-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Druid e2e tests (I) #296
Conversation
|
GitGuardian id | Secret | Commit | Filename | |
---|---|---|---|---|
- | RSA Private Key | fdccd30 | test/e2e/resources/certs/ca.key | View secret |
- | RSA Private Key | fdccd30 | test/e2e/resources/certs/client.key | View secret |
- | RSA Private Key | fdccd30 | test/e2e/resources/certs/server.key | View secret |
- | RSA Private Key | ed35a92 | test/e2e/resources/certs/client.key | View secret |
- | RSA Private Key | ed35a92 | test/e2e/resources/certs/server.key | View secret |
- | Generic Private Key | ed35a92 | test/e2e/resources/tls/client.key | View secret |
- | Generic Private Key | ed35a92 | test/e2e/resources/tls/server.key | View secret |
- | Generic Private Key | f1f6ae2 | test/e2e/resources/tls/server.key | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secrets safely. Learn here the best practices.
- Revoke and rotate these secrets.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
Our GitHub checks need improvements? Share your feedbacks!
062e72f
to
0560f0e
Compare
/ping @gardener/etcd-druid-maintainers |
0560f0e
to
508c05d
Compare
Hi @timuthy , |
Hi @timuthy ,
|
Thanks for the feedback @ishan16696. I'll have a 👀 |
508c05d
to
350cc47
Compare
The errors have been fixed with 350cc47. PTAL @ishan16696. |
350cc47
to
87ccb8b
Compare
|
Is this #296 (comment) has been addressed now or should we create a follow-up issue to track this just to delete the orphan resources if this has been enable it in a CI pipeline? |
Yes, here it's because of the test TLS certificates and keys.
I think it's quite helpful that the cleanup does not happen when tests fail because it gives developers the opportunity to troubleshoot the system, e.g. checking the logs of etcd-druid. For the pipeline this shouldn't be a problem either because we can define a separate |
ok, make sense |
9558d52
to
6b68058
Compare
6b68058
to
f1f6ae2
Compare
As discussed @ishan16696, some improvements were required through f1f6ae2. PTAL. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overrall, looks good to me. Couple of nitpicks.
And Can you also mention in docs/development/local-e2e-tests.md
about cleaning up your existing resources of cluster-scope like CRD,clusterroles before running these e2e-tests.
Hey @timuthy ,
|
Thanks for noticing @ishan16696. Unfortunately, that was due to a left-over I forgot. It's fixed now 🙂 |
yes, now it's getting cleanup, thanks for quick fix. |
Thanks for the feedback @ishan16696 🚀 I addressed all comments. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!!
How to categorize this PR?
/area testing
/kind enhancement
What this PR does / why we need it:
This PR adds e2e tests for Etcd-Druid. It uses the foundation of #195 with additional automation.
Please see
docs/development/local-e2e-tests.md
for more information about how to run those tests.Which issue(s) this PR fixes:
Fixes #194
Fixes parts of #286
Special notes for your reviewer:
Co-authored-by: Shreyas Rao shreyas.sriganesh.rao@sap.com
ℹ️ Test machinery integration is not part of this PR and will follow as soon as the credential rotation feature is implemented in TM.
Release note:
A Helm chart for deploying Etcd-Druid is now available in `charts/druid`.