Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make build logs public #7

Open
dustymabe opened this issue Nov 5, 2018 · 4 comments
Open

Make build logs public #7

dustymabe opened this issue Nov 5, 2018 · 4 comments
Labels
jira For syncing to JIRA

Comments

@dustymabe
Copy link
Member

Let's make sure the jenkins build logs public so they can be shared and we can collaborate on issues.

@dustymabe dustymabe changed the title make build logs public centos ci: make build logs public Nov 5, 2018
@jlebon
Copy link
Member

jlebon commented Jul 31, 2019

Related: #105

I say there:

I'd prefer we don't upload Jenkins logs to the S3 bucket in case credentials get leaked somehow in there.

Though maybe that's too conservative? OTOH, since we don't use regular Jenkins credentials, it doesn't do that cool auto-masking in case creds do end up in the logs. But OTOOH, in practice the only creds we actually use are AWS credentials. And that gets transparently passed through env vars to the AWS CLI/SDKs we use. (And because we're using AWS_CONFIG_FILE, even an env output would just print the file path).

So I think this is probably OK, but we need to make sure we're very aware of it when hacking on pipeline code that handle creds and by extension cosa and mantle.

@jlebon
Copy link
Member

jlebon commented Jul 31, 2019

Another slightly more complex but more foolproof approach is making the pipeline job entirely credentials-less, and make the uploading part a separate job entirely.

@bgilbert
Copy link
Contributor

bgilbert commented Aug 5, 2019

So I think this is probably OK, but we need to make sure we're very aware of it when hacking on pipeline code that handle creds and by extension cosa and mantle.

That seems... brittle. A credentials leak wouldn't be catastrophic, since malicious artifacts wouldn't be signed, but it'd still be a bad day.

I guess we could postprocess the log to explicitly filter out credentials... 😕

@jlebon jlebon changed the title centos ci: make build logs public Make build logs public Jun 20, 2022
@jlebon
Copy link
Member

jlebon commented Jun 20, 2022

Retitled issue. I still think this would be good to do, but we need to think through how to do it carefully. We've been moving towards native Jenkins credentials recently, which should help with this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
jira For syncing to JIRA
Projects
None yet
Development

No branches or pull requests

4 participants