-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
config-schema shouldn't log sensitive data #58652
Comments
Pinging @elastic/kibana-platform (Team:Platform) |
One other option would be to have a convention to never display the actual data value in any error message. It seems there are only very few messages where we do display the raw values. Most messages are like The This would avoid introducing a parameter for that, and the risk that a developer actually forget to flag sensitive data validation with it. |
So, after a 'quick' look, impacted types are:
kibana/packages/kbn-config-schema/src/types/uri_type.ts Lines 38 to 41 in 790739b
kibana/packages/kbn-config-schema/src/types/string_type.ts Lines 45 to 59 in 7949f34
kibana/packages/kbn-config-schema/src/types/string_type.ts Lines 68 to 69 in 7949f34
kibana/packages/kbn-config-schema/src/types/number_type.ts Lines 48 to 51 in b2baf32
kibana/packages/kbn-config-schema/src/types/record_type.ts Lines 43 to 44 in c13b075
kibana/packages/kbn-config-schema/src/types/literal_type.ts Lines 31 to 32 in 94b2b83
kibana/packages/kbn-config-schema/src/types/byte_size_type.ts Lines 63 to 70 in b2baf32
Hiding the actual value in some of these errors will strongly reduce the help the message actually provides (thinking about |
A customer complains that we config-schema logs sensitive data in the plain text
We need to provide a way to filter out sensitive data. For example, we can mark a key as containing sensitive data to prevent disclosure.
The text was updated successfully, but these errors were encountered: