Skip to content

Commit ee170aa

Browse files
authored
Merge pull request #62251 from dfitzmau/OCPBUGS-16038
OCPBUGS#16038: Replace fake passwords with standard replace values
2 parents 2a5901e + f536b00 commit ee170aa

File tree

36 files changed

+82
-77
lines changed

36 files changed

+82
-77
lines changed

_unused_topics/completing-installation.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,22 +12,22 @@ INFO Install complete!                                
1212
1313
INFO Run 'export KUBECONFIG=/home/joe/ocp/auth/kubeconfig' to manage the cluster with 'oc', the {product-title} CLI.
1414
15-
INFO The cluster is ready when 'oc login -u kubeadmin -p 39RPg-y4c7V-n4bbn-vAF3M' succeeds (wait a few minutes).
15+
INFO The cluster is ready when 'oc login -u kubeadmin -p <password>' succeeds (wait a few minutes).
1616
1717
INFO Access the {product-title} web-console here: https://console-openshift-console.apps.mycluster.devel.example.com
1818
19-
INFO Login to the console with user: kubeadmin, password: 39RPg-y4c7V-n4bbn-vAF3M
19+
INFO Login to the console with user: kubeadmin, password: "password"
2020
----
2121

22-
To access the {product-title} cluster from your web browser, log in as kubeadmin with the password (for example, 39RPg-y4c7V-n4bbn-vAF3M), using the URL shown:
22+
To access the {product-title} cluster from your web browser, log in as kubeadmin with the password, using the URL shown:
2323

2424
     https://console-openshift-console.apps.mycluster.devel.example.com
2525

2626
To access the {product-title} cluster from the command line, identify the location of the credentials file (export the KUBECONFIG variable) and log in as kubeadmin with the provided password:
2727
----
2828
$ export KUBECONFIG=/home/joe/ocp/auth/kubeconfig
2929
30-
$ oc login -u kubeadmin -p 39RPg-y4c7V-n4bbn-vAF3M
30+
$ oc login -u kubeadmin -p <password>
3131
----
3232

3333
At this point, you can begin using the {product-title} cluster. To understand the management of your {product-title} cluster going forward, you should explore the {product-title} control plane.

contributing_to_docs/doc_guidelines.adoc

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1677,6 +1677,14 @@ Nest admonitions when using the `collapsible` option.
16771677
|password
16781678
|===
16791679

1680+
[IMPORTANT]
1681+
====
1682+
Do not use a password format that matches the format of a real password. Documenting such a password format can cause the following issues:
1683+
1684+
* Indicates that Red Hat publicly exposes sensitive data in their documentation.
1685+
* Leads to additional security incidents that the Information Security, InfoSec, team must investigate. Such security incidents, although minor, can impact the InfoSec team's resources and potentially delay them from focusing on actual security incidents.
1686+
====
1687+
16801688
.Projects and applications
16811689
[option="header"]
16821690
|===

modules/builds-creating-secrets.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,8 @@ metadata:
4343
name: mysecret
4444
type: Opaque <1>
4545
data:
46-
username: dXNlci1uYW1l
47-
password: cGFzc3dvcmQ=
46+
username: <username>
47+
password: <password>
4848
----
4949
+
5050
<1> Specifies an _opaque_ secret.

modules/builds-secrets-overview.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ metadata:
1717
namespace: my-namespace
1818
type: Opaque <1>
1919
data: <2>
20-
username: dmFsdWUtMQ0K <3>
21-
password: dmFsdWUtMg0KDQo=
20+
username: <username> <3>
21+
password: <password>
2222
stringData: <4>
2323
hostname: myapp.mydomain.com <5>
2424
----

modules/builds-using-secrets.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ kind: Secret
4444
metadata:
4545
name: test-secret
4646
data:
47-
username: dmFsdWUtMQ0K <1>
48-
password: dmFsdWUtMQ0KDQo= <2>
47+
username: <username> <1>
48+
password: <password> <2>
4949
stringData:
5050
hostname: myapp.mydomain.com <3>
5151
secret.properties: |- <4>

modules/cluster-logging-collector-log-forward-es.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,8 +98,8 @@ kind: Secret
9898
metadata:
9999
name: openshift-test-secret
100100
data:
101-
username: dGVzdHVzZXJuYW1lCg==
102-
password: dGVzdHBhc3N3b3JkCg==
101+
username: <username>
102+
password: <password>
103103
----
104104

105105
. Create the secret:

modules/cnf-running-the-performance-creator-profile.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,8 @@ $ podman login registry.redhat.io
4141
+
4242
[source,bash]
4343
----
44-
Username: myrhusername
45-
Password: ************
44+
Username: <username>
45+
Password: <password>
4646
----
4747

4848
. Optional: Display help for the PPC tool:

modules/core-user-password.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ spec:
4242
passwd:
4343
users:
4444
- name: core <1>
45-
passwordHash: $6$2sE/010goDuRSxxv$o18K52wor.wIwZp <2>
45+
passwordHash: <password> <2>
4646
----
4747
<1> This must be `core`.
4848
<2> The hashed password to use with the `core` account.

modules/developer-cli-odo-creating-a-database-with-odo.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,9 +48,9 @@ This configuration ensures that when a database service is started, appropriate
4848
+
4949
[source,yaml]
5050
----
51-
databaseName: "sampledb"
52-
databasePassword: "samplepwd"
53-
databaseUser: "sampleuser"
51+
databaseName: "<database_name>"
52+
databasePassword: "<password>"
53+
databaseUser: "<username>"
5454
----
5555

5656
. Create a database from the YAML file:

modules/gitops-logging-into-keycloak.adoc

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -35,15 +35,15 @@ keycloak-1-2sjcl 1/1 Running 0 45m
3535
----
3636
$ oc -n argocd exec keycloak-1-2sjcl -- "env" | grep SSO_ADMIN_USERNAME
3737
38-
SSO_ADMIN_USERNAME=Cqid54Ih
38+
SSO_ADMIN_USERNAME=<username>
3939
----
4040
.. Get the Keycloak password:
4141
+
4242
[source,terminal]
4343
----
4444
$ oc -n argocd exec keycloak-1-2sjcl -- "env" | grep SSO_ADMIN_PASSWORD
4545
46-
SSO_ADMIN_PASSWORD=GVXxHifH
46+
SSO_ADMIN_PASSWORD=<password>
4747
----
4848
. On the login page, click *LOG IN VIA KEYCLOAK*.
4949
+
@@ -66,6 +66,3 @@ Login using `kubeadmin` is not supported.
6666
policy.csv:
6767
<name>, <email>, role:admin
6868
----
69-
70-
71-

0 commit comments

Comments
 (0)