-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Flag sensitive execute and file resources #199
Conversation
Foodcritic isn't recognising the sensitive attribute. It seems that a fix is on the way though: Foodcritic/foodcritic#289 |
I agree with this feature, but it seems to be only for chef12. Can you add a test (defined? maybe) to not fail on chef11? |
I've added a check for old Chef servers. |
@scarvalhojr do you test it on chef11? I fear some problem like here: https://github.com/opscode-cookbooks/aws/pull/110/files#r25011292 |
I'm actually running this on a Chef server 11.1 and chef-client 11.12.8 without the need to check if sensitive is supported. If you prefer to be on the safe side and use instance_methods.include, I'm happy to do it. |
I really prefer your way ;) @hufman I'm waiting your go |
Let me know how your test goes and if you need any changes. |
@guilhem, did you manage to test this change? I have another change for the client LWRP and I'm wondering if I should keep the sensitive attribute or not. Thanks |
Can't seem to silence Foodcritic's false positive... |
Try making the ~FC009 comment be attached to the first line of the file resource, and not to the actual attribute. This commit seems to do this, and the error message points to the first line of the resource. Otherwise it looks great! |
Can you rebase this to the current master? I merged a bunch of PRs and caused this one to conflict, I'm sorry! |
Use sensitive attribute on execute and file resources that may expose sensitive data. This avoids keys and secrets appearing on chef-client logs.
Done On Wed, Aug 5, 2015 at 7:24 PM, Walter Huf notifications@github.com wrote:
|
Looks good to me! |
Flag sensitive execute and file resources
Use sensitive attribute on execute and file resources that may expose
sensitive data. This avoids keys and secrets appearing on chef-client
logs.