Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Password field should be hidden in the SMB NewSmbGlobalMappingRequest Proto #142

Closed
3 tasks
mauriciopoppe opened this issue May 25, 2021 · 11 comments
Closed
3 tasks
Assignees

Comments

@mauriciopoppe
Copy link
Member

mauriciopoppe commented May 25, 2021

This field should be hidden

string password = 4;

@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue or PR as fresh with /remove-lifecycle stale
  • Mark this issue or PR as rotten with /lifecycle rotten
  • Close this issue or PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Aug 23, 2021
@Kartik494
Copy link
Member

/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot removed the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Sep 15, 2021
@Kartik494
Copy link
Member

Hi @mauriciopoppe As far as i get it here you are asking for updating password field in as a secret? or we can make a new function that would call the encrypted password?

@mauriciopoppe
Copy link
Member Author

mauriciopoppe commented Sep 15, 2021

hey @Kartik494, this to hide the password field while the gRPC request is in transit, it's about adding an annotation in the proto file to the password field like

https://github.com/container-storage-interface/spec/blob/da58351ba3d7baf850877be3425e76ff30645d33/csi.proto#L686-L695

map<string, string> secrets = 2 [(csi_secret) = true];

I've updated the top description with a tasklist of the things that we need

@Kartik494
Copy link
Member

I would like to work on this
/assign

@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue or PR as fresh with /remove-lifecycle stale
  • Mark this issue or PR as rotten with /lifecycle rotten
  • Close this issue or PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Dec 15, 2021
@Kartik494
Copy link
Member

/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot removed the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Dec 15, 2021
@Kartik494
Copy link
Member

I have tried to compile api.proto with protoc installed by apt.But this is not generating api.pb.go file , then I looked into comment and tried for protoc 3.19.3 and working without including in makefile

@mauriciopoppe
Copy link
Member Author

hey @Kartik494, there's a test here that installs a version of protobuf that works, locally I used:

protoc --version
libprotoc 3.12.4

@Kartik494
Copy link
Member

Sure i will give a try on this again and i will let you know if that works.
Thanks

@mauriciopoppe
Copy link
Member Author

In one of the CSI Windows meetings we saw that the secret annotation is used by csi-lib-utils when logging a request, in CSI Proxy we aren't using this library and we don't log the requests by default.

We agreed that if we make sure that we don't have log statements in the codebase that are logging the requests (and their secrets if they have them) then we don't need to add that annotation to the field, I apologize for not finding out this before.

/close

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants