You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Items marked with (R) are required *prior to targeting to a milestone / release*.
35
42
36
-
-[] (R) Enhancement issue in release milestone, which links to KEP dir in [kubernetes/enhancements] (not the initial KEP PR)
37
-
-[] (R) KEP approvers have approved the KEP status as `implementable`
38
-
-[] (R) Design details are appropriately documented
39
-
-[] (R) Test plan is in place, giving consideration to SIG Architecture and SIG Testing input
40
-
-[] (R) Graduation criteria is in place
41
-
-[] (R) Production readiness review completed
43
+
-[x] (R) Enhancement issue in release milestone, which links to KEP dir in [kubernetes/enhancements] (not the initial KEP PR)
44
+
-[x] (R) KEP approvers have approved the KEP status as `implementable`
45
+
-[x] (R) Design details are appropriately documented
46
+
-[x] (R) Test plan is in place, giving consideration to SIG Architecture and SIG Testing input
47
+
-[x] (R) Graduation criteria is in place
48
+
-[x] (R) Production readiness review completed
42
49
-[ ] Production readiness review approved
43
50
-[ ] "Implementation History" section is up-to-date for milestone
44
51
-[ ] User-facing documentation has been created in [kubernetes/website], for publication to [kubernetes.io]
@@ -114,8 +121,7 @@ This risk can be mitigated by:
114
121
}
115
122
```
116
123
117
-
- implementations of this interface could be auto generated using a dedicated code generator similar to deep-copy generator or manually implemented when needed,
118
-
caching negative inspection results for parameter types which does not have any references to types which may contain sensitive data.
124
+
- implementations of this interface could be auto generated using a dedicated code generator similar to deep-copy generator or manually implemented when needed, caching negative inspection results for parameter types which does not have any references to types which may contain sensitive data.
119
125
120
126
Which of those methods will be used and to what extent will be decided after running performance tests.
121
127
@@ -198,6 +204,16 @@ To allow configuring if logs should be sanitized we will introduce a new logging
198
204
199
205
### Test Plan
200
206
207
+
Tests should cover two things:
208
+
* Test feature log sanitization works e2e
209
+
* Test Kubernetes components don't leak sensitive data
210
+
211
+
To address them we propose:
212
+
* Add e2e tests that enabling log sanitization on test component (simple binary using `k8s.io/components-base`)
213
+
prevents leaking sensitive data
214
+
* Add periodic running standard k8s e2e tests with log sanitization enabled and analyse logs to ensure no log message
215
+
was redacted.
216
+
201
217
### Graduation Criteria
202
218
203
219
#### Alpha (1.20)
@@ -213,6 +229,9 @@ To allow configuring if logs should be sanitized we will introduce a new logging
213
229
214
230
## Implementation History
215
231
232
+
* 2020-05-08 - Original Proposal
233
+
* 2020-08-07 - Merged as provisional
234
+
216
235
## Drawbacks
217
236
218
237
## Alternatives
@@ -246,3 +265,147 @@ Static analysis, with its whitebox visibility, is certainly the more thorough ap
246
265
Therefore static and dynamic analysis should not be considered as disjoint alternatives but rather as a complementary solutions and in the end we should have both implemented in Kubernetes.
0 commit comments