.py (click for details)
Type Potential Sensitive File
Description Changes to this file could impact anything from how your Django application hashes passwords to logging configurations, secret keys and session generation and even how well your site prevents Cross-Site Request Forgery attacks. It contains many other important options that will heavily impact the security of your site depending on how they are configured.
Filename dojo/settings/settings.py
CodeLink
optional("local_settings.py"),
)
if not (DEBUG or ("collectstatic" in sys.argv)): # noqa: F821 - not declared DEBUG is acceptable because we are sure it will be loaded from 'include'
with (Path(__file__).parent / "settings.dist.py").open("rb") as file:
real_hash = hashlib.sha256(file.read()).hexdigest()
with (Path(__file__).parent / ".settings.dist.py.sha256sum").open("rb") as file: