-
Notifications
You must be signed in to change notification settings - Fork 4
PR to clean-up modified files #678
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
- Add terraform patterns (.terraform/, *.tfstate, *.tfstate.backup, tfplan, *.tfplan) - Add helm charts directory (deployment/helm/*/charts/) - Add session file patterns (*_HANDOFF.md, *_IMPLEMENTATION_PLAN.md) This prevents committing generated artifacts and temporary working documents. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
Add comprehensive security scanning workflow for continuous security monitoring. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
Add comprehensive deployment documentation including: - Milvus operator automation guide - Environment variables reference 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
Add comprehensive architecture documentation including: - Agent MCP architecture guide - MCP context-forge integration guide 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
Add comprehensive security documentation including: - Quick start remediation guide - Remediation summary - Security alert analysis - Sequential remediation plan 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
Add comprehensive Ansible playbook for deploying Milvus operator on IBM ROKS (Red Hat OpenShift Kubernetes Service). Includes: - Automated operator installation - Namespace management - Custom resource deployment 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
Add comprehensive Helm chart with templates for: - Etcd StatefulSet - Milvus operator deployment and custom resources - MinIO StatefulSet - MLFlow deployment - PostgreSQL cluster and configuration Includes Chart.lock for dependency management. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
🚀 Development Environment OptionsThis repository supports Dev Containers for a consistent development environment. Option 1: GitHub Codespaces (Recommended)Create a cloud-based development environment:
Option 2: VS Code Dev Containers (Local)Use Dev Containers on your local machine:
Option 3: Traditional Local SetupSet up the development environment manually: # Clone the repository
git clone https://github.com/manavgup/rag_modulo.git
cd rag_modulo
git checkout pr-branch
# Initialize development environment
make dev-init
make dev-build
make dev-up
make dev-validateAvailable CommandsOnce in your development environment: make help # Show all available commands
make dev-validate # Validate environment setup
make test-atomic # Run atomic tests
make test-unit # Run unit tests
make lint # Run lintingServices AvailableWhen running
This automated message helps reviewers quickly set up the development environment. |
| @@ -0,0 +1,3 @@ | |||
| ibm_cloud_api_key = "5IPr_h4xttK2rBfGeoBD5LpFJIAwXno0NpVzPctFCw8q" | |||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit 5ff8408d0cc353b6d227c61322e7f677c1454eea.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo 5ff8408d0cc353b6d227c61322e7f677c1454eea:deployment/terraform/environments/dev/terraform.tfvars:high-entropy-strings:1 >> .gitleaksignore
| provider "registry.terraform.io/hashicorp/null" { | ||
| version = "3.2.4" | ||
| hashes = [ | ||
| "h1:L5V05xwp/Gto1leRryuesxjMfgZwjb7oool4WS1UEFQ=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit 5ff8408d0cc353b6d227c61322e7f677c1454eea.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo 5ff8408d0cc353b6d227c61322e7f677c1454eea:deployment/terraform/environments/dev/.terraform.lock.hcl:high-entropy-strings:7 >> .gitleaksignore
| version = "1.85.0" | ||
| constraints = "~> 1.58" | ||
| hashes = [ | ||
| "h1:kjHYHY8DxoUrfuwkXitnj1PyWfVM7rUm3D5kqglAJZc=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit 5ff8408d0cc353b6d227c61322e7f677c1454eea.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo 5ff8408d0cc353b6d227c61322e7f677c1454eea:deployment/terraform/environments/dev/.terraform.lock.hcl:high-entropy-strings:27 >> .gitleaksignore
| provider "registry.terraform.io/hashicorp/null" { | ||
| version = "3.2.4" | ||
| hashes = [ | ||
| "h1:L5V05xwp/Gto1leRryuesxjMfgZwjb7oool4WS1UEFQ=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit 5ff8408d0cc353b6d227c61322e7f677c1454eea.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo 5ff8408d0cc353b6d227c61322e7f677c1454eea:deployment/terraform/roks-deployment/.terraform.lock.hcl:high-entropy-strings:7 >> .gitleaksignore
| version = "1.85.0" | ||
| constraints = "~> 1.0" | ||
| hashes = [ | ||
| "h1:kjHYHY8DxoUrfuwkXitnj1PyWfVM7rUm3D5kqglAJZc=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit 5ff8408d0cc353b6d227c61322e7f677c1454eea.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo 5ff8408d0cc353b6d227c61322e7f677c1454eea:deployment/terraform/roks-deployment/.terraform.lock.hcl:high-entropy-strings:27 >> .gitleaksignore
| provider "registry.terraform.io/hashicorp/null" { | ||
| version = "3.2.4" | ||
| hashes = [ | ||
| "h1:L5V05xwp/Gto1leRryuesxjMfgZwjb7oool4WS1UEFQ=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit 5ff8408d0cc353b6d227c61322e7f677c1454eea.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo 5ff8408d0cc353b6d227c61322e7f677c1454eea:deployment/terraform/modules/ibm-cloud/roks-cluster/.terraform.lock.hcl:high-entropy-strings:7 >> .gitleaksignore
| version = "1.85.0" | ||
| constraints = "~> 1.0" | ||
| hashes = [ | ||
| "h1:kjHYHY8DxoUrfuwkXitnj1PyWfVM7rUm3D5kqglAJZc=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit 5ff8408d0cc353b6d227c61322e7f677c1454eea.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo 5ff8408d0cc353b6d227c61322e7f677c1454eea:deployment/terraform/modules/ibm-cloud/roks-cluster/.terraform.lock.hcl:high-entropy-strings:27 >> .gitleaksignore
|
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
Pull Request Review - PR #678SummaryThis PR adds significant infrastructure and deployment code (~8,244 additions) including Terraform modules, Helm charts, Ansible playbooks, security workflows, and extensive documentation. While the additions are comprehensive, there are several critical issues that must be addressed before merging. 🚨 Critical Issues1. Duplicate Security Workflow (Naming Conflict)Severity: HIGH - Will cause CI/CD failure
Existing workflow ( name: Security Scan # ← DUPLICATE NAME
on:
pull_request:
branches: [main]
push:
branches: [main]
jobs:
gitleaks: ...
trufflehog: ...New workflow ( name: Security Scan # ← DUPLICATE NAME
on:
push:
branches: [main, develop]
pull_request:
branches: [main, develop]
jobs:
python-security: ...
node-security: ...
docker-security: ...Recommendations:
2. Hardcoded Absolute Path in Ansible PlaybookSeverity: HIGH - Will fail on any other system
args:
chdir: /Users/mg/mg-work/manav/work/ai-experiments/rag_modulo # ← HARDCODED PATHImpact: Playbook will fail immediately when run by anyone else or in CI/CD args:
chdir: "{{ playbook_dir }}/../../.." # Relative to playbook location3. Missing Helm Chart values.yamlSeverity: HIGH - Helm chart is incomplete
Required Files:
4. Terraform Lock Files Should Not Be CommittedSeverity: MEDIUM - Against best practices
Recommendation: # Terraform
.terraform/
*.tfstate
*.tfstate.backup
tfplan
*.tfplan
*.terraform.lock.hcl # ← ADD THISNote: Some teams commit lock files for consistency, but this should be a deliberate decision documented in the project's Terraform practices. 5. Security: Overly Permissive Network RulesSeverity: MEDIUM - Security risk
# Lines 77-85: HTTPS from ANYWHERE
resource "ibm_is_security_group_rule" "cluster_sg_rule_inbound_https" {
direction = "inbound"
remote = "0.0.0.0/0" # ← TOO PERMISSIVE
tcp {
port_min = 443
port_max = 443
}
}
# Lines 87-95: HTTP from ANYWHERE
resource "ibm_is_security_group_rule" "cluster_sg_rule_inbound_http" {
remote = "0.0.0.0/0" # ← TOO PERMISSIVE
tcp {
port_min = 80
port_max = 80
}
}Recommendations:
Example hardening: variable "allowed_cidr_blocks" {
description = "CIDR blocks allowed to access the cluster"
type = list(string)
default = [] # Must be explicitly set
}
resource "ibm_is_security_group_rule" "cluster_sg_rule_inbound_https" {
for_each = toset(var.allowed_cidr_blocks)
direction = "inbound"
remote = each.value
tcp {
port_min = 443
port_max = 443
}
}
|
Add comprehensive Terraform modules and configurations for: - IBM Cloud ROKS cluster provisioning - Environment-specific configurations (dev, IBM) - Infrastructure module for cluster management Includes: - Terraform lock files for dependency management - Example tfvars for configuration templates - Main, variables, and outputs definitions 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
| provider "registry.terraform.io/hashicorp/null" { | ||
| version = "3.2.4" | ||
| hashes = [ | ||
| "h1:L5V05xwp/Gto1leRryuesxjMfgZwjb7oool4WS1UEFQ=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit fd20c62.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo fd20c62e24eea88696541d8e23a79428b2a8bcfa:deployment/terraform/modules/ibm-cloud/roks-cluster/.terraform.lock.hcl:high-entropy-strings:7 >> .gitleaksignore
| version = "1.85.0" | ||
| constraints = "~> 1.0" | ||
| hashes = [ | ||
| "h1:kjHYHY8DxoUrfuwkXitnj1PyWfVM7rUm3D5kqglAJZc=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit fd20c62.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo fd20c62e24eea88696541d8e23a79428b2a8bcfa:deployment/terraform/modules/ibm-cloud/roks-cluster/.terraform.lock.hcl:high-entropy-strings:27 >> .gitleaksignore
| provider "registry.terraform.io/hashicorp/null" { | ||
| version = "3.2.4" | ||
| hashes = [ | ||
| "h1:L5V05xwp/Gto1leRryuesxjMfgZwjb7oool4WS1UEFQ=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit fd20c62.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo fd20c62e24eea88696541d8e23a79428b2a8bcfa:deployment/terraform/roks-deployment/.terraform.lock.hcl:high-entropy-strings:7 >> .gitleaksignore
| version = "1.85.0" | ||
| constraints = "~> 1.0" | ||
| hashes = [ | ||
| "h1:kjHYHY8DxoUrfuwkXitnj1PyWfVM7rUm3D5kqglAJZc=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit fd20c62.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo fd20c62e24eea88696541d8e23a79428b2a8bcfa:deployment/terraform/roks-deployment/.terraform.lock.hcl:high-entropy-strings:27 >> .gitleaksignore
| provider "registry.terraform.io/hashicorp/null" { | ||
| version = "3.2.4" | ||
| hashes = [ | ||
| "h1:L5V05xwp/Gto1leRryuesxjMfgZwjb7oool4WS1UEFQ=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit fd20c62.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo fd20c62e24eea88696541d8e23a79428b2a8bcfa:deployment/terraform/environments/dev/.terraform.lock.hcl:high-entropy-strings:7 >> .gitleaksignore
| version = "1.85.0" | ||
| constraints = "~> 1.58" | ||
| hashes = [ | ||
| "h1:kjHYHY8DxoUrfuwkXitnj1PyWfVM7rUm3D5kqglAJZc=", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🛑 Gitleaks has detected a secret with rule-id high-entropy-strings in commit fd20c62.
If this secret is a true positive, please rotate the secret ASAP.
If this secret is a false positive, you can add the fingerprint below to your .gitleaksignore file and commit the change to this branch.
echo fd20c62e24eea88696541d8e23a79428b2a8bcfa:deployment/terraform/environments/dev/.terraform.lock.hcl:high-entropy-strings:27 >> .gitleaksignore
Pull Request Review: Infrastructure and Deployment EnhancementsSummary: This PR adds substantial infrastructure-as-code, deployment automation, and security scanning capabilities to RAG Modulo. Overall, this is a positive contribution that significantly improves the project's production-readiness. However, there are several critical issues that must be addressed before merging. 🔴 Critical Issues1. Missing Helm Chart Dependencies
dependencies:
- name: milvus
version: 4.2.14
repository: https://zilliztech.github.io/milvus-helm/
condition: milvus.enabled2. Missing values.yaml File
3. Security Workflow Issues
# Line 123 - Fix Docker build context
docker build -t rag-modulo-backend:test -f backend/Dockerfile .
# Line 32 - Remove --no-root flag
poetry install --with dev,test
# Lines 39, 45, 52 - Remove continue-on-error for critical security checks
# Only keep it for informational scans4. Hardcoded Absolute Path in Ansible Playbook
|
…ting 02-security.yml)
Code Review SummaryThank you for this comprehensive infrastructure-as-code PR! This adds significant deployment capabilities with Terraform, Helm, and Ansible. Here's my detailed review: ✅ Strengths1. Excellent Organization & Structure
2. Security Best Practices
3. Production-Ready Infrastructure
4. Good Documentation
🔧 Issues & Recommendations1. Critical: Hardcoded Paths in Ansible
|
Closing PR #678 - Security Issue ResolvedThis PR is being closed because it contained an IBM Cloud API key in its commit history that was detected by Gitleaks security scanning. What Happened
Resolution✅ New Clean PR Created: #679
✅ Security Measures Taken:
Action Required
Next StepsPlease review and merge PR #679 which contains the same changes but with a clean commit history free of exposed secrets. Closed in favor of #679 due to exposed secret in commit history |
… leaks - Add Gitleaks v8.18.1 to pre-commit hooks for local secret detection - Create .gitleaks.toml with custom rules for IBM Cloud API keys - Add Terraform .tfvars and Ansible playbook secret detection - Configure allowlist for false positives (.example files, docs, tests) - Auto-fix ansible-lint warnings in deploy-roks-milvus-operator.yml This prevents secrets from being committed locally, complementing CI/CD security scans (Gitleaks + TruffleHog) that run on PR creation. Fixes security gap where --no-verify could bypass detect-secrets. Related to PR #678 (closed), PR #679 (clean)
8 Atomic Commits Created:
- Added terraform patterns (.terraform/, *.tfstate, etc.)
- Added helm charts directory pattern
- Added session file patterns
- Added comprehensive security scanning workflow
- MILVUS_OPERATOR_AUTOMATION.md
- environment-variables.md
- agent-mcp-architecture.md
- mcp-context-forge-integration.md
- QUICK_START_REMEDIATION.md
- REMEDIATION_SUMMARY.md
- SECURITY_ALERT_ANALYSIS.md
- SEQUENTIAL_REMEDIATION_PLAN.md
- deploy-roks-milvus-operator.yml
- Chart.lock
- 8 template YAML files (etcd, milvus, minio, mlflow, postgresql)
- IBM Cloud ROKS cluster configuration
- Environment-specific configs (dev, IBM)
- Infrastructure modules
Files Excluded (via .gitignore):