-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path.gitleaksignore
102 lines (102 loc) · 6.92 KB
/
.gitleaksignore
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
[
{
"Description": "Possible Kubernetes Secret detected, posing a risk of leaking credentials/tokens from your deployments",
"StartLine": 3,
"EndLine": 8,
"StartColumn": 2,
"EndColumn": 1,
"Match": "kind: Secret\nmetadata:\n name: \"home-ca\"\ndata:\n tls.crt: ${SECRET_CLUSTER_HOME_CA}",
"Secret": "kind: Secret\nmetadata:\n name: \"home-ca\"\ndata:\n tls.crt: ${SECRET_CLUSTER_HOME_CA}",
"File": "k3s-cluster-apps/apps/postgres/cloudnative-pg/cluster/secrets.yaml",
"SymlinkFile": "",
"Commit": "e460c4010238c18b099e696426cda6573d0222bf",
"Entropy": 4.7779145,
"Author": "Alexandre P.",
"Email": "[email protected]",
"Date": "2023-10-27T13:46:43Z",
"Message": "feat: add postgres instance",
"Tags": [],
"RuleID": "kubernetes-secret-with-data-after",
"Fingerprint": "e460c4010238c18b099e696426cda6573d0222bf:k3s-cluster-apps/apps/postgres/cloudnative-pg/cluster/secrets.yaml:kubernetes-secret-with-data-after:3"
},
{
"Description": "Possible Kubernetes Secret detected, posing a risk of leaking credentials/tokens from your deployments",
"StartLine": 6,
"EndLine": 11,
"StartColumn": 2,
"EndColumn": 1,
"Match": "data:\n tls.crt: ${SECRET_CLUSTER_HOME_CA}\n---\napiVersion: v1\nkind: Secret",
"Secret": "data:\n tls.crt: ${SECRET_CLUSTER_HOME_CA}\n---\napiVersion: v1\nkind: Secret",
"File": "k3s-cluster-apps/apps/postgres/cloudnative-pg/cluster/secrets.yaml",
"SymlinkFile": "",
"Commit": "e460c4010238c18b099e696426cda6573d0222bf",
"Entropy": 4.9439297,
"Author": "Alexandre P.",
"Email": "[email protected]",
"Date": "2023-10-27T13:46:43Z",
"Message": "feat: add postgres instance",
"Tags": [],
"RuleID": "kubernetes-secret-with-data-before",
"Fingerprint": "e460c4010238c18b099e696426cda6573d0222bf:k3s-cluster-apps/apps/postgres/cloudnative-pg/cluster/secrets.yaml:kubernetes-secret-with-data-before:6"
},
{
"Description": "Possible Kubernetes Secret detected, posing a risk of leaking credentials/tokens from your deployments",
"StartLine": 2,
"EndLine": 5,
"StartColumn": 2,
"EndColumn": 1,
"Match": "data:\n age.agekey: ENC[AES256_GCM,data:36YmAyTw+d2sAp92iuFde9HJPOxDqyp6XuLYjbTrb0voxtpL2S3xzk7w1S+ajTy3eQ5aFXwNZKSVwYZw8bCV0wIwldc0J2P2bUcDcHqZwKZRzGsBqm9kUAwTVp7bPZTeyf09oEv9TejyWRkB3ZzD6nb3v8rrUVFwVduVkoxhSAueKyhhn+nJ+UMouXjFOJDxNDx9Y6RyVko85JU3+ozkuvCr949JGomb3FKkr8TkXF0IdEbpSbPt4tEN8osOjsR7ndz2zbvM6D11hcF2UoIxzFZhWEMHsKkYtUSkEdj36vbxR7s2RLlFNxLzidk8z1Dtt7zuhgV+Bw7W3ixQ,iv:djr+PAM5SdFX2JbuLOED4Zki25VHq8zwd51Olxh0TSg=,tag:EB2Ec5OEmFMIpQFs90RwZg==,type:str]\nkind: Secret",
"Secret": "data:\n age.agekey: ENC[AES256_GCM,data:36YmAyTw+d2sAp92iuFde9HJPOxDqyp6XuLYjbTrb0voxtpL2S3xzk7w1S+ajTy3eQ5aFXwNZKSVwYZw8bCV0wIwldc0J2P2bUcDcHqZwKZRzGsBqm9kUAwTVp7bPZTeyf09oEv9TejyWRkB3ZzD6nb3v8rrUVFwVduVkoxhSAueKyhhn+nJ+UMouXjFOJDxNDx9Y6RyVko85JU3+ozkuvCr949JGomb3FKkr8TkXF0IdEbpSbPt4tEN8osOjsR7ndz2zbvM6D11hcF2UoIxzFZhWEMHsKkYtUSkEdj36vbxR7s2RLlFNxLzidk8z1Dtt7zuhgV+Bw7W3ixQ,iv:djr+PAM5SdFX2JbuLOED4Zki25VHq8zwd51Olxh0TSg=,tag:EB2Ec5OEmFMIpQFs90RwZg==,type:str]\nkind: Secret",
"File": "k3s-cluster-apps/bootstrap/flux/age.agekey.encoded.yaml",
"SymlinkFile": "",
"Commit": "d88a82f27429d5ecb58a570243148fa0d0ebec5b",
"Entropy": 5.991069,
"Author": "Alexandre P",
"Email": "[email protected]",
"Date": "2023-06-12T13:16:37Z",
"Message": "Update Bootstrap procedure",
"Tags": [],
"RuleID": "kubernetes-secret-with-data-before",
"Fingerprint": "d88a82f27429d5ecb58a570243148fa0d0ebec5b:k3s-cluster-apps/bootstrap/flux/age.agekey.encoded.yaml:kubernetes-secret-with-data-before:2"
},
{
"Description": "Possible Kubernetes Secret detected, posing a risk of leaking credentials/tokens from your deployments",
"StartLine": 2,
"EndLine": 9,
"StartColumn": 2,
"EndColumn": 1,
"Match": "kind: Secret\ntype: Opaque\nmetadata:\n name: flux-system\n namespace: flux-system\ndata:\n identity: ENC[AES256_GCM,data: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,iv:a4Nai1i6bLlYz3EJnTTzQzobhM7O1umWOVaY2eQNUe4=,tag:0/2vPXbz25V2F3OHLX2YPw==,type:str]",
"Secret": "kind: Secret\ntype: Opaque\nmetadata:\n name: flux-system\n namespace: flux-system\ndata:\n identity: ENC[AES256_GCM,data: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,iv:a4Nai1i6bLlYz3EJnTTzQzobhM7O1umWOVaY2eQNUe4=,tag:0/2vPXbz25V2F3OHLX2YPw==,type:str]",
"File": "k3s-cluster-apps/bootstrap/flux/github-deploy-key.encoded.yaml",
"SymlinkFile": "",
"Commit": "d88a82f27429d5ecb58a570243148fa0d0ebec5b",
"Entropy": 6.021031,
"Author": "Alexandre P",
"Email": "[email protected]",
"Date": "2023-06-12T13:16:37Z",
"Message": "Update Bootstrap procedure",
"Tags": [],
"RuleID": "kubernetes-secret-with-data-after",
"Fingerprint": "d88a82f27429d5ecb58a570243148fa0d0ebec5b:k3s-cluster-apps/bootstrap/flux/github-deploy-key.encoded.yaml:kubernetes-secret-with-data-after:2"
},
{
"Description": "Possible Kubernetes Secret detected, posing a risk of leaking credentials/tokens from your deployments",
"StartLine": 3,
"EndLine": 9,
"StartColumn": 2,
"EndColumn": 1,
"Match": "kind: Secret\nmetadata:\n name: \"${SECRET_HOME_DOMAIN}-ca\"\n namespace: cert-manager\ndata:\n tls.crt: ${SECRET_CLUSTER_HOME_CA}",
"Secret": "kind: Secret\nmetadata:\n name: \"${SECRET_HOME_DOMAIN}-ca\"\n namespace: cert-manager\ndata:\n tls.crt: ${SECRET_CLUSTER_HOME_CA}",
"File": "k3s-cluster-apps/apps/cert-manager/cert-manager/config/ingress-home-certs.yaml",
"SymlinkFile": "",
"Commit": "112d67648ae3aa32d70d24fb292e7c73601df3fe",
"Entropy": 4.8765726,
"Author": "Alexandre P",
"Email": "[email protected]",
"Date": "2023-02-09T13:23:28Z",
"Message": "fix: add home CA and cert",
"Tags": [],
"RuleID": "kubernetes-secret-with-data-after",
"Fingerprint": "112d67648ae3aa32d70d24fb292e7c73601df3fe:k3s-cluster-apps/apps/cert-manager/cert-manager/config/ingress-home-certs.yaml:kubernetes-secret-with-data-after:3"
}
]