-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Helm commands dump the environment to logs #104
Comments
Had a look at your PR. My opinion is that secrets should be mounted as files in a container and not envieonmennt variables. You can see artilcle about this here. That being said I appreciate your motivation to quickly fix this issue. I looked at your PR as well. The issue with it is that if users dont opt in their credentials might be leaked in the logs. I would prefer if we figure out which , if any, environment variables are configured by the plugin , and only log those, obustuficating ones that might have credentials. |
Thank you.
I agree, but I'm sure that since you also work for a very large org (this is my personal account) then you'll know that we don't always get to fix everything in our environment. A lot of the time we just have to work with what the org has either bought or developed with teams that aren't motivated/budgeted to make changes for us.
If the default were to opt-out of environment logging supression then this could be a breaking change. I can imagine someone somewhere scraping build logs to build stuff like Splunk dashboards. Making it opt-in, at least to begin with, allows it to be introduced first as a patch release.
That would be the ideal solution. |
When running at
--info
logging level any helm commands that the plugin runs will dump the environment to the logs before helm is launched. In a container environment this a security issue because it's common practice to inject credentials into containers using environment variables.The text was updated successfully, but these errors were encountered: