Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

test: avoid leaking sensitive information in e2e logs #261

Merged

Conversation

salasberryfin
Copy link
Contributor

@salasberryfin salasberryfin commented Nov 13, 2023

What this PR does / why we need it:

While looking for an alternative solution to fix the E2E tests failing in GitHub Actions, we identified that sensitive data used for environment configuration is shown in the logs if we move to Prow. To obfuscate this information, we can populate a values file (which only exists in the container that runs the E2E, which can be considered secure).

Which issue(s) this PR fixes:
Fixes #265

Special notes for your reviewer:

Checklist:

  • squashed commits into logical changes
  • includes documentation
  • adds unit tests
  • adds or updates e2e tests

@salasberryfin salasberryfin added the kind/enhancement Categorizes issue or PR as related to a new feature. label Nov 13, 2023
@salasberryfin salasberryfin requested a review from a team as a code owner November 13, 2023 15:10
Signed-off-by: Carlos Salas <carlos.salas@suse.com>
@salasberryfin salasberryfin force-pushed the hide-sensitive-information-e2e-tests branch from a5e5c78 to 943c36e Compare November 16, 2023 09:14
@salasberryfin salasberryfin changed the title WIP: test: avoid leaking sensitive information in e2e logs test: avoid leaking sensitive information in e2e logs Nov 17, 2023
@richardcase richardcase merged commit 40500ee into rancher:main Dec 4, 2023
16 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/chore kind/enhancement Categorizes issue or PR as related to a new feature.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Testing] Remove sensitive information from E2E when running outside of GitHub Actions
3 participants