Skip to content

fortification: preventing secret leaks #751

@clux

Description

@clux

What problem are you trying to solve?

It's possible to log Kubeconfig, and Config with Debug - which looks like it will just log all secret information by default.
I want to make this slightly harder to do. Similarly in request parameters that may have access to them.

Describe the solution you'd like

A practice I've seen around is to use:

The first can be used in in the Config, Kubeconfig to help avoiding secrets these being logged (unless explicitly requested via Secret::expose_secret).

The second may be helpful, if it fits into the layer stack, not sure about it.

Describe alternatives you've considered

Removing Debug

Documentation, Adoption, Migration Strategy

Might be considered a breaking change to the Kubeconfig or Config, but can be documented, and it is very light.

Target crate for feature

kube-client


Metadata

Metadata

Assignees

No one assigned

    Labels

    clientkube Client relatedconfigKube config relatedhelp wantedNot immediately prioritised, please help!

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions