-
Notifications
You must be signed in to change notification settings - Fork 554
sync: Release candidate v0.40.0 #6740
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
* notifier v1 removed * notifier v1 removed
…rviceImpl` to make token visibility configurable
sync: Main sync develop
chore: OSS main sync
fix: Build get Stuck Indefinitely in case of K8s Driver When Node Termination Occurs
chore: Api token hide via flag
# Conflicts: # env_gen.json
feat: enhance patch support for user attribute patch api within nested structure
chore: main sync
Co-authored-by: Pawan Mehta <[email protected]>
fix: send HideApiToken env var in api token create and update response
sync: Main sync develop
chore: post trigger
misc: notification table fix
Code Review Agent Run #48c44bActionable Suggestions - 0Review Details
Bito Usage GuideCommands Type the following command in the pull request comment and save the comment.
Refer to the documentation for additional commands. Configuration This repository uses Documentation & Help |
|
Changelist by BitoThis pull request implements the following key changes.
|
| workflowRequest, err = impl.updateWorkflowRequestWithBuildxFlags(workflowRequest, scope) | ||
| if err != nil { | ||
| impl.Logger.Errorw("error, updateWorkflowRequestWithBuildCacheData", "workflowRequest", workflowRequest, "err", err) | ||
| impl.Logger.Errorw("error, updateWorkflowRequestWithBuildxFlags", "workflowRequest", workflowRequest, "err", err) |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information High
Sensitive data returned by an access to Password
Sensitive data returned by an access to DockerPassword
Sensitive data returned by an access to SecretKey
Sensitive data returned by an access to BlobStorageS3SecretKey
Sensitive data returned by an access to Password
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix
AI 4 months ago
To fix the problem, we need to ensure that sensitive information such as passwords, private keys, and access tokens are not logged. The most robust solution is to avoid logging the entire workflowRequest object, and instead log only non-sensitive fields, or to sanitize/redact sensitive fields before logging.
Best way to fix:
- Replace the log call on line 874 that logs the entire
workflowRequestobject with a call that logs only non-sensitive summary information—such asworkflowRequest.WorkflowNamePrefix,workflowRequest.PipelineId, or other relevant identifiers. - If deeper debugging information is needed, explicitly construct a sanitized version of the object for logging, omitting or replacing sensitive fields with redacted values.
- This change should be made in
pkg/build/trigger/HandlerService.goat the site of the vulnerable logging call.
No new imports are needed; we simply need to adjust the logger usage to avoid logging sensitive fields.
-
Copy modified lines R874-R879
| @@ -871,7 +871,12 @@ | ||
| } | ||
| workflowRequest, err = impl.updateWorkflowRequestWithBuildxFlags(workflowRequest, scope) | ||
| if err != nil { | ||
| impl.Logger.Errorw("error, updateWorkflowRequestWithBuildxFlags", "workflowRequest", workflowRequest, "err", err) | ||
| impl.Logger.Errorw( | ||
| "error, updateWorkflowRequestWithBuildxFlags", | ||
| "workflowNamePrefix", workflowRequest.WorkflowNamePrefix, | ||
| "pipelineId", workflowRequest.PipelineId, | ||
| "err", err, | ||
| ) | ||
| return nil, nil, nil, err | ||
| } | ||
| if impl.canSetK8sDriverData(workflowRequest) { |



Description
Fixes #
Checklist:
Does this PR introduce a user-facing change?
Summary by Bito
This pull request prepares release candidate v0.40.0 with multiple enhancements focused on API token security, improved error handling, and event payload refinements. It includes extensive refactoring of key modules like UserAttributesService with robust JSON parsing and merging logic. The PR also updates dependencies, streamlines import paths, and incorporates standardized retry mechanisms across Git-related services.