Post-Tyranny-Tech-Infrastru.../.gitignore
Pieter d95862f522 security: Rotate exposed Authentik API token
GitGuardian detected hardcoded secret in test-oidc-provider.py.

Actions taken:
1.  Deleted test-oidc-provider.py (previous commit)
2.  Rotated authentik_bootstrap_token in secrets file
3.  Added test scripts to .gitignore to prevent future exposure

Old token (COMPROMISED): ak_0Xj3OmKT0rx5E_TDKjuvXAl2Ry8IfxlSDKPSRq7fH71uPX3M04d-Xg
New token: Encrypted in SOPS secrets file

Impact: Test environment only (test.vrije.cloud)
Next step: Redeploy test server to activate new token

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2026-01-09 08:32:45 +01:00

63 lines
812 B
Text

# Secrets - NEVER commit plaintext, only encrypted .sops.yaml files
secrets/**/*.yaml
secrets/**/*.yml
!secrets/**/*.sops.yaml
!secrets/.sops.yaml
keys/age-key.txt
*.key
*.pem
# OpenTofu/Terraform state and variables
tofu/.terraform/
tofu/.terraform.lock.hcl
tofu/terraform.tfstate
tofu/terraform.tfstate.backup
tofu/*.tfvars
!tofu/terraform.tfvars.example
# Ansible
ansible/*.retry
ansible/.vault_pass
# OS files
.DS_Store
.DS_Store?
._*
.Spotlight-V100
.Trashes
Thumbs.db
Desktop.ini
# Editor files
.vscode/
.idea/
*.swp
*.swo
*~
.env
.env.local
# Logs
*.log
logs/
# Backup files
*.bak
*.backup
# Python (if using scripts)
__pycache__/
*.py[cod]
*$py.class
.venv/
venv/
# Temporary files
tmp/
temp/
*.tmp
# Test/debug scripts with secrets
scripts/*-test*.py
scripts/test-*.py
**/test-oidc-provider.py