Skip to content

Commit bd2cf20

Browse files
aitchisspieh
andauthored
feat: rename enhanced secret scan env vars (#6414)
Co-authored-by: Michal Piechowiak <[email protected]>
1 parent a976d15 commit bd2cf20

File tree

6 files changed

+15
-13
lines changed

6 files changed

+15
-13
lines changed

packages/build/src/log/messages/core_steps.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ export const logSecretsScanFailBuildMessage = function ({
188188
)
189189
logError(
190190
logs,
191-
`\nIf these are expected, use ENHANCED_SECRETS_SCAN_OMIT_VALUES, or ENHANCED_SECRETS_SCAN_ENABLED to prevent detecting.`,
191+
`\nIf these are expected, use SECRETS_SCAN_SMART_DETECTION_OMIT_VALUES, or SECRETS_SCAN_SMART_DETECTION_ENABLED to prevent detecting.`,
192192
)
193193
}
194194
}

packages/build/src/plugins_core/secrets_scanning/index.ts

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -64,18 +64,18 @@ const coreStep: CoreStepFunction = async function ({
6464
if (enhancedSecretScan && enhancedScanShouldRunInActiveMode && !enhancedScanningEnabledInEnv) {
6565
logSecretsScanSkipMessage(
6666
logs,
67-
'Enhanced secrets detection disabled via ENHANCED_SECRETS_SCAN_ENABLED flag set to false.',
67+
'Enhanced secrets detection disabled via SECRETS_SCAN_SMART_DETECTION_ENABLED flag set to false.',
6868
)
6969
}
7070

7171
if (
7272
enhancedScanShouldRunInActiveMode &&
7373
enhancedScanConfigured &&
74-
envVars['ENHANCED_SECRETS_SCAN_OMIT_VALUES'] !== undefined
74+
envVars['SECRETS_SCAN_SMART_DETECTION_OMIT_VALUES'] !== undefined
7575
) {
7676
log(
7777
logs,
78-
`ENHANCED_SECRETS_SCAN_OMIT_VALUES override option set to: ${envVars['ENHANCED_SECRETS_SCAN_OMIT_VALUES']}\n`,
78+
`SECRETS_SCAN_SMART_DETECTION_OMIT_VALUES override option set to: ${envVars['SECRETS_SCAN_SMART_DETECTION_OMIT_VALUES']}\n`,
7979
)
8080
}
8181

packages/build/src/plugins_core/secrets_scanning/utils.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ export function isSecretsScanningEnabled(env: Record<string, unknown>): boolean
5353
* @returns
5454
*/
5555
export function isEnhancedSecretsScanningEnabled(env: Record<string, unknown>): boolean {
56-
if (env.ENHANCED_SECRETS_SCAN_ENABLED === false || env.ENHANCED_SECRETS_SCAN_ENABLED === 'false') {
56+
if (env.SECRETS_SCAN_SMART_DETECTION_ENABLED === false || env.SECRETS_SCAN_SMART_DETECTION_ENABLED === 'false') {
5757
return false
5858
}
5959
return true
@@ -71,7 +71,7 @@ export function getStringArrayFromEnvValue(env: Record<string, unknown>, envVarN
7171
}
7272

7373
export function getOmitValuesFromEnhancedScanForEnhancedScanFromEnv(env: Record<string, unknown>): unknown[] {
74-
return getStringArrayFromEnvValue(env, 'ENHANCED_SECRETS_SCAN_OMIT_VALUES')
74+
return getStringArrayFromEnvValue(env, 'SECRETS_SCAN_SMART_DETECTION_OMIT_VALUES')
7575
}
7676

7777
function filterOmittedKeys(env: Record<string, unknown>, envKeys: string[] = []): string[] {
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
[build.environment]
2-
ENHANCED_SECRETS_SCAN_ENABLED = "false"
2+
SECRETS_SCAN_SMART_DETECTION_ENABLED = "false"
33
ENV_VAR_1 = "sk_12345678901234567890"
44
ENV_VAR_2 = "val2-val2-val2"
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
[build.environment]
22
ENV_VAR_1 = "sk_12345678901234567890"
33
ENV_VAR_2 = "val2-val2-val2"
4-
ENHANCED_SECRETS_SCAN_OMIT_VALUES = "sk_12345678901234567890"
4+
SECRETS_SCAN_SMART_DETECTION_OMIT_VALUES = "sk_12345678901234567890"

packages/build/tests/secrets_scanning/tests.js

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,7 @@ for (const { testPrefix, featureFlags } of [
294294

295295
test(
296296
testPrefix +
297-
'secrets scanning, enhanced scan should not find matches when disabled with ENHANCED_SECRETS_SCAN_ENABLED set to false',
297+
'secrets scanning, enhanced scan should not find matches when disabled with SECRETS_SCAN_SMART_DETECTION_ENABLED set to false',
298298
async (t) => {
299299
const { requests } = await new Fixture('./fixtures/src_scanning_likely_enhanced_scan_secrets_disabled')
300300
.withFlags({
@@ -313,7 +313,8 @@ for (const { testPrefix, featureFlags } of [
313313
)
314314

315315
test(
316-
testPrefix + 'secrets scanning, enhanced scan should skip matches defined in ENHANCED_SECRETS_SCAN_OMIT_VALUES',
316+
testPrefix +
317+
'secrets scanning, enhanced scan should skip matches defined in SECRETS_SCAN_SMART_DETECTION_OMIT_VALUES',
317318
async (t) => {
318319
const { requests, output } = await new Fixture('./fixtures/src_scanning_likely_enhanced_scan_secrets_omitted')
319320
.withFlags({
@@ -326,15 +327,16 @@ for (const { testPrefix, featureFlags } of [
326327
})
327328
.runBuildServer({ path: '/api/v1/deploys/test/validations_report' })
328329

329-
t.true(normalizeOutput(output).includes('ENHANCED_SECRETS_SCAN_OMIT_VALUES override option set'))
330+
t.true(normalizeOutput(output).includes('SECRETS_SCAN_SMART_DETECTION_OMIT_VALUES override option set'))
330331
t.true(requests.length === 1)
331332
const request = requests[0]
332333
t.is(request.body.secrets_scan.enhancedSecretsScanMatches.length, 0)
333334
},
334335
)
335336

336337
test(
337-
testPrefix + 'secrets scanning, ENHANCED_SECRETS_SCAN_OMIT_VALUES not logged if enhanced scanning not enabled',
338+
testPrefix +
339+
'secrets scanning, SECRETS_SCAN_SMART_DETECTION_OMIT_VALUES not logged if enhanced scanning not enabled',
338340
async (t) => {
339341
const { output } = await new Fixture('./fixtures/src_scanning_likely_enhanced_scan_secrets_omitted')
340342
.withFlags({
@@ -347,7 +349,7 @@ for (const { testPrefix, featureFlags } of [
347349
})
348350
.runBuildServer({ path: '/api/v1/deploys/test/validations_report' })
349351

350-
t.false(normalizeOutput(output).includes('ENHANCED_SECRETS_SCAN_OMIT_VALUES override option set'))
352+
t.false(normalizeOutput(output).includes('SECRETS_SCAN_SMART_DETECTION_OMIT_VALUES override option set'))
351353
},
352354
)
353355

0 commit comments

Comments
 (0)