From c89076e28161f4b08d7b375ff486a59f6cde6b3b Mon Sep 17 00:00:00 2001
From: Jose Raul Barreras <barreras@unl.edu>
Date: Thu, 30 May 2019 17:57:56 -0500
Subject: [PATCH] improve doc

---
 README.md                  |  2 +-
 examples/Detect-Secrets.md | 22 +++++++++++++++++++++-
 2 files changed, 22 insertions(+), 2 deletions(-)

diff --git a/README.md b/README.md
index 7ad8b23..901c0c0 100644
--- a/README.md
+++ b/README.md
@@ -27,4 +27,4 @@ This file is automatically updated after execute `git commit` based on the conte
  - its-registry.unl.edu/unl-its/docker-ci/static-code-analysis:python 
     
 
-
_Last update: Thu May 30 17:47:26 CDT 2019_
+
_Last update: Thu May 30 17:57:56 CDT 2019_
diff --git a/examples/Detect-Secrets.md b/examples/Detect-Secrets.md
index 42057ba..e11457e 100644
--- a/examples/Detect-Secrets.md
+++ b/examples/Detect-Secrets.md
@@ -1,4 +1,4 @@
-# Secrets detection example
+	# Secrets detection example
 
 ## Parameters
 
@@ -22,3 +22,23 @@ variables:
   script:
     - docker run --rm -v "${PWD}:/work" -w /work its-registry.unl.edu/unl-its/docker-ci/detect-secrets -s -e 4.5
 ``` 
+
+# Inline Allowlisting
+To tell detect-secrets to ignore a particular line of code, simply append an inline pragma: allowlist secret comment. For example:
+
+API_KEY = "blah-blah-but-actually-not-secret"  # pragma: allowlist secret
+print('hello world')
+Inline commenting syntax for a multitude of languages is supported:
+
+| Comment Style	| Language Support |
+| :------------ | :-------------- |
+|#				| e.g. Python, Dockerfile, YAML |
+|//				| e.g. Go, C++, Java		|
+|/* */			| e.g. C, Java	|
+|'				| e.g. Visual Basic .NET |
+| --			| e.g. SQL, Haskell |
+| <!-- --!>		| e.g. XML |
+
+This may be a convenient way for you to allowlist secrets, without having to regenerate the entire baseline again. Furthermore, this makes the allowlisted secrets easily searchable, auditable, and maintainable.
+
+_[source](https://github.com/Yelp/detect-secrets#secrets-baseline)_
-- 
GitLab