Skip to content

Commit

Permalink
DB2 Optional At Install, Opt-in Model, Disabled by Default (Yelp#389)
Browse files Browse the repository at this point in the history
* DB2 Optional At Install

Supports git-defenders/detect-secrets-discuss#537
  • Loading branch information
justineyster authored and GitHub Enterprise committed Feb 17, 2021
1 parent 735a706 commit c463402
Show file tree
Hide file tree
Showing 15 changed files with 146 additions and 236 deletions.
4 changes: 2 additions & 2 deletions .pre-commit-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -34,11 +34,11 @@ repos:
# You are encouraged to use static refs such as tags, instead of branch name
#
# Running "pre-commit autoupdate" would automatically updates rev to latest tag
rev: 0.13.1+ibm.20.dss
rev: 0.13.1+ibm.28.dss
hooks:
- id: detect-secrets # pragma: whitelist secret
# Add options for detect-secrets-hook binary. You can run `detect-secrets-hook --help` to list out all possible options.
# You may also run `pre-commit run detect-secrets` to preview the scan result.
# when "--baseline" without "--use-all-plugins", pre-commit scan with just plugins in baseline file
# when "--baseline" with "--use-all-plugins", pre-commit scan with all available plugins
args: [--baseline, .secrets.baseline, --use-all-plugins, --no-keyword-scan ]
args: [--baseline, .secrets.baseline, --use-all-plugins, --no-keyword-scan, --no-db2-scan ]
161 changes: 2 additions & 159 deletions .secrets.baseline
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"files": "test_data/.*|tests/.*|^.secrets.baseline$",
"lines": null
},
"generated_at": "2020-10-20T17:42:52Z",
"generated_at": "2021-02-16T16:44:06Z",
"plugins_used": [
{
"name": "AWSKeyDetector"
Expand All @@ -24,9 +24,6 @@
{
"name": "CloudantDetector"
},
{
"name": "Db2Detector"
},
{
"name": "GheDetector"
},
Expand Down Expand Up @@ -128,163 +125,9 @@
"type": "Private Key",
"verified_result": null
}
],
"test_data/baseline.file": [
{
"hashed_secret": "fdd121830f7c0a035298a08a79c7a34835184b8a",
"is_secret": false,
"is_verified": false,
"line_number": 9,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "97947ff4c2ba4dfbf8a776e484ddecec8fd7d52f",
"is_secret": false,
"is_verified": false,
"line_number": 16,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "8b1118b376c313ed420e5133ba91307817ed52c2",
"is_secret": false,
"is_verified": false,
"line_number": 21,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "38287042de41206a9c7399f21130d10dc6498ebc",
"is_secret": false,
"is_verified": false,
"line_number": 26,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "d4271145b850e43d3ea194ecab131f4ab9b04a89",
"is_secret": false,
"is_verified": false,
"line_number": 33,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "8c19f2b10224ddba705926543f8827140abb1435",
"is_secret": false,
"is_verified": false,
"line_number": 38,
"type": "Hex High Entropy String",
"verified_result": null
}
],
"test_data/config.yaml": [
{
"hashed_secret": "5cbabd43e49a1fedbbc3b86311aa6c8fe446abf9",
"is_secret": false,
"is_verified": false,
"line_number": 3,
"type": "Hex High Entropy String",
"verified_result": null
}
],
"test_data/files/file_with_secrets.py": [
{
"hashed_secret": "262547656a76a8a5d24ad428e7010e0fbb8d0413",
"is_secret": false,
"is_verified": false,
"line_number": 3,
"type": "Base64 High Entropy String",
"verified_result": null
}
],
"test_data/files/private_key": [
{
"hashed_secret": "27c6929aef41ae2bcadac15ca6abcaff72cda9cd",
"is_secret": false,
"is_verified": false,
"line_number": 1,
"type": "Private Key",
"verified_result": null
}
],
"test_data/files/tmp/file_with_secrets.py": [
{
"hashed_secret": "88aa1a600b44f0b5cacad4d6300f64afe6d6e9df",
"is_secret": false,
"is_verified": false,
"line_number": 3,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "eb33f663e25e69fad07fe0338935b4954b5027d2",
"is_secret": false,
"is_verified": false,
"line_number": 3,
"type": "Hex High Entropy String",
"verified_result": null
}
],
"test_data/sample.diff": [
{
"hashed_secret": "e2a1cb4d8da934cee6027f5fe14993b9c81158a4",
"is_secret": false,
"is_verified": false,
"line_number": 10,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "a539bed96675daafa460631f5a076d9afd70ea9c",
"is_secret": false,
"is_verified": false,
"line_number": 34,
"type": "Hex High Entropy String",
"verified_result": null
},
{
"hashed_secret": "b5ce0843584425c0b608d91cb07a50d634282d5d",
"is_secret": false,
"is_verified": false,
"line_number": 72,
"type": "Hex High Entropy String",
"verified_result": null
}
],
"test_data/short_files/last_line.ini": [
{
"hashed_secret": "0de9a11b3f37872868ca49ecd726c955e25b6e21",
"is_secret": false,
"is_verified": false,
"line_number": 5,
"type": "Hex High Entropy String",
"verified_result": null
}
],
"test_data/short_files/middle_line.yml": [
{
"hashed_secret": "66e02bb499b2a3f5f2894ce1b7959962c1a5a245",
"is_secret": false,
"is_verified": false,
"line_number": 4,
"type": "Base64 High Entropy String",
"verified_result": null
}
],
"tests/core/audit_test.py": [
{
"hashed_secret": "1348b145fa1a555461c1b790a2f66614781091e9",
"is_secret": false,
"is_verified": false,
"line_number": 846,
"type": "Private Key",
"verified_result": null
}
]
},
"version": "0.13.1+ibm.20.dss",
"version": "0.13.1+ibm.28.dss",
"word_list": {
"file": null,
"hash": null
Expand Down
2 changes: 1 addition & 1 deletion detect_secrets/__init__.py
Original file line number Diff line number Diff line change
@@ -1 +1 @@
VERSION = '0.13.1+ibm.28.dss'
VERSION = '0.13.1+ibm.29.dss'
Loading

0 comments on commit c463402

Please sign in to comment.