-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
api: redact more fields. #9692
api: redact more fields. #9692
Conversation
Signed-off-by: Piotr Sikora <piotrsikora@google.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are you thinking to add tests similar to SecretManagerImplTest::ConfigDumpHandler
?
Signed-off-by: Piotr Sikora <piotrsikora@google.com>
Not really, no... Extensive testing for protos annotated with |
pieces that i'm famliar with are already redacted, so lgtm just curious whats the |
It's the configuration for the asynchronous private key provider, which, in principle, may contain the private key itself, or an information on how to perform the signing. I consider this information sensitive. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks for doing this!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks. I think we don't have to be perfect here, only grow the number of sites we annotate and encourage folks to use these going forward. Config dump and logs are still sensitive and contain PII, so we are not making any assertions around them being scrubbed of all sensitive data.
…more_fields Signed-off-by: Piotr Sikora <piotrsikora@google.com>
This won't make for a great git history, but presumably this can be still merged after the freeze? |
Yeah, sensitive annotations are not breaking. By freezing, we just mean that we won't do breaking changes as per policy. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM with one question.
@@ -118,9 +118,9 @@ message PrivateKeyProvider { | |||
|
|||
// Private key method provider specific configuration. | |||
oneof config_type { | |||
google.protobuf.Struct config = 2 [deprecated = true]; | |||
google.protobuf.Struct config = 2 [deprecated = true, (udpa.annotations.sensitive) = true]; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Doesn't this effectively not do anything since redaction doesn't work inside the struct?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No, this works fine: it recursively redacts everything inside the struct.
The case that wouldn't work is if the struct weren't annotated as sensitive
, but contained some field that, if it were part of a strongly-typed message, would have been annotated sensitive
. That is, when we're looking inside the struct, we have no info about which fields should be redacted.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK got it. Since this is a struct that gets converted into a strongly typed message everything works. 👍
Signed-off-by: Piotr Sikora piotrsikora@google.com