Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What kind of change does this PR introduce?
This changes adds to detect-secrets a new plugin to find Google Cloud API keys and oauth2 client ids.
What is the current behavior?
When detect secrets finds a GCP API key in code, it shows the key as 64base key and as GCP Keys.
With oauth2 cgp client-id the detect-secrets does not find it as secrets.
What is the new behavior (if this is a feature change)?
With the currently changes, the detect secrets is now able to correctly show infos about GCP Keys.
Does this PR introduce a breaking change?
No changes are need.
Other information:
Hi, I'am Lucas and I working on a team where we are interested on using Detect-secrets in our CI pipeline. Although this projects is already completed and it has much plugins, we miss some of detections like GCP, Firebase and Facebook tokens plugins. And that's the reason I'am making this pull request, to help detect-secrets to help us and the community in general.