Replies: 2 comments
-
Hi @roshvin, and thanks for the question. I'm not aware of any example at present for using Nosey Parker in a pre-receive hook for GitHub Enterprise Server. (Presumably the use case there is to be able to scan for secrets at push time, and block pushing of commits that contain secrets.) To make that work, you'd need to script some pieces: in a pre-receive hook, run One thing you would want to do if you set up a mechanism like this is specify a custom ruleset to only enable rules that have essentially no false positives, as you don't want to spuriously be blocking developer's commits. This mechanism is not well documented, but it involves writing a YAML file with the list of rule IDs that you want to enable, and then invoking See here for an example ruleset: https://github.com/praetorian-inc/noseyparker/blob/0cce95910be38058cc0cf00b548a892e3ed5dc35/crates/noseyparker/data/default/builtin/rulesets/default.yml Let me know if you have questions about this and I will write up more documentation. |
Beta Was this translation helpful? Give feedback.
-
Hi @bradlarsen thanks a lot for the quick help/support. |
Beta Was this translation helpful? Give feedback.
-
Describe the bug
Pre-receive hook support in Github enterprise
Hi,
is there any option or example where we can use this as a pre-receive hook at Github Enterprise server.
Thanks
Beta Was this translation helpful? Give feedback.
All reactions