Skip to content

Commit

Permalink
fix: add secret baseline (Yelp#173)
Browse files Browse the repository at this point in the history
  • Loading branch information
XIANJUN ZHU authored and justineyster committed Jan 8, 2020
1 parent 8f5a46c commit a846e42
Show file tree
Hide file tree
Showing 2 changed files with 28 additions and 10 deletions.
17 changes: 17 additions & 0 deletions .pre-commit-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -29,3 +29,20 @@ repos:
rev: v1.4.4
hooks:
- id: autopep8
# This is an example configuration to enable whitewater-detect-secrets in the pre-commit hook.
# Add this file to the root folder of your repository.
#
# Read pre-commit hook framework https://pre-commit.com/ for more details about the structure of config yaml file and how git pre-commit would invoke each hook.
#
# This line indicates we will use the hook from Whitewater/whitewater-detect-secrets to run scan during commiting phase.
- repo: git@github.ibm.com:Whitewater/whitewater-detect-secrets
# If you desire to use a specific version of whitewater-detect-secrets, you can replace `master` with other git revisions such as branch, tag or commit sha.
rev: master
hooks:
- id: detect-secrets # pragma: whitelist secret
# Add options for detect-secrets-hook binary. You can run `detect-secrets-hook --help` to list out all possible options.
# You may also run `pre-commit run detect-secrets` to preview the scan result.
#
# The `--no-keyword-scan` field can be removed if you are using 0.10.3-ibm.1. It was added prior to 0.10.3-ibm.1 to reduce false positives generated from old keyword scanner.
# After 0.10.3-ibm.1, keyword scanner is disabled by default.
args: [--baseline, .secrets.baseline, --no-keyword-scan ]
21 changes: 11 additions & 10 deletions .secrets.baseline
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"files": "test_data/.*|tests/.*|^.secrets.baseline$",
"lines": null
},
"generated_at": "2019-03-07T19:52:48Z",
"generated_at": "2019-08-09T20:14:01Z",
"plugins_used": [
{
"name": "AWSKeyDetector"
Expand Down Expand Up @@ -31,68 +31,69 @@
{
"hashed_secret": "5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8",
"is_secret": false,
"is_verified": false,
"line_number": 103,
"type": "Basic Auth Credentials"
}
],
"detect_secrets/plugins/high_entropy_strings.py": [
{
"hashed_secret": "88a7b59d2e9172960b72b65f7839b9da2453f3e9",
"is_secret": false,
"line_number": 294,
"type": "Hex High Entropy String"
}
],
"detect_secrets/plugins/private_key.py": [
{
"hashed_secret": "daefe0b4345a654580dcad25c7c11ff4c944a8c0",
"is_secret": false,
"is_verified": false,
"line_number": 44,
"type": "Private Key"
},
{
"hashed_secret": "f0778f3e140a61d5bbbed5430773e52af2f5fba4",
"is_secret": false,
"is_verified": false,
"line_number": 45,
"type": "Private Key"
},
{
"hashed_secret": "27c6929aef41ae2bcadac15ca6abcaff72cda9cd",
"is_secret": false,
"is_verified": false,
"line_number": 46,
"type": "Private Key"
},
{
"hashed_secret": "4ada9713ec27066b2ffe0b7bd9c9c8d635dc4ab2",
"is_secret": false,
"is_verified": false,
"line_number": 47,
"type": "Private Key"
},
{
"hashed_secret": "1348b145fa1a555461c1b790a2f66614781091e9",
"is_secret": false,
"is_verified": false,
"line_number": 48,
"type": "Private Key"
},
{
"hashed_secret": "be4fc4886bd949b369d5e092eb87494f12e57e5b",
"is_secret": false,
"is_verified": false,
"line_number": 49,
"type": "Private Key"
},
{
"hashed_secret": "9279619d0c9a9529b0b223e3b809f4df24b8ba8b",
"is_secret": false,
"is_verified": false,
"line_number": 50,
"type": "Private Key"
},
{
"hashed_secret": "11200d1bf5e1eb358b5d823c443347d97e982a85",
"is_secret": false,
"is_verified": false,
"line_number": 51,
"type": "Private Key"
}
]
},
"version": "0.12.0-ibm.3"
"version": "0.12.5-ibm.5"
}

0 comments on commit a846e42

Please sign in to comment.