mirror of https://github.com/hashicorp/consul
security: disable Vault secret scans due to false positives
This was recently shown to have issues with false positives that blocked a preview release build, so disabling for now.pull/20264/head
parent
9897be76ad
commit
20ee337302
|
@ -17,7 +17,19 @@ container {
|
|||
alpine_secdb = true
|
||||
|
||||
secrets {
|
||||
all = true
|
||||
matchers = {
|
||||
// Use default list, minus Vault (`hashicorp`), which has experienced false positives.
|
||||
// See https://github.com/hashicorp/security-scanner/blob/v0.0.2/pkg/scanner/secrets.go#L130C2-L130C2
|
||||
known = [
|
||||
// "hashicorp",
|
||||
"aws",
|
||||
"google",
|
||||
"slack",
|
||||
"github",
|
||||
"azure",
|
||||
"npm",
|
||||
]
|
||||
}
|
||||
}
|
||||
|
||||
# Triage items that are _safe_ to ignore here. Note that this list should be
|
||||
|
@ -41,6 +53,16 @@ binary {
|
|||
# (yarn.lock) in the Consul binary. This is something we may investigate in the future.
|
||||
|
||||
secrets {
|
||||
all = true
|
||||
// Use most of default list, minus Vault (`hashicorp`), which has experienced false positives.
|
||||
// See https://github.com/hashicorp/security-scanner/blob/v0.0.2/pkg/scanner/secrets.go#L130C2-L130C2
|
||||
known = [
|
||||
// "hashicorp",
|
||||
"aws",
|
||||
"google",
|
||||
"slack",
|
||||
"github",
|
||||
"azure",
|
||||
"npm",
|
||||
]
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue