Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Guard secret attributes against leaking to the logs [SLE-15-SP3] #1362

Merged
merged 4 commits into from
Mar 13, 2024

Conversation

shundhammer
Copy link
Contributor

@shundhammer shundhammer commented Mar 13, 2024

Target Branch

This is the merge PR of #1361 to SLE-15-SP3.

Bugzilla

https://bugzilla.suse.com/show_bug.cgi?id=1221194

Trello

https://trello.com/c/6SAaaYZ3/

Problem

Secret attributes of the wifi connection object might leak to the logs, e.g. if methods like inspect() are used.

Solution

Mark them as secret with secret_attr from YaST2::SecretAttributes.

Caveat

In this branch, secret_attributes.rb still lives in the Y2Storage namespace and in the yast-storage repo. From SLE-15-SP4 on, it lives in the Yast namespace and in the yast-yast2 repo.

Test

  • Extended and executed the unit tests with packages from the same branch.

Related PRs

Copy link
Contributor

@teclator teclator left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@shundhammer shundhammer merged commit 542c353 into SLE-15-SP3 Mar 13, 2024
10 checks passed
@shundhammer shundhammer deleted the huha-pw-leak-15-3 branch March 13, 2024 15:27
@coveralls
Copy link

Coverage Status

coverage: 80.044% (-0.01%) from 80.058%
when pulling 1756738 on huha-pw-leak-15-3
into 35c2a75 on SLE-15-SP3.

@yast-bot
Copy link
Contributor

✔️ Internal Jenkins job #19 successfully finished
✔️ Created IBS submit request #323985

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants