-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove use of REDACTED in config output for public CA #61573
Comments
@kubernetes/sig-cli-bugs @kubernetes/sig-auth-bugs (for thoughts) |
@sethvargo: Reiterating the mentions to trigger a notification: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@sethvargo use |
Hey @zjj2wry Thank you - I have another issue tracking that 😄. The point of this issue is that at best it's a bad UX; at worst it's a miseducation on pki. "REDACTED" isn't the right word here |
@sethvargo If there are multiple clusters displaying certificates, the configuration will be too long, so this switch is turned off by default. But we can add an example to help use. thanks |
Hey @zjj2wry I don't personally view truncation the responsibility of the CLI... users can pipe things to a pager if they really care. That being said, I'm not concerned about the length. The issue is purely about the word choice of "REDACTED". The term redact means:
The use of the term "REDACTED" in the output implies that a CA public key is remove for security when (as you've pointed out) it is removed for truncation. Truncation and redaction are fundamentally different things, and k8s is misusing the word redacted for this use case. |
Not quite a bug, but I think you're right @sethvargo a better term could be used there as it is a public key, not a private key. @kubernetes/sig-auth-feature-requests |
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. add kubectl config view --raw example help user use **What this PR does / why we need it**: ref #61573 **Which issue(s) this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close the issue(s) when PR gets merged)*: **Special notes for your reviewer**: cc @liggitt @soltysh @juanvallejo **Release note**: ```release-note NONE ```
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale I'm not sure what I need to do here. This was marked as a feature. Do you need something more from me? |
We are waiting for someone to fix this. |
/remove-good-first-issue @mikedanese I don't think this fits our definition of a |
So I have to keep replying to the comment bot every 30 days so it doesn't get auto-closed? That feels... odd |
@cblecker thanks for the education :) @sethvargo unfortunately other issues are higher priority and no one has stepped up to fix this. The autocloser is a form of bug bankruptcy that keeps our issue load in check. The contribex special interest group is definitely open to feedback on the bot. |
@sethvargo The biggest hurdle in this is that Kubernetes is using some base64 trickery to display the string We can change this to Given that we already print the user tokens and other credentials this is a bit weird. Should we redact those too? Is it okay if we print the CA certificate instead of truncating it? |
@ibrasho I can't help but laugh at:
I'm not wed to any particular name. I also have no problem displaying the entire certificate. The crux of the issue is that a CA public key is not secret or sensitive. It's a public key 😄 |
I agree. The issue is with the constraints imposed by how this is implemented currently. I tried to come up with a suitable string (given the constraint) and couldn't find anything acceptable... The only suitable option that worked for me is I personally prefer to print the CA certificate since we are already printing user tokens and client certs that are actual secrets. |
I agree. Who do we need to get in agreement that printing the full CA is the best path forward? |
the data is not omitted for security purposes, but to make the output more readable. see #7007 REDACTED is misleading... it should probably be "elided" or "..." |
you can run |
they are not... client cert/key are elided in the same way for the same reason:
something like "++data+omitted++" could be better
If the intent of config view without --raw specified is to be readable (which it currently is), printing many extremely long fields isn't great |
Hmm what about: cluster.CertificateAuthorityData[0:8] + " (TRUNCATED)" I'm pretty sure that would give us a valid b64 string (8+12=20%4=0) and it would subtly hint that the data isn't a secret. |
Only valid characters are
|
Automatic merge from submit-queue (batch tested with PRs 60790, 66023, 67549). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. change TRUNCATED to DATA+OMITTED in kubectl config view **What this PR does / why we need it**: Based on the discussion in #61573, this PR switches the replacement text for CA certificate data and client certificates and secrets printed using `kubectl config view`. Currently, `REDACTED` is used, which might give a false impression that the data is a secret (which is not true for the public certificates). This PR changes `REDACTED` to `DATA+OMITTED`. The printed string is the base64 encoded string on the byte stream. Some trickery is involved to print a readable string (refer to [this comment](https://github.com/kubernetes/kubernetes/pull/66023/files#diff-aec000ca3f293c94dcd99b4a9d1c5c3cL86) for more info). **Which issue(s) this PR fixes**: Fixes #61573 **Special notes for your reviewer**: **Release note**: ```release-note Switched certificate data replacement from "REDACTED" to "DATA+OMITTED" ```
Is this a BUG REPORT or FEATURE REQUEST?:
What happened:
kubectl config view
shows:The use of "REDACTED" for a CA here is misleading, since it's a public certificate that is not a secret.
What you expected to happen:
I expected to see the full CA in pem format (like when you cat
~/.kube/config
) or something like "SUPPRESSED" or "TRUNCATED"How to reproduce it (as minimally and precisely as possible):
kubectl config view
Anything else we need to know?:
Nope
Environment:
Kubernetes version (use
kubectl version
):Cloud provider or hardware configuration:
OS (e.g. from /etc/os-release):
Kernel (e.g.
uname -a
):The text was updated successfully, but these errors were encountered: