Mask secrets in the logs
Opened this issue · 1 comments
ankitm123 commented
Jenkins X just shows the raw logs from the pods or the long term storage.
It can happen that the logs contain sensitive information.
These secrets should be masked in the UI logs.
Examples of secrets include
- github (or other SCM provider) token
- Secrets stored in kubernetes
The change should be done in the jx-pipeline repo, so that jx cli also gets the benefit of masking (as ui and cli use the same pipeline functions).
babadofar commented
Perhaps this can help us tektoncd/pipeline#4837