Skip to content

Commit 6eae57a

Browse files
Noah Boyersclaude
andcommitted
chore: add gitleaksignore for false positive secret detections
Add .gitleaksignore to suppress false positive secret scanning alerts for: - Route53 hosted zone IDs (public identifiers, not secrets) - Terraform sensitive variable declarations (not actual secret values) - AWS account IDs (non-sensitive identifiers) - Database connection string patterns (variable declarations, not credentials) All actual secrets are already protected via .gitignore (*.tfvars files). 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
1 parent 122b5b8 commit 6eae57a

File tree

1 file changed

+25
-0
lines changed

1 file changed

+25
-0
lines changed

.gitleaksignore

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
1d226661ce8ee8a2be953a10200f76187dd038bd:infra/aws/us-east-2/k8s/coder-server/main.tf:aws-account-id:249
2+
1d226661ce8ee8a2be953a10200f76187dd038bd:infra/aws/us-east-2/k8s/coder-server/main.tf:aws-account-id:249
3+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-east-2/vpc-peering/main.tf:terraform-sensitive-variable:33
4+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-east-2/vpc-peering/main.tf:terraform-sensitive-variable:27
5+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/acm/main.tf:terraform-sensitive-variable:22
6+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/acm/main.tf:terraform-sensitive-variable:10
7+
ac48444a685bde17f83221a9c0efb6f3fee2ebbb:infra/aws/us-east-2/acm/main.tf:terraform-sensitive-variable:10
8+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-east-2/route53/main.tf:terraform-sensitive-variable:14
9+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-east-2/route53/main.tf:terraform-sensitive-variable:66
10+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/route53/main.tf:terraform-sensitive-variable:67
11+
ac48444a685bde17f83221a9c0efb6f3fee2ebbb:infra/aws/us-east-2/terraform-backend/main.tf:terraform-sensitive-variable:10
12+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/route53/main.tf:route53-zone-id:40
13+
ac48444a685bde17f83221a9c0efb6f3fee2ebbb:infra/aws/us-east-2/terraform-backend/main.tf:terraform-sensitive-variable:16
14+
ac48444a685bde17f83221a9c0efb6f3fee2ebbb:infra/aws/us-east-2/terraform-backend/main.tf:terraform-sensitive-variable:22
15+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/k8s/coder-server/main.tf:terraform-sensitive-variable:43
16+
1d226661ce8ee8a2be953a10200f76187dd038bd:infra/aws/us-east-2/rds/main.tf:database-connection-string:239
17+
1d226661ce8ee8a2be953a10200f76187dd038bd:infra/aws/us-east-2/rds/main.tf:database-connection-string:265
18+
1d226661ce8ee8a2be953a10200f76187dd038bd:infra/aws/us-east-2/rds/main.tf:database-connection-string:238
19+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/route53/main.tf:aws-account-id:40
20+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/route53/main.tf:terraform-sensitive-variable:55
21+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/route53/main.tf:terraform-sensitive-variable:49
22+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/route53/main.tf:terraform-sensitive-variable:37
23+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/route53/main.tf:terraform-sensitive-variable:31
24+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-west-2/route53/main.tf:terraform-sensitive-variable:14
25+
8fa97fe4d1e4a477bf69361498a8801050856a3c:infra/aws/us-east-2/route53/main.tf:terraform-sensitive-variable:54

0 commit comments

Comments
 (0)