Skip to content
This repository has been archived by the owner on Nov 1, 2022. It is now read-only.

Sanitize Git remote URLs on the server side #2726

Merged
merged 1 commit into from Jan 8, 2020

Conversation

2opremio
Copy link
Contributor

@2opremio 2opremio commented Jan 8, 2020

It's safer than doing it on the client side (e.g. Flux users can be restricted to only port-forwarding to the Flux pod, not allowing them to see the git remote password).

Followup from #2549 . Fixes #2720

It's safer than doing it on the client side (e.g. Flux users can be restricted
to only port-forwarding to the Flux pod, not allowing them to see the git remote
password).
@2opremio 2opremio requested a review from hiddeco January 8, 2020 12:22
@2opremio 2opremio added this to the 1.18.0 milestone Jan 8, 2020
Copy link
Member

@hiddeco hiddeco left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Obvious improvement and much better indeed, thanks Fons 🌟

@2opremio 2opremio merged commit d547f91 into fluxcd:master Jan 8, 2020
@2opremio 2opremio deleted the sanitize-url-from-server branch January 8, 2020 12:39
@2opremio 2opremio modified the milestones: 1.18.0, 1.17.1 Jan 13, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

fluxctl sync exposes password when using https
2 participants