Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Verifiable secrets scaffolding #194

Merged
merged 6 commits into from
Jun 21, 2019
Merged

Verifiable secrets scaffolding #194

merged 6 commits into from
Jun 21, 2019

Conversation

domanchi
Copy link
Contributor

Summary

After talking with @killuazhu (and referencing the whitepaper from #159), this seems like a completely feasible option.

This is my first take of supporting this.

I've written a Slack verifier (as an example usage for bearer secrets), and an AWS verifier (as an example usage for multi-factor secrets). Test cases were run with no network connectivity, just to make sure that test cases don't rely on network calls.

The verify functions are manually tested, because (obviously) we don't want to commit real secrets to have automated tests for it.

Example Usage

$ cat slack_token.txt | detect-secrets scan --string

or

$ detect-secrets scan test_data/each_secret.py --no-verify

@domanchi domanchi force-pushed the verifiable-secrets branch 2 times, most recently from 2353fca to 1df6750 Compare June 15, 2019 19:06
It looks like Amazon needs an EXTRA trailing newline after declaring all the
headers that you want to sign.
Copy link
Collaborator

@KevinHock KevinHock left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm 🚢 ✅

@domanchi domanchi merged commit 13575ed into master Jun 21, 2019
@KevinHock KevinHock deleted the verifiable-secrets branch September 21, 2019 00:38
killuazhu pushed a commit to killuazhu/detect-secrets that referenced this pull request Oct 18, 2019
* DB2 Detector

Start by looking for database passwords.

Supports git-defenders/detect-secrets-discuss#190

* Addresses @xianjun comments
killuazhu pushed a commit to IBM/detect-secrets that referenced this pull request May 28, 2020
* DB2 Detector

Start by looking for database passwords.

Supports git-defenders/detect-secrets-discuss#190

* Addresses @xianjun comments
killuazhu pushed a commit to IBM/detect-secrets that referenced this pull request Jul 9, 2020
* DB2 Detector

Start by looking for database passwords.

Supports git-defenders/detect-secrets-discuss#190

* Addresses @xianjun comments
killuazhu pushed a commit to IBM/detect-secrets that referenced this pull request Sep 17, 2020
Supports git-defenders/detect-secrets-discuss#190

DB2 Verification (Yelp#196)

Supports git-defenders/detect-secrets-discuss#190

Use DB2 detector (Yelp#199)

Supports git-defenders/detect-secrets-discuss#190

Refactor DB2 verification for calling externally (Yelp#203)

Supports fixing bug [here](https://github.ibm.com/git-defenders/detect-secrets-stream/blob/master/detect_secrets_stream/validation/db2.py#L25)

Catch DB2 hostname, port, database from connection url (Yelp#209)

Supports git-defenders/detect-secrets-discuss#212

Timeout DB2 detector if it takes too long (Yelp#214)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants