mirror of https://github.com/hashicorp/consul
security: disable Vault secret scans due to false positives
This was recently shown to have issues with false positives that blocked a preview release build, so disabling for now.pull/20264/head
parent
9897be76ad
commit
20ee337302
|
@ -17,7 +17,19 @@ container {
|
||||||
alpine_secdb = true
|
alpine_secdb = true
|
||||||
|
|
||||||
secrets {
|
secrets {
|
||||||
all = true
|
matchers = {
|
||||||
|
// Use default list, minus Vault (`hashicorp`), which has experienced false positives.
|
||||||
|
// See https://github.com/hashicorp/security-scanner/blob/v0.0.2/pkg/scanner/secrets.go#L130C2-L130C2
|
||||||
|
known = [
|
||||||
|
// "hashicorp",
|
||||||
|
"aws",
|
||||||
|
"google",
|
||||||
|
"slack",
|
||||||
|
"github",
|
||||||
|
"azure",
|
||||||
|
"npm",
|
||||||
|
]
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# Triage items that are _safe_ to ignore here. Note that this list should be
|
# Triage items that are _safe_ to ignore here. Note that this list should be
|
||||||
|
@ -41,6 +53,16 @@ binary {
|
||||||
# (yarn.lock) in the Consul binary. This is something we may investigate in the future.
|
# (yarn.lock) in the Consul binary. This is something we may investigate in the future.
|
||||||
|
|
||||||
secrets {
|
secrets {
|
||||||
all = true
|
// Use most of default list, minus Vault (`hashicorp`), which has experienced false positives.
|
||||||
|
// See https://github.com/hashicorp/security-scanner/blob/v0.0.2/pkg/scanner/secrets.go#L130C2-L130C2
|
||||||
|
known = [
|
||||||
|
// "hashicorp",
|
||||||
|
"aws",
|
||||||
|
"google",
|
||||||
|
"slack",
|
||||||
|
"github",
|
||||||
|
"azure",
|
||||||
|
"npm",
|
||||||
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue