Skip to content

RFC: openjd_redacted_env: setting environment variables containing sensitive info which should be redacted from logs #85

@baxeaz

Description

@baxeaz

Description

Setting environment variables in an openjd Environment such that they are persisted in subsequent actions run while the Environment is still active currently requires echoing them to stdout with the openjd_env: key=value format which exposes potentially sensitive information such as credentials to logs.

This RFC proposes a new token, openjd_redacted_env, which sets environment variables exactly like openjd_env but defaults to redacting the potentially sensitive information from logs.

Roles

Role User
Proposed By @baxeaz
Author(s) @baxeaz

Workflow

  • Tracking issue created (label: rfc/proposed)
  • RFC pull request submitted and ready for discussion (label: rfc/exploring)
  • Last call for comments (labels: rfc/exploring and rfc/final-comments)
  • Accepted and merged RFC pull request (label: rfc/accepted-future)
  • Green-light for inclusion in a draft specification, and the author is creating and iterating on pull requests (label: rfc/accepted-draft)
  • Pull requests are merged in to a draft specification (label: rfc/accepted-staged)
  • Officially published in a non-draft revision of the specification (label: rfc/released)

Please close this tracking issue when the proposal enters the Released stage of the process.

Open Points

For easier discovery, especially if there is a lot of discussion on this issue, then please keep this section updated
with brief summaries and pointers to the main points of discussion.


The author is responsible to progress the RFC according to this checklist, and
apply the relevant labels to this issue.

Metadata

Metadata

Assignees

Labels

rfc/accepted-draftGreen light to include the proposal in a draft of Open Job Description

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions