diff --git a/.secrets-baseline b/.secrets-baseline index 07d471d..1399974 100644 --- a/.secrets-baseline +++ b/.secrets-baseline @@ -75,6 +75,10 @@ { "path": "detect_secrets.filters.allowlist.is_line_allowlisted" }, + { + "path": "detect_secrets.filters.common.is_baseline_file", + "filename": ".secrets-baseline" + }, { "path": "detect_secrets.filters.common.is_ignored_due_to_verification_policies", "min_level": 2 @@ -114,43 +118,22 @@ } ], "results": { - "ansible_playbooks/vars/vault_hashi_vault_values.example.yml": [ - { - "type": "Secret Keyword", - "filename": "ansible_playbooks/vars/vault_hashi_vault_values.example.yml", - "hashed_secret": "f2baa52d02ca888455ce47823f47bf372d5eecb3", - "is_verified": false, - "line_number": 8 - }, - { - "type": "Secret Keyword", - "filename": "ansible_playbooks/vars/vault_hashi_vault_values.example.yml", - "hashed_secret": "18960546905b75c869e7de63961dc185f9a0a7c9", - "is_verified": false, - "line_number": 10 - }, - { - "type": "Secret Keyword", - "filename": "ansible_playbooks/vars/vault_hashi_vault_values.example.yml", - "hashed_secret": "0beec7b5ea3f0fdbc95d0dd47f3c5bc275da8a33", - "is_verified": false, - "line_number": 22 - } - ], "core/authelia.yml": [ { "type": "Secret Keyword", "filename": "core/authelia.yml", "hashed_secret": "7cb6efb98ba5972a9b5090dc2e517fe14d12cb04", "is_verified": false, - "line_number": 54 + "line_number": 54, + "is_secret": false }, { "type": "Secret Keyword", "filename": "core/authelia.yml", "hashed_secret": "a32b08d97b1615dc27f58b6b17f67624c04e2c4f", "is_verified": false, - "line_number": 191 + "line_number": 185, + "is_secret": false } ], "core/metrics/grafana/grafana.ini": [ @@ -159,44 +142,50 @@ "filename": "core/metrics/grafana/grafana.ini", "hashed_secret": "e5e9fa1ba31ecd1ae84f75caaa474f3a663f05f4", "is_verified": false, - "line_number": 78 + "line_number": 78, + "is_secret": false }, { "type": "Secret Keyword", "filename": "core/metrics/grafana/grafana.ini", "hashed_secret": "55ebda65c08313526e7ba08ad733e5ebea9900bd", "is_verified": false, - "line_number": 109 + "line_number": 109, + "is_secret": false }, { "type": "Secret Keyword", "filename": "core/metrics/grafana/grafana.ini", "hashed_secret": "d033e22ae348aeb5660fc2140aec35850c4da997", "is_verified": false, - "line_number": 151 + "line_number": 151, + "is_secret": false }, { "type": "Secret Keyword", "filename": "core/metrics/grafana/grafana.ini", "hashed_secret": "10bea62ff1e1a7540dc7a6bc10f5fa992349023f", "is_verified": false, - "line_number": 154 + "line_number": 154, + "is_secret": false }, { "type": "Secret Keyword", "filename": "core/metrics/grafana/grafana.ini", "hashed_secret": "5718bce97710e6be87ea160b36eaefb5032857d3", "is_verified": false, - "line_number": 239 + "line_number": 239, + "is_secret": false }, { "type": "Secret Keyword", "filename": "core/metrics/grafana/grafana.ini", "hashed_secret": "10aed9d7ebef778a9b3033dba3f7813b639e0d50", "is_verified": false, - "line_number": 252 + "line_number": 252, + "is_secret": false } ] }, - "generated_at": "2023-07-11T19:43:38Z" + "generated_at": "2023-07-25T23:48:05Z" } diff --git a/README.md b/README.md index 1bc64e7..dfe65d4 100644 --- a/README.md +++ b/README.md @@ -18,4 +18,4 @@ Finally, the Terraform configuration can be applied setting up all services depl ## What does it do? -## Step by step \ No newline at end of file +## Step by step