-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make build logs public #7
Comments
Related: #105 I say there:
Though maybe that's too conservative? OTOH, since we don't use regular Jenkins credentials, it doesn't do that cool auto-masking in case creds do end up in the logs. But OTOOH, in practice the only creds we actually use are AWS credentials. And that gets transparently passed through env vars to the AWS CLI/SDKs we use. (And because we're using So I think this is probably OK, but we need to make sure we're very aware of it when hacking on pipeline code that handle creds and by extension cosa and mantle. |
Another slightly more complex but more foolproof approach is making the pipeline job entirely credentials-less, and make the uploading part a separate job entirely. |
That seems... brittle. A credentials leak wouldn't be catastrophic, since malicious artifacts wouldn't be signed, but it'd still be a bad day. I guess we could postprocess the log to explicitly filter out credentials... 😕 |
Retitled issue. I still think this would be good to do, but we need to think through how to do it carefully. We've been moving towards native Jenkins credentials recently, which should help with this. |
Let's make sure the jenkins build logs public so they can be shared and we can collaborate on issues.
The text was updated successfully, but these errors were encountered: