add exceptions for generic credential rulefor Elasticsearch/Opensea… #86
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Changes proposed in this pull request:
The
generic-credential
rule was flagging lines as containing secrets like these due to the wordskeyword
,key
, orhostname
:https://github.com/cloud-gov/logsearch-for-cloudfoundry/blob/develop/jobs/upload-kibana-objects/templates/kibana-objects/index-pattern/logs.json.erb#L221
https://github.com/cloud-gov/logsearch-for-cloudfoundry/blob/develop/jobs/upload-kibana-objects/templates/kibana-objects/search/app-all-errors.json.erb#L29
https://github.com/cloud-gov/logsearch-for-cloudfoundry/blob/develop/jobs/upload-kibana-objects/templates/kibana-objects/index-pattern/logs.json.erb#L134
Obviously these lines don't actually contain secrets, so I updated the rule to ignore matched secrets that match these regexes:
\"type\":\"keyword\"
, so containing `"type": "keyword" in the matched secret\"name\":\".*hostname\"
, so containing `"name":"hostname" in the matched secretsecurity considerations
We are making legitimate exceptions to one of our rules for detecting secrets