Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[engsys] add a document about credscan #20272

Merged
merged 1 commit into from
Feb 10, 2022

Conversation

jeremymeng
Copy link
Member

@jeremymeng jeremymeng commented Feb 9, 2022

Add a doc on our CredScan process and how to resolve warnings.

Fixes Azure/azure-sdk-tools#2630

@jeremymeng
Copy link
Member Author

This is adopted from the python one.

@check-enforcer
Copy link

check-enforcer bot commented Feb 9, 2022

This pull request is protected by Check Enforcer.

What is Check Enforcer?

Check Enforcer helps ensure all pull requests are covered by at least one check-run (typically an Azure Pipeline). When all check-runs associated with this pull request pass then Check Enforcer itself will pass.

Why am I getting this message?

You are getting this message because Check Enforcer did not detect any check-runs being associated with this pull request within five minutes. This may indicate that your pull request is not covered by any pipelines and so Check Enforcer is correctly blocking the pull request being merged.

What should I do now?

If the check-enforcer check-run is not passing and all other check-runs associated with this PR are passing (excluding license-cla) then you could try telling Check Enforcer to evaluate your pull request again. You can do this by adding a comment to this pull request as follows:
/check-enforcer evaluate
Typically evaulation only takes a few seconds. If you know that your pull request is not covered by a pipeline and this is expected you can override Check Enforcer using the following command:
/check-enforcer override
Note that using the override command triggers alerts so that follow-up investigations can occur (PRs still need to be approved as normal).

What if I am onboarding a new service?

Often, new services do not have validation pipelines associated with them, in order to bootstrap pipelines for a new service, you can issue the following command as a pull request comment:
/azp run prepare-pipelines
This will run a pipeline that analyzes the source tree and creates the pipelines necessary to build and validate your pull request. Once the pipeline has been created you can trigger the pipeline using the following comment:
/azp run js - [service] - ci

Comment on lines +37 to +38
If CredScan discovers an actual credential, please contact the EngSys team at azuresdkengsysteam@microsoft.com so any
remediation can be done.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also, add regarding re-recording if the true positive is from a test recording if it applies?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We will enable this in PR validation soon. The recordings will be blocked too so I don't want to special case it in this document.

Copy link
Member

@maorleger maorleger left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚀 looks great! I had a general question about where these docs should live but not at all related to this PR

@@ -0,0 +1,67 @@
# Guide for monitoring CredScan checks
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not at all for this PR but I notice we now go back and forth between our GH wiki and our documentation folder...

I almost prefer everything live in the documentation folder as .md files because it's easier to submit and review changes. Should we standardize on one or the other?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A good topic to discuss in team meeting? Yes, committed files make reviewing easier. Wiki allows quick turnaround that doesn't need a lot of reviews I guess.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good idea, I added to the agenda

Credential warnings are suppressed in [eng/CredScanSuppression.json][suppression_file]. Suppressed string values are in
the `"placeholder"` list, and suppressed files are in the `"file"` list under `"suppressions"`.

If you have a fake credential flagged by CredScan, try one of the following (listed from most to least preferable):
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

😍

@jeremymeng jeremymeng enabled auto-merge (squash) February 10, 2022 18:16
@jeremymeng
Copy link
Member Author

check enforcer is stuck not doing anything. overriding...

@jeremymeng
Copy link
Member Author

/check-enforcer override

@jeremymeng jeremymeng merged commit 554e1a2 into Azure:main Feb 10, 2022
@jeremymeng jeremymeng deleted the engsys/credscan-guideline branch February 10, 2022 18:17
azure-sdk pushed a commit to azure-sdk/azure-sdk-for-js that referenced this pull request Oct 19, 2022
Add 2022-08-01-preview version to Microsoft.SignalRService/SignalR (Azure#20272)

* Adds base for updating Microsoft.SignalRService from version stable/2022-02-01 to version 2022-08-01-preview

* Update readme.md

* Update swagger and examples

* Updates

* revert adding 200 response code to put custom domain
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Have guidance on credscan failure for JS
5 participants