jenkins-x/jx-ui

Mask secrets in the logs

Opened this issue · 1 comments

Jenkins X just shows the raw logs from the pods or the long term storage.
It can happen that the logs contain sensitive information.

These secrets should be masked in the UI logs.
Examples of secrets include

  • github (or other SCM provider) token
  • Secrets stored in kubernetes

The change should be done in the jx-pipeline repo, so that jx cli also gets the benefit of masking (as ui and cli use the same pipeline functions).

Perhaps this can help us tektoncd/pipeline#4837