Open robtaylorsky opened 2 months ago
To be 100% sure: with this configuration, are the secrets redacted as expected in the normal build log (in the web UI or from fly) ?
Yes. They are redacted in the web UI:
But if I use fly watch
I see the same behaviour:
I raised this bug as I'm investigating using the syslog drainer functionality to enable log aggregation for a multi-tenant Concourse cluster with many teams.
In the case of fly watch
- displaying unredacted secrets is perhaps ok. The user here will have permissions on the team the pipeline is set for - and most likely would have access to these secrets anyway in their secrets manager.
In the case of the syslog drainer - where logs are being sent to a different storage location and permissions may differ - it would be good if the build logs didn't contain unredacted secrets.
In the case of the syslog drainer - where logs are being sent to a different storage location and permissions may differ - it would be good if the build logs didn't contain unredacted secrets.
I agree :-)
Seems to be related to #8477.
Summary
When configuring the syslog drainer to send Concourse build logs to a syslog endpoint, and using
CONCOURSE_ENABLE_REDACT_SECRETS=true
, the build logs that are sent contain unredacted pipeline secrets.Steps to reproduce
docker-compose.yaml
:vector.yaml
:Steps:
Expected results
The build log sent by the syslog drainer shouldn't contain the line
running echo Hello world! My password is VerySecret!
. Or otherwise, the secret should be redacted in this line.Actual results
See steps to reproduce. We've seen this behaviour on our AWS EC2 Linux test environment as well as in this example using Docker on a Mac.
Triaging info