Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pr test #80

Closed
wants to merge 63 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
63 commits
Select commit Hold shift + click to select a range
d20bf85
Rekicking CI
rpaul80 Sep 9, 2020
9873efc
Rekicking CI
rpaul80 Sep 9, 2020
8549220
Rekicking CI
rpaul80 Sep 9, 2020
6aa1163
Rekicking CI
rpaul80 Sep 9, 2020
c91a480
Rekicking CI
rpaul80 Sep 9, 2020
bb30788
Rekicking CI
rpaul80 Sep 9, 2020
e3d2dc2
adding an invalid sectool
rpaul80 Sep 10, 2020
fee1c0e
Rekicking CI
rpaul80 Sep 10, 2020
8b73df7
Rekicking CI
rpaul80 Sep 10, 2020
3c96857
Rekicking CI
rpaul80 Sep 18, 2020
0d0374a
Rekicking CI
rpaul80 Sep 19, 2020
4c53676
Rekicking CI
rpaul80 Oct 31, 2020
1fb7a0d
Rekicking CI
rpaul80 Oct 31, 2020
db01ae4
Rekicking CI
rpaul80 Oct 31, 2020
111b23b
Delete sectool-config.json
rpaul80 Feb 16, 2021
489ed5b
Add a s3 bucket
rpaul80 Feb 16, 2021
339c82d
this bucket should be private.
rpaul80 Feb 16, 2021
83e9367
encrypt the s3 bucket.
rpaul80 Feb 16, 2021
20cc7c4
Merge pull request #4 from rpaul80/add-s3-bucket
rpaul80 Feb 16, 2021
b8c115a
Delete add-s3-bucket.tf
rpaul80 Feb 16, 2021
4c8e2f1
kick ci
rpaul80 May 19, 2021
50111ed
kick ci
rpaul80 May 19, 2021
f13b4eb
kick ci
rpaul80 May 19, 2021
20644be
kick ci
rpaul80 May 19, 2021
85ac097
kick ci
rpaul80 May 19, 2021
10a7d82
kick ci
rpaul80 May 19, 2021
1de77fe
kick ci
rpaul80 May 19, 2021
da6904f
kick ci
rpaul80 May 20, 2021
40848d0
kick ci
rpaul80 May 21, 2021
e5da03c
kick ci
rpaul80 May 21, 2021
b988376
kick ci
rpaul80 May 21, 2021
188c7d9
kick ci
rpaul80 May 21, 2021
3d44d4d
kick ci
rpaul80 May 21, 2021
f9ed2d5
kick ci
rpaul80 May 21, 2021
7c2fa8c
kick ci
rpaul80 May 21, 2021
214fb53
kick ci
rpaul80 May 21, 2021
1a81222
kick ci
rpaul80 May 21, 2021
bf3eb4f
kick ci
rpaul80 May 21, 2021
410afd5
kick ci
rpaul80 May 21, 2021
a6604c5
kick ci
rpaul80 May 21, 2021
8bb7651
kick ci
rpaul80 May 21, 2021
3ac99d9
kick ci
rpaul80 May 21, 2021
ac6ca52
kick ci
rpaul80 May 21, 2021
dd49cd4
kick ci
rpaul80 May 21, 2021
ba3771e
kick ci
rpaul80 May 21, 2021
c8beb93
kick ci
rpaul80 May 21, 2021
367c979
kick ci
rpaul80 May 21, 2021
9e9a60f
kick ci
rpaul80 May 25, 2021
d6e973a
kick ci
rpaul80 May 25, 2021
f97aa2b
new
rpaul80 May 26, 2021
6fe5286
kick ci
rpaul80 May 26, 2021
7da8539
new
rpaul80 May 26, 2021
1745981
should be an issue
rpaul80 May 26, 2021
c9982d2
new one
rpaul80 May 26, 2021
405e0bf
story
rpaul80 May 26, 2021
1ec2774
kick ci
rpaul80 May 27, 2021
041b298
boostid should be supressed
rpaul80 May 27, 2021
1a93cdb
Merge pull request #7 from rpaul80/test-supression-diff
rpaul80 May 27, 2021
cf12c2c
kick ci
rpaul80 Jun 4, 2021
dd02ffa
kick ci
rpaul80 Jun 4, 2021
afeb79e
kick ci
rpaul80 Jun 4, 2021
df9db94
kick ci
rpaul80 Jun 4, 2021
d9a693b
add new
rpaul80 Jun 4, 2021
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
24 changes: 24 additions & 0 deletions detect-secrets-all-options-with-violation-policy.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
{
"violation-policy": [{
"class": "stored-secrets",
"rules": {
"high-entropy-secret": "alert",
"aws-access-key-id": "alert",
"basic-auth-credentials": "alert"
}
}],
"plugin-options": [{
"name": "detect_secrets",
"options": {
"entropy_checks": "off",
"basic_auth": "on",
"mailchimp": "on",
"private_key": "on",
"stripe": "on",
"aws": "on",
"slack": "on",
"twilio": "on",
"ibm": "on"
}
}]
}
85 changes: 85 additions & 0 deletions new.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,85 @@
resource "aws_s3_bucket" "data2" {
# bucket is public
# bucket is not encrypted
# bucket does not have access logs
# bucket does not have versioning
bucket = "${local.resource_prefix.value}-data"
acl = "public-read"
force_destroy = true
tags = {
Name = "${local.resource_prefix.value}-data"
Environment = local.resource_prefix.value
}
}


resource "aws_s3_bucket" "data3" {
# bucket is public
# bucket is not encrypted
# bucket does not have access logs
# bucket does not have versioning
bucket = "${local.resource_prefix.value}-data"
acl = "public-read"
force_destroy = true
tags = {
Name = "${local.resource_prefix.value}-data"
Environment = local.resource_prefix.value
}
}

resource "aws_s3_bucket" "data4" {
# bucket is public
# bucket is not encrypted
# bucket does not have access logs
# bucket does not have versioning
bucket = "${local.resource_prefix.value}-data"
acl = "public-read"
force_destroy = true
tags = {
Name = "${local.resource_prefix.value}-data"
Environment = local.resource_prefix.value
}
}


resource "aws_s3_bucket" "data5" {
# bucket is public
# bucket is not encrypted
# bucket does not have access logs
# bucket does not have versioning
bucket = "${local.resource_prefix.value}-data"
acl = "public-read"
force_destroy = true
tags = {
Name = "${local.resource_prefix.value}-data"
Environment = local.resource_prefix.value
}
}

resource "aws_s3_bucket" "data6" {
# bucket is public
# bucket is not encrypted
# bucket does not have access logs
# bucket does not have versioning
bucket = "${local.resource_prefix.value}-data"
acl = "public-read"
force_destroy = true
tags = {
Name = "${local.resource_prefix.value}-data"
Environment = local.resource_prefix.value
}
}

resource "aws_s3_bucket" "data7" {
# bucket is public
# bucket is not encrypted
# bucket does not have access logs
# bucket does not have versioning
bucket = "${local.resource_prefix.value}-data"
acl = "public-read"
force_destroy = true
tags = {
Name = "${local.resource_prefix.value}-data"
Environment = local.resource_prefix.value
}
}
Loading