Skip to content

Commit be104b7

Browse files
Bump detect-secrets from 0.14.3 to 1.2.0 (#95)
* Bump detect-secrets from 0.14.3 to 1.2.0 Bumps [detect-secrets](https://github.com/Yelp/detect-secrets) from 0.14.3 to 1.2.0. - [Release notes](https://github.com/Yelp/detect-secrets/releases) - [Changelog](https://github.com/Yelp/detect-secrets/blob/master/CHANGELOG.md) - [Commits](Yelp/detect-secrets@v0.14.3...v1.2.0) --- updated-dependencies: - dependency-name: detect-secrets dependency-type: direct:development update-type: version-update:semver-major ... Signed-off-by: dependabot[bot] <[email protected]> * Rename variable to avoid secret keyword * Update secrets baseline for newer version Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Mathieu Leplatre <[email protected]>
1 parent 9978e0c commit be104b7

File tree

4 files changed

+83
-28
lines changed

4 files changed

+83
-28
lines changed

.secrets.baseline

Lines changed: 75 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,15 @@
11
{
2-
"custom_plugin_paths": [],
3-
"exclude": {
4-
"files": "poetry.lock",
5-
"lines": null
6-
},
7-
"generated_at": "2022-07-10T01:39:12Z",
2+
"version": "1.2.0",
83
"plugins_used": [
94
{
10-
"name": "AWSKeyDetector"
5+
"name": "ArtifactoryDetector"
116
},
127
{
13-
"name": "ArtifactoryDetector"
8+
"name": "AWSKeyDetector"
149
},
1510
{
16-
"base64_limit": 4.5,
17-
"name": "Base64HighEntropyString"
11+
"name": "Base64HighEntropyString",
12+
"limit": 4.5
1813
},
1914
{
2015
"name": "BasicAuthDetector"
@@ -23,8 +18,8 @@
2318
"name": "CloudantDetector"
2419
},
2520
{
26-
"hex_limit": 3,
27-
"name": "HexHighEntropyString"
21+
"name": "HexHighEntropyString",
22+
"limit": 3
2823
},
2924
{
3025
"name": "IbmCloudIamDetector"
@@ -36,8 +31,8 @@
3631
"name": "JwtTokenDetector"
3732
},
3833
{
39-
"keyword_exclude": null,
40-
"name": "KeywordDetector"
34+
"name": "KeywordDetector",
35+
"keyword_exclude": ""
4136
},
4237
{
4338
"name": "MailchimpDetector"
@@ -58,19 +53,78 @@
5853
"name": "TwilioKeyDetector"
5954
}
6055
],
56+
"filters_used": [
57+
{
58+
"path": "detect_secrets.filters.allowlist.is_line_allowlisted"
59+
},
60+
{
61+
"path": "detect_secrets.filters.common.is_baseline_file",
62+
"filename": ".secrets.baseline"
63+
},
64+
{
65+
"path": "detect_secrets.filters.common.is_ignored_due_to_verification_policies",
66+
"min_level": 2
67+
},
68+
{
69+
"path": "detect_secrets.filters.heuristic.is_indirect_reference"
70+
},
71+
{
72+
"path": "detect_secrets.filters.heuristic.is_likely_id_string"
73+
},
74+
{
75+
"path": "detect_secrets.filters.heuristic.is_lock_file"
76+
},
77+
{
78+
"path": "detect_secrets.filters.heuristic.is_not_alphanumeric_string"
79+
},
80+
{
81+
"path": "detect_secrets.filters.heuristic.is_potential_uuid"
82+
},
83+
{
84+
"path": "detect_secrets.filters.heuristic.is_prefixed_with_dollar_sign"
85+
},
86+
{
87+
"path": "detect_secrets.filters.heuristic.is_sequential_string"
88+
},
89+
{
90+
"path": "detect_secrets.filters.heuristic.is_swagger_file"
91+
},
92+
{
93+
"path": "detect_secrets.filters.heuristic.is_templated_secret"
94+
},
95+
{
96+
"path": "detect_secrets.filters.regex.should_exclude_file",
97+
"pattern": [
98+
"poetry.lock"
99+
]
100+
}
101+
],
61102
"results": {
62103
"README.md": [
63104
{
105+
"type": "Hex High Entropy String",
106+
"filename": "README.md",
64107
"hashed_secret": "04e78d6e804f2b59e6cb282cb9ed2c7bfd8a9737",
65108
"is_verified": false,
66-
"line_number": 152,
67-
"type": "Hex High Entropy String"
109+
"line_number": 152
110+
}
111+
],
112+
"infra/config/local_dev.env": [
113+
{
114+
"type": "Secret Keyword",
115+
"filename": "infra/config/local_dev.env",
116+
"hashed_secret": "4b9a4ce92b6a01a4cd6ee1672d31c043f2ae79ab",
117+
"is_verified": false,
118+
"line_number": 5
119+
},
120+
{
121+
"type": "Secret Keyword",
122+
"filename": "infra/config/local_dev.env",
123+
"hashed_secret": "77ea6398f252999314d609a708842a49fc43e055",
124+
"is_verified": false,
125+
"line_number": 8
68126
}
69127
]
70128
},
71-
"version": "0.14.3",
72-
"word_list": {
73-
"file": null,
74-
"hash": null
75-
}
129+
"generated_at": "2022-07-13T07:01:04Z"
76130
}

infra/lint.sh

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ black () {
1212
}
1313
detect_secrets () {
1414
# Scan only files fixed into the repo, omit poetry.lock
15-
SECRETS_TO_SCAN=`git ls-tree --full-tree -r --name-only HEAD | grep -v poetry.lock`
16-
$POETRY_RUN detect-secrets-hook $SECRETS_TO_SCAN --baseline .secrets.baseline
15+
FILES_TO_SCAN=`git ls-tree --full-tree -r --name-only HEAD | grep -v poetry.lock`
16+
$POETRY_RUN detect-secrets-hook $FILES_TO_SCAN --baseline .secrets.baseline
1717
}
1818
isort () {
1919
$POETRY_RUN isort ${check:+--check-only} .

poetry.lock

Lines changed: 5 additions & 4 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ black = "^22.1.0"
2727
isort = "^5.10.1"
2828
coverage = {extras = ["toml"], version = "^5.3"}
2929
mypy = "^0.910"
30-
detect-secrets = "^0.14.3"
30+
detect-secrets = "^1.2.0"
3131
bandit = "^1.7.0"
3232
pylint = "^2.7.2"
3333
pylint-pytest = "^1.1.2"

0 commit comments

Comments
 (0)