fedora-coreos-pipeline icon indicating copy to clipboard operation
fedora-coreos-pipeline copied to clipboard

Make build logs public

Open dustymabe opened this issue 7 years ago • 4 comments

Let's make sure the jenkins build logs public so they can be shared and we can collaborate on issues.

dustymabe avatar Nov 05 '18 20:11 dustymabe

Related: #105

I say there:

I'd prefer we don't upload Jenkins logs to the S3 bucket in case credentials get leaked somehow in there.

Though maybe that's too conservative? OTOH, since we don't use regular Jenkins credentials, it doesn't do that cool auto-masking in case creds do end up in the logs. But OTOOH, in practice the only creds we actually use are AWS credentials. And that gets transparently passed through env vars to the AWS CLI/SDKs we use. (And because we're using AWS_CONFIG_FILE, even an env output would just print the file path).

So I think this is probably OK, but we need to make sure we're very aware of it when hacking on pipeline code that handle creds and by extension cosa and mantle.

jlebon avatar Jul 31 '19 18:07 jlebon

Another slightly more complex but more foolproof approach is making the pipeline job entirely credentials-less, and make the uploading part a separate job entirely.

jlebon avatar Jul 31 '19 18:07 jlebon

So I think this is probably OK, but we need to make sure we're very aware of it when hacking on pipeline code that handle creds and by extension cosa and mantle.

That seems... brittle. A credentials leak wouldn't be catastrophic, since malicious artifacts wouldn't be signed, but it'd still be a bad day.

I guess we could postprocess the log to explicitly filter out credentials... :confused:

bgilbert avatar Aug 05 '19 22:08 bgilbert

Retitled issue. I still think this would be good to do, but we need to think through how to do it carefully. We've been moving towards native Jenkins credentials recently, which should help with this.

jlebon avatar Jun 20 '22 21:06 jlebon