-
Notifications
You must be signed in to change notification settings - Fork 26
[DPE-2838] Secret labels #270
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
if scope not in [APP_SCOPE, UNIT_SCOPE]: | ||
raise RuntimeError("Unknown secret scope.") | ||
if not content.get(secret_key) or content[secret_key] == SECRET_DELETED_LABEL: | ||
logger.error(f"Non-existing secret {scope}:{key} was attempted to be removed.") |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information
try: | ||
self._peer_data(scope).pop(key) | ||
except KeyError: | ||
logger.error(f"Non-existing secret {scope}:{key} was attempted to be removed.") |
Check failure
Code scanning / CodeQL
Clear-text logging of sensitive information
3cf8a80
to
d33402f
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❤️ ❤️ ❤️
Thank U so much @dragomirp 4 this one!!!!!!!!!!!!!!!
(And all your help provided on mine :-) )
* Secret labels * Missing arg * Pop the right databag * Copy over safe secret get
Port of canonical/postgresql-k8s-operator#303 for VM