-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor templates repo for detect secrets and distribute to all EN repos #55
Comments
Hi @jordanpadams, in between the time this issue was created (Jan 17) and the time it was put onto the backlog (Oct 17), a major thing has changed over at SLIM, that being: they no longer recommend git-secrets. Instead, they've settled onto another tool, detect-secrets, which they've documented extensively. It looks like detect-secrets can do a whole lot more than git-secrets, which worked fine for AWS keys. Yet detect-secrets can also find absolute file paths (which you commented on), sensitive email addresses, hostnames—and even do entropy analysis (automatic detection of secrets based on their high degree of randomness). We've already settled onto git-secrets for the template-repo-python and template-repo-java, and I can certainly spread git-secrets out to the rest of our repositories. But, as the issue description says above ↑, do we want to follow the guidelines at NASA-AMMOS/slim#89—which would mean going to detect-secrets—or do what the issue title says—which would be propagating git-secrets? |
@nutjob4life feel free to refactor all this towards the best solution you deem for our projects. in this case, let's role with detect-secrets. |
To resolve this, I need to use the sandbox, however I have a prerequisite pull request that'll need to be merged so I can get the sandbox working again. |
Notes to self. Gathering the ToolsAll developers—whether they use Python or Java—will need Python. (Honestly, I'm not sure how I feel about this.) One quickie idea: $ cd $HOME
$ python3 -m venv bin
$ cat > bin/requirements.txt <<EOF
pre-commit ~= 3.5.0
detect-secrets @ git+https://github.com/NASA-AMMOS/slim-detect-secrets.git@exp
EOF
$ bin/pip3 install --requirement bin/requirements.txt Establishing the BaselineTo generate the baseline of PDS repositories, we'll need to exclude far more than the SLIM folk think, as we don't commit generated files (I hope they aren't either). For Python
For Maven
|
Progress: this is now functioning in the sandbox's (Still have an open question about whether we want to force Java developers to install Python.) |
Progress: this is now functioning in the sandbox's I've also updated the READMEs for both Java and Python with instructions on how to use
|
Replace Git Secrets with Detect Secrets
Replace Git Secrets with Detect Secrets
Add secrets detection
Add secrets detection
Secrets detection
Add secrets detection
Secrets detection
Add secrets detection
Add secrets detection
Add secrets detection
Add secrets detection
Add secrets detection
@nutjob4life is investigating 4 repos which do not behave as expected. The others are good. |
Secrets detection
It turns out it was three repositories, not four, that had problems with server-side secrets-detection via GitHub Actions. Only one of those repositories got merged into The other two repositories, The In addition, these PRs for secrets detection remain open at the time of this writing—but had no issues with their secrets-detection status checks in GitHub Actions: |
Add secrets detection
Add secrets detection
Add secrets detection
Closing this out since most repos have been retrofitted. Will add to additional repos as needed if any were missed. |
💡 Description
https://nasa-ammos.github.io/slim/continuous-integration/starter-kits/#git-secrets
Probably need discussion with secrets/credentials provider: https://github.com/awslabs/git-secrets#id20
Should follow the guidelines and recommendations from here: NASA-AMMOS/slim#89
The text was updated successfully, but these errors were encountered: