Review the method used to document the secrets detected by secret detection
Problem to solve
The secrets detected by pipeline secret detection and secret push protection are documented on the following pages:
- https://docs.gitlab.com/ee/user/application_security/secret_detection/pipeline/detected_secrets.html
- https://docs.gitlab.com/ee/user/application_security/secret_detection/secret_push_protection/detected_secrets.html
The tables on these pages were created by extracting content from the source TOML-formatted files into CSV-formatted files, then "converted" into a Markdown table format by applying a series of CLI commands. The series of commands is documented at !155669 (comment 1942039299).
The CLI commands are effective, but take some time and require use of several CLI utilities.
TOML source files:
- Pipeline secret detection:
- Secret push protection:
Proposal
Determine if there is a more efficient and effective method of creating these tables.
Who can address the issue
Anyone.
Other links/references
Edited by Russell Dickenson