hitachienergy / epiphany

Cloud and on-premises automation for Kubernetes centered industrial grade solutions.
Apache License 2.0
138 stars 107 forks source link

Add filtering mechanism for the sensitive data (#3207) #3208

Closed sbbroot closed 2 years ago

seriva commented 2 years ago

@to-bar I think this filter should cover everything, I went quickly through the defaults and besides cloud and ...password... I don't think anything more is there. Or maybe you know something more:)

@sbbroot Maybe we can also apply this to the dump_debug_info function in epicli.py:

image image

Would be nice to kill 2 birds with one stone.

to-bar commented 2 years ago

@to-bar I think this filter should cover everything, I went quickly through the defaults and besides cloud and ...password... I don't think anything more is there. Or maybe you know something more:)

I have grep-ed schema subdir using secret pattern. Found some keys but by default they are commented out, e.g:

  - name: rabbitmq
    #image_pull_secret_name: regcred # optional
#  image_registry_secrets:
#  - email: emaul@domain.com
#    name: secretname
#    namespace: default
#    password: docker-registry-pwd
#    server_url: docker-registry-url
#    username: docker-registry-user

Maybe emails should also be filtered out?

#     - name: 'opsgenie'
#       opsgenie_config:
#         api_key: <secret> | default = global.opsgenie_api_key
#         api_url: <string> | default = global.opsgenie_api_url
seriva commented 2 years ago

@to-bar I think this filter should cover everything, I went quickly through the defaults and besides cloud and ...password... I don't think anything more is there. Or maybe you know something more:)

@sbbroot Maybe we can also apply this to the dump_debug_info function in epicli.py:

image image

Would be nice to kill 2 birds with one stone.

As discussed with @sbbroot lets defer this to a separate issue as this is not entirely related to this issue. @sbbroot pls create it:)

przemyslavic commented 2 years ago

/azp run

azure-pipelines[bot] commented 2 years ago
Pull request contains merge conflicts.
sonarcloud[bot] commented 2 years ago

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication

przemyslavic commented 2 years ago

/azp run

azure-pipelines[bot] commented 2 years ago
Azure Pipelines successfully started running 2 pipeline(s).