diff --git a/.secrets.baseline b/.secrets.baseline index 67bff389..1d6cc615 100644 --- a/.secrets.baseline +++ b/.secrets.baseline @@ -3,7 +3,7 @@ "files": "^.secrets.baseline$", "lines": null }, - "generated_at": "2022-04-13T20:47:25Z", + "generated_at": "2023-08-25T19:53:53Z", "plugins_used": [ { "name": "AWSKeyDetector" @@ -80,24 +80,15 @@ "mvnw.cmd": [ { "hashed_secret": "4e455935905a45080257f4d3c67115e4131b05af", - "is_verified": false, - "line_number": 147, - "type": "Secret Keyword", - "verified_result": null - } - ], - "src/main/liberty/config/server.xml": [ - { - "hashed_secret": "f7aaaef3e831790c18de26826847c545e63c991e", "is_secret": false, "is_verified": false, - "line_number": 19, + "line_number": 147, "type": "Secret Keyword", "verified_result": null } ] }, - "version": "0.13.1+ibm.48.dss", + "version": "0.13.1+ibm.61.dss", "word_list": { "file": null, "hash": null diff --git a/scripts/pipeline/ci_to_secure_pipeline_scan.sh b/scripts/pipeline/ci_to_secure_pipeline_scan.sh index 9eb9a25c..0ff6237f 100755 --- a/scripts/pipeline/ci_to_secure_pipeline_scan.sh +++ b/scripts/pipeline/ci_to_secure_pipeline_scan.sh @@ -21,7 +21,7 @@ fi echo -e "IMAGES_TO_SCAN:\n$IMAGES_TO_SCAN" # This must be an IBM Cloud API key that has permission to run the toolchain -IBMCLOUD_API_KEY="$(get_env ibmcloud-api-key)" +IBMCLOUD_API_KEY="$(get_env ibmcloud-api-key)" # pragma: allowlist secret # The IBM Cloud region that is hosting the security scanning pipeline SECSCAN_TOOLCHAIN_REGION=$(get_env sescan-toolchain-region)