Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Helm commands dump the environment to logs #104

Open
andysworkshop opened this issue Nov 17, 2024 · 2 comments · May be fixed by #105
Open

Helm commands dump the environment to logs #104

andysworkshop opened this issue Nov 17, 2024 · 2 comments · May be fixed by #105

Comments

@andysworkshop
Copy link

When running at --info logging level any helm commands that the plugin runs will dump the environment to the logs before helm is launched. In a container environment this a security issue because it's common practice to inject credentials into containers using environment variables.

@magner669
Copy link

Had a look at your PR.

My opinion is that secrets should be mounted as files in a container and not envieonmennt variables.

You can see artilcle about this here.

That being said I appreciate your motivation to quickly fix this issue.

I looked at your PR as well. The issue with it is that if users dont opt in their credentials might be leaked in the logs.

I would prefer if we figure out which , if any, environment variables are configured by the plugin , and only log those, obustuficating ones that might have credentials.

@andysworkshop
Copy link
Author

andysworkshop commented Dec 8, 2024

Had a look at your PR.

Thank you.

My opinion is that secrets should be mounted as files in a container and not envieonmennt variables.

I agree, but I'm sure that since you also work for a very large org (this is my personal account) then you'll know that we don't always get to fix everything in our environment. A lot of the time we just have to work with what the org has either bought or developed with teams that aren't motivated/budgeted to make changes for us.

I looked at your PR as well. The issue with it is that if users dont opt in their credentials might be leaked in the logs.

If the default were to opt-out of environment logging supression then this could be a breaking change. I can imagine someone somewhere scraping build logs to build stuff like Splunk dashboards. Making it opt-in, at least to begin with, allows it to be introduced first as a patch release.

I would prefer if we figure out which , if any, environment variables are configured by the plugin , and only log those, obustuficating ones that might have credentials.

That would be the ideal solution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
2 participants