Page MenuHomePhabricator

Improve awareness of sensitive content in helmfile output
Open, Needs TriagePublic

Description

I added a warning to the Kubernetes/Deployments wikitech page.

But maybe we could also consider a small shell script that provides a warning and a prompt on the server before calling helmfile, so e.g. we'd tell people to run a script called wm-helmfile:

$ wm-helmfile -e eqiad -i apply --context 5
$ NOTE: The output of this command can contain sensitive information like usernames and API keys. Use caution when sharing its output. Continue? (y/n)
$ {helmfile is invoked with arguments}

Other ideas to warn/notify people in context of the command they are running?

The context for this task is T332598.

Event Timeline

I don't know the specific context here, but, I want to add that it is possible to wrap a command under the same name. Typically this is done by referencing the full path of the provisioned and executable from another shell PATH entry that has higher more local precedence.

Reasons to avoid this include if the modification in question is interactive and non-optional in ways that would break automated use. I don't know if that's the case here. (Eg when piped or otherwise scripted.) it's usually possible to detect whether one is in an interactive shell and then behave the same as normal etc.