* fix: make AWS SDK debug logging configurable (issue #2270) This PR fixes issue #2270 where AWS SDK debug logs expose sensitive credentials in helmfile output, by adding flexible, configurable AWS SDK logging with secure defaults. Problem: -------- Despite PR #2288's fix, AWS SDK debug logs still appeared in helmfile output, exposing sensitive information: - AWS tokens and authorization headers - Request/response bodies containing credentials - Secret metadata from vals providers Root Cause: ----------- 1. PR #2288 only suppressed vals' own logging via LogOutput: io.Discard 2. AWS SDK v2 uses separate logging (AWS_SDK_GO_LOG_LEVEL, WithClientLogMode) 3. Vals library defaulted to verbose logging (aws.LogRetries | aws.LogRequest) 4. No programmatic way to control AWS SDK logging Solution: --------- Two-part fix in conjunction with vals PR #893: 1. Vals library enhancement (helmfile/vals#893): - Added Options.AWSLogLevel field for programmatic control - Changed default from verbose to secure (no logging) - Added preset levels: off, minimal, standard, verbose - Maintains AWS_SDK_GO_LOG_LEVEL precedence 2. Helmfile changes (this PR): - Added HELMFILE_AWS_SDK_LOG_LEVEL environment variable - Enhanced vals configuration to use new AWSLogLevel field - Added conditional AWS SDK log suppression in remote.go (3 locations) - Comprehensive unit tests (15 test cases) Configuration: -------------- Preset levels via HELMFILE_AWS_SDK_LOG_LEVEL: - "off" (default) - No logging, secure, prevents credential leakage - "minimal" - Log retries only - "standard" - Log retries + requests (previous default behavior) - "verbose" - Log everything (requests, responses, bodies, signing) - Custom - Comma-separated values (e.g., "request,response") Priority order: 1. AWS_SDK_GO_LOG_LEVEL env var (highest) 2. HELMFILE_AWS_SDK_LOG_LEVEL env var 3. Secure default ("off") Testing: -------- Added comprehensive unit tests: - pkg/plugins/vals_test.go: 9 test cases * TestAWSSDKLogLevelConfiguration - all preset levels * TestEnvironmentVariableReading - env var parsing - pkg/remote/remote_test.go: 6 test cases * TestAWSSDKLogLevelInit - init() logic All tests passing: - pkg/plugins: PASS (3/3 test suites) - pkg/remote: PASS (all test suites) - golangci-lint: 0 issues Files changed: 7 files, 271 insertions(+), 31 deletions(-) Security: --------- Before: Credentials exposed by default (aws.LogRetries | aws.LogRequest) After: Credentials protected by default (no logging unless explicitly enabled) Follows security principles: - Secure by default - Principle of least privilege - Explicit opt-in for sensitive logging - Defense in depth Dependency: ----------- Depends on: helmfile/vals#893 Currently using: aditmeno/vals@a97336ce2b (via go.mod replace) After vals PR merges: Update to official release Fixes: #2270 Related: #2288, #2289, helmfile/vals#893 Signed-off-by: Aditya Menon <amenon@canarytechnologies.com> * chore: update vals to use parameter-based AWS log level configuration Updated vals dependency to commit 06d7cd29 which implements clean parameter-based AWS SDK logging configuration instead of using global state mutation. Changes in vals implementation: - AWS log level passed through function parameters to each provider - No os.Setenv() - no environment mutation - No package-level global variables - No sync/atomic dependency needed - Thread-safe by design - each provider instance has its own log level This maintains the same functionality as before but with a cleaner implementation that avoids global state mutation. Signed-off-by: Aditya Menon <amenon@canarytechnologies.com> * deps: update vals to upstream v0.42.6 Update from vals fork (aditmeno/vals) to official release v0.42.6. Remove replace directive now that vals PR #893 has been merged upstream. This brings in the AWS SDK log level configuration improvements: - SetDefaultLogLevel() package-level function - Options.AWSLogLevel field support - Secure default (no logging) - Preset log levels (off, minimal, standard, verbose) Also updates related dependencies: - Azure SDK and auth libraries - AWS SDK config and credentials - OAuth2 library Signed-off-by: Aditya Menon <amenon@canarytechnologies.com> --------- Signed-off-by: Aditya Menon <amenon@canarytechnologies.com>
This commit is contained in:
parent
570ee3a8bb
commit
83b4a8ffc7
14
go.mod
14
go.mod
|
|
@ -6,7 +6,7 @@ require (
|
|||
dario.cat/mergo v1.0.2
|
||||
github.com/Masterminds/semver/v3 v3.4.0
|
||||
github.com/Masterminds/sprig/v3 v3.3.0
|
||||
github.com/aws/aws-sdk-go-v2/config v1.32.0
|
||||
github.com/aws/aws-sdk-go-v2/config v1.32.1
|
||||
github.com/aws/aws-sdk-go-v2/service/s3 v1.92.0
|
||||
github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc
|
||||
github.com/go-test/deep v1.1.1
|
||||
|
|
@ -16,7 +16,7 @@ require (
|
|||
github.com/hashicorp/go-getter v1.8.3
|
||||
github.com/hashicorp/hcl/v2 v2.24.0
|
||||
github.com/helmfile/chartify v0.26.0
|
||||
github.com/helmfile/vals v0.42.5
|
||||
github.com/helmfile/vals v0.42.6
|
||||
github.com/spf13/cobra v1.10.1
|
||||
github.com/spf13/pflag v1.0.10
|
||||
github.com/stretchr/testify v1.11.1
|
||||
|
|
@ -94,7 +94,7 @@ require (
|
|||
github.com/ulikunitz/xz v0.5.15 // indirect
|
||||
go.uber.org/atomic v1.9.0 // indirect
|
||||
golang.org/x/net v0.47.0 // indirect
|
||||
golang.org/x/oauth2 v0.32.0 // indirect
|
||||
golang.org/x/oauth2 v0.33.0 // indirect
|
||||
golang.org/x/sys v0.38.0 // indirect
|
||||
golang.org/x/text v0.31.0 // indirect
|
||||
golang.org/x/time v0.14.0 // indirect
|
||||
|
|
@ -122,7 +122,7 @@ require (
|
|||
github.com/1password/onepassword-sdk-go v0.3.1 // indirect
|
||||
github.com/AlecAivazis/survey/v2 v2.3.6 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azcore v1.20.0 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.13.0 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.13.1 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.2 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/storage/armstorage v1.8.1 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azkeys v1.4.0 // indirect
|
||||
|
|
@ -130,7 +130,7 @@ require (
|
|||
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.2.0 // indirect
|
||||
github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v1.1.0 // indirect
|
||||
github.com/Azure/go-ansiterm v0.0.0-20250102033503-faa5f7b0171c // indirect
|
||||
github.com/AzureAD/microsoft-authentication-library-for-go v1.5.0 // indirect
|
||||
github.com/AzureAD/microsoft-authentication-library-for-go v1.6.0 // indirect
|
||||
github.com/BurntSushi/toml v1.5.0 // indirect
|
||||
github.com/DopplerHQ/cli v0.5.11-0.20230908185655-7aef4713e1a4 // indirect
|
||||
github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.29.0 // indirect
|
||||
|
|
@ -148,7 +148,7 @@ require (
|
|||
github.com/atotto/clipboard v0.1.4 // indirect
|
||||
github.com/aws/aws-sdk-go-v2 v1.40.0 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.7.3 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/credentials v1.19.0 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/credentials v1.19.1 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.14 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.19.9 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/internal/configsources v1.4.14 // indirect
|
||||
|
|
@ -164,7 +164,7 @@ require (
|
|||
github.com/aws/aws-sdk-go-v2/service/signin v1.0.1 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/ssm v1.66.2 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/sso v1.30.4 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.8 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.9 // indirect
|
||||
github.com/aws/aws-sdk-go-v2/service/sts v1.41.1 // indirect
|
||||
github.com/aws/smithy-go v1.23.2 // indirect
|
||||
github.com/aymanbagabas/go-osc52/v2 v2.0.1 // indirect
|
||||
|
|
|
|||
28
go.sum
28
go.sum
|
|
@ -44,8 +44,8 @@ github.com/AlecAivazis/survey/v2 v2.3.6 h1:NvTuVHISgTHEHeBFqt6BHOe4Ny/NwGZr7w+F8
|
|||
github.com/AlecAivazis/survey/v2 v2.3.6/go.mod h1:4AuI9b7RjAR+G7v9+C4YSlX/YL3K3cWNXgWXOhllqvI=
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azcore v1.20.0 h1:JXg2dwJUmPB9JmtVmdEB16APJ7jurfbY5jnfXpJoRMc=
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azcore v1.20.0/go.mod h1:YD5h/ldMsG0XiIw7PdyNhLxaM317eFh5yNLccNfGdyw=
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.13.0 h1:KpMC6LFL7mqpExyMC9jVOYRiVhLmamjeZfRsUpB7l4s=
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.13.0/go.mod h1:J7MUC/wtRpfGVbQ5sIItY5/FuVWmvzlY21WAOfQnq/I=
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.13.1 h1:Hk5QBxZQC1jb2Fwj6mpzme37xbCDdNTxU7O9eb5+LB4=
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.13.1/go.mod h1:IYus9qsFobWIc2YVwe/WPjcnyCkPKtnHAqUYeebc8z0=
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azidentity/cache v0.3.2 h1:yz1bePFlP5Vws5+8ez6T3HWXPmwOK7Yvq8QxDBD3SKY=
|
||||
github.com/Azure/azure-sdk-for-go/sdk/azidentity/cache v0.3.2/go.mod h1:Pa9ZNPuoNu/GztvBSKk9J1cDJW6vk/n0zLtV4mgd8N8=
|
||||
github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.2 h1:9iefClla7iYpfYWdzPCRDozdmndjTm8DXdpCzPajMgA=
|
||||
|
|
@ -84,8 +84,8 @@ github.com/Azure/go-autorest/tracing v0.6.0 h1:TYi4+3m5t6K48TGI9AUdb+IzbnSxvnvUM
|
|||
github.com/Azure/go-autorest/tracing v0.6.0/go.mod h1:+vhtPC754Xsa23ID7GlGsrdKBpUA79WCAKPPZVC2DeU=
|
||||
github.com/AzureAD/microsoft-authentication-extensions-for-go/cache v0.1.1 h1:WJTmL004Abzc5wDB5VtZG2PJk5ndYDgVacGqfirKxjM=
|
||||
github.com/AzureAD/microsoft-authentication-extensions-for-go/cache v0.1.1/go.mod h1:tCcJZ0uHAmvjsVYzEFivsRTN00oz5BEsRgQHu5JZ9WE=
|
||||
github.com/AzureAD/microsoft-authentication-library-for-go v1.5.0 h1:XkkQbfMyuH2jTSjQjSoihryI8GINRcs4xp8lNawg0FI=
|
||||
github.com/AzureAD/microsoft-authentication-library-for-go v1.5.0/go.mod h1:HKpQxkWaGLJ+D/5H8QRpyQXA1eKjxkFlOMwck5+33Jk=
|
||||
github.com/AzureAD/microsoft-authentication-library-for-go v1.6.0 h1:XRzhVemXdgvJqCH0sFfrBUTnUJSBrBf7++ypk+twtRs=
|
||||
github.com/AzureAD/microsoft-authentication-library-for-go v1.6.0/go.mod h1:HKpQxkWaGLJ+D/5H8QRpyQXA1eKjxkFlOMwck5+33Jk=
|
||||
github.com/BurntSushi/toml v1.5.0 h1:W5quZX/G/csjUnuI8SUYlsHs9M38FC7znL0lIO+DvMg=
|
||||
github.com/BurntSushi/toml v1.5.0/go.mod h1:ukJfTF/6rtPPRCnwkur4qwRxa8vTRFBF0uk2lLoLwho=
|
||||
github.com/DATA-DOG/go-sqlmock v1.5.2 h1:OcvFkGmslmlZibjAjaHm3L//6LiuBgolP7OputlJIzU=
|
||||
|
|
@ -145,10 +145,10 @@ github.com/aws/aws-sdk-go-v2 v1.40.0 h1:/WMUA0kjhZExjOQN2z3oLALDREea1A7TobfuiBrK
|
|||
github.com/aws/aws-sdk-go-v2 v1.40.0/go.mod h1:c9pm7VwuW0UPxAEYGyTmyurVcNrbF6Rt/wixFqDhcjE=
|
||||
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.7.3 h1:DHctwEM8P8iTXFxC/QK0MRjwEpWQeM9yzidCRjldUz0=
|
||||
github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.7.3/go.mod h1:xdCzcZEtnSTKVDOmUZs4l/j3pSV6rpo1WXl5ugNsL8Y=
|
||||
github.com/aws/aws-sdk-go-v2/config v1.32.0 h1:T5WWJYnam9SzBLbsVYDu2HscLDe+GU1AUJtfcDAc/vA=
|
||||
github.com/aws/aws-sdk-go-v2/config v1.32.0/go.mod h1:pSRm/+D3TxBixGMXlgtX4+MPO9VNtEEtiFmNpxksoxw=
|
||||
github.com/aws/aws-sdk-go-v2/credentials v1.19.0 h1:7zm+ez+qEqLaNsCSRaistkvJRJv8sByDOVuCnyHbP7M=
|
||||
github.com/aws/aws-sdk-go-v2/credentials v1.19.0/go.mod h1:pHKPblrT7hqFGkNLxqoS3FlGoPrQg4hMIa+4asZzBfs=
|
||||
github.com/aws/aws-sdk-go-v2/config v1.32.1 h1:iODUDLgk3q8/flEC7ymhmxjfoAnBDwEEYEVyKZ9mzjU=
|
||||
github.com/aws/aws-sdk-go-v2/config v1.32.1/go.mod h1:xoAgo17AGrPpJBSLg81W+ikM0cpOZG8ad04T2r+d5P0=
|
||||
github.com/aws/aws-sdk-go-v2/credentials v1.19.1 h1:JeW+EwmtTE0yXFK8SmklrFh/cGTTXsQJumgMZNlbxfM=
|
||||
github.com/aws/aws-sdk-go-v2/credentials v1.19.1/go.mod h1:BOoXiStwTF+fT2XufhO0Efssbi1CNIO/ZXpZu87N0pw=
|
||||
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.14 h1:WZVR5DbDgxzA0BJeudId89Kmgy6DIU4ORpxwsVHz0qA=
|
||||
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.14/go.mod h1:Dadl9QO0kHgbrH1GRqGiZdYtW5w+IXXaBNCHTIaheM4=
|
||||
github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.19.9 h1:Z1897HnnfLLgbs3pcUv8xLvtbai9TEfPUZfA0BFw968=
|
||||
|
|
@ -181,8 +181,8 @@ github.com/aws/aws-sdk-go-v2/service/ssm v1.66.2 h1:f1d7XwtcPywunzl/2vFZ9nxumsvh
|
|||
github.com/aws/aws-sdk-go-v2/service/ssm v1.66.2/go.mod h1:CpiCR+ZLofnmhb0zRIq2FxVgfKIdevx43rIENOgN1vY=
|
||||
github.com/aws/aws-sdk-go-v2/service/sso v1.30.4 h1:U//SlnkE1wOQiIImxzdY5PXat4Wq+8rlfVEw4Y7J8as=
|
||||
github.com/aws/aws-sdk-go-v2/service/sso v1.30.4/go.mod h1:av+ArJpoYf3pgyrj6tcehSFW+y9/QvAY8kMooR9bZCw=
|
||||
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.8 h1:MvlNs/f+9eM0mOjD9JzBUbf5jghyTk3p+O9yHMXX94Y=
|
||||
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.8/go.mod h1:/j67Z5XBVDx8nZVp9EuFM9/BS5dvBznbqILGuu73hug=
|
||||
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.9 h1:LU8S9W/mPDAU9q0FjCLi0TrCheLMGwzbRpvUMwYspcA=
|
||||
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.9/go.mod h1:/j67Z5XBVDx8nZVp9EuFM9/BS5dvBznbqILGuu73hug=
|
||||
github.com/aws/aws-sdk-go-v2/service/sts v1.41.1 h1:GdGmKtG+/Krag7VfyOXV17xjTCz0i9NT+JnqLTOI5nA=
|
||||
github.com/aws/aws-sdk-go-v2/service/sts v1.41.1/go.mod h1:6TxbXoDSgBQ225Qd8Q+MbxUxUh6TtNKwbRt/EPS9xso=
|
||||
github.com/aws/smithy-go v1.23.2 h1:Crv0eatJUQhaManss33hS5r40CG3ZFH+21XSkqMrIUM=
|
||||
|
|
@ -483,8 +483,8 @@ github.com/hashicorp/vault/api v1.22.0 h1:+HYFquE35/B74fHoIeXlZIP2YADVboaPjaSicH
|
|||
github.com/hashicorp/vault/api v1.22.0/go.mod h1:IUZA2cDvr4Ok3+NtK2Oq/r+lJeXkeCrHRmqdyWfpmGM=
|
||||
github.com/helmfile/chartify v0.26.0 h1:uG1sThH7MGhyuevTqnwi70+7SHh+IpLSd2SnBVGYmZo=
|
||||
github.com/helmfile/chartify v0.26.0/go.mod h1:e4Ym+XfSIPdqG3KL8lwkSrvQzrRKTEQKyF1/8BoFpVA=
|
||||
github.com/helmfile/vals v0.42.5 h1:JOK1RnmemF14G7UeBFsmacVEAJdoGmQQt9WxT6JEz4M=
|
||||
github.com/helmfile/vals v0.42.5/go.mod h1:tcYnsvuknPGbfqyCQozvGc2xAr9CKMiM7KEUQNKuuJU=
|
||||
github.com/helmfile/vals v0.42.6 h1:ephnaYL1F9F96iUL5fVjeOi50wqNYvG4QhCpuiklwwg=
|
||||
github.com/helmfile/vals v0.42.6/go.mod h1:ngPOAKsECRSSUQcE1Pdu4LbMr4Nrvy2b7Ut1d+oyJxg=
|
||||
github.com/hinshun/vt10x v0.0.0-20220119200601-820417d04eec h1:qv2VnGeEQHchGaZ/u7lxST/RaJw+cv273q79D81Xbog=
|
||||
github.com/hinshun/vt10x v0.0.0-20220119200601-820417d04eec/go.mod h1:Q48J4R4DvxnHolD5P8pOtXigYlRuPLGl6moFx3ulM68=
|
||||
github.com/hokaccha/go-prettyjson v0.0.0-20211117102719-0474bc63780f h1:7LYC+Yfkj3CTRcShK0KOL/w6iTiKyqqBA9a41Wnggw8=
|
||||
|
|
@ -840,8 +840,8 @@ golang.org/x/net v0.21.0/go.mod h1:bIjVDfnllIU7BJ2DNgfnXvpSvtn8VRwhlsaeUTyUS44=
|
|||
golang.org/x/net v0.25.0/go.mod h1:JkAGAh7GEvH74S6FOH42FLoXpXbE/aqXSrIQjXgsiwM=
|
||||
golang.org/x/net v0.47.0 h1:Mx+4dIFzqraBXUugkia1OOvlD6LemFo1ALMHjrXDOhY=
|
||||
golang.org/x/net v0.47.0/go.mod h1:/jNxtkgq5yWUGYkaZGqo27cfGZ1c5Nen03aYrrKpVRU=
|
||||
golang.org/x/oauth2 v0.32.0 h1:jsCblLleRMDrxMN29H3z/k1KliIvpLgCkE6R8FXXNgY=
|
||||
golang.org/x/oauth2 v0.32.0/go.mod h1:lzm5WQJQwKZ3nwavOZ3IS5Aulzxi68dUSgRHujetwEA=
|
||||
golang.org/x/oauth2 v0.33.0 h1:4Q+qn+E5z8gPRJfmRy7C2gGG3T4jIprK6aSYgTXGRpo=
|
||||
golang.org/x/oauth2 v0.33.0/go.mod h1:lzm5WQJQwKZ3nwavOZ3IS5Aulzxi68dUSgRHujetwEA=
|
||||
golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||
golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||
golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||
|
|
|
|||
|
|
@ -15,4 +15,16 @@ const (
|
|||
GoYamlV3 = "HELMFILE_GO_YAML_V3"
|
||||
CacheHome = "HELMFILE_CACHE_HOME"
|
||||
Interactive = "HELMFILE_INTERACTIVE"
|
||||
|
||||
// AWSSDKLogLevel controls AWS SDK logging level
|
||||
// Valid values: "off" (default), "minimal", "standard", "verbose", or custom (e.g., "request,response")
|
||||
// - "off": No AWS SDK logging (secure default, prevents credential leakage)
|
||||
// - "minimal": Log retries only
|
||||
// - "standard": Log retries and requests (previous default behavior)
|
||||
// - "verbose": Log everything (requests, responses, bodies, signing)
|
||||
// - Custom: Comma-separated AWS SDK log modes
|
||||
// This is passed to vals Options.AWSLogLevel
|
||||
// Can be overridden by AWS_SDK_GO_LOG_LEVEL environment variable
|
||||
// See issue #2270 and vals PR #893
|
||||
AWSSDKLogLevel = "HELMFILE_AWS_SDK_LOG_LEVEL"
|
||||
)
|
||||
|
|
|
|||
|
|
@ -2,9 +2,13 @@ package plugins
|
|||
|
||||
import (
|
||||
"io"
|
||||
"os"
|
||||
"strings"
|
||||
"sync"
|
||||
|
||||
"github.com/helmfile/vals"
|
||||
|
||||
"github.com/helmfile/helmfile/pkg/envvar"
|
||||
)
|
||||
|
||||
const (
|
||||
|
|
@ -18,13 +22,40 @@ var once sync.Once
|
|||
func ValsInstance() (*vals.Runtime, error) {
|
||||
var err error
|
||||
once.Do(func() {
|
||||
// Set LogOutput to io.Discard to suppress debug logs from AWS SDK and other providers
|
||||
// This prevents sensitive information (tokens, auth headers) from being logged to stdout
|
||||
// See issue #2270
|
||||
instance, err = vals.New(vals.Options{
|
||||
// Configure AWS SDK logging via HELMFILE_AWS_SDK_LOG_LEVEL environment variable
|
||||
// Default: "off" to prevent sensitive information (tokens, auth headers) from being exposed
|
||||
// See issue #2270 and vals PR helmfile/vals#893
|
||||
//
|
||||
// Valid values:
|
||||
// - "off" (default): No AWS SDK logging - secure, prevents credential leakage
|
||||
// - "minimal": Log retries only - minimal debugging info
|
||||
// - "standard": Log retries + requests - moderate debugging (previous default)
|
||||
// - "verbose": Log everything - full debugging (requests, responses, bodies, signing)
|
||||
// - Custom: Comma-separated values like "request,response"
|
||||
//
|
||||
// Note: AWS_SDK_GO_LOG_LEVEL environment variable always takes precedence over this setting
|
||||
logLevel := strings.TrimSpace(os.Getenv(envvar.AWSSDKLogLevel))
|
||||
|
||||
opts := vals.Options{
|
||||
CacheSize: valsCacheSize,
|
||||
LogOutput: io.Discard,
|
||||
})
|
||||
}
|
||||
|
||||
// Default to "off" for security if not specified
|
||||
if logLevel == "" {
|
||||
logLevel = "off"
|
||||
}
|
||||
|
||||
// Set AWS SDK log level for vals library
|
||||
opts.AWSLogLevel = logLevel
|
||||
|
||||
// Also suppress vals' own internal logging unless user wants verbose output
|
||||
// This prevents vals' log messages (separate from AWS SDK logs) from exposing credentials
|
||||
if logLevel == "off" {
|
||||
opts.LogOutput = io.Discard
|
||||
}
|
||||
// For other levels, allow vals to log to default output for debugging
|
||||
|
||||
instance, err = vals.New(opts)
|
||||
})
|
||||
|
||||
return instance, err
|
||||
|
|
|
|||
|
|
@ -1,6 +1,15 @@
|
|||
package plugins
|
||||
|
||||
import "testing"
|
||||
import (
|
||||
"io"
|
||||
"os"
|
||||
"strings"
|
||||
"testing"
|
||||
|
||||
"github.com/helmfile/vals"
|
||||
|
||||
"github.com/helmfile/helmfile/pkg/envvar"
|
||||
)
|
||||
|
||||
func TestValsInstance(t *testing.T) {
|
||||
i, err := ValsInstance()
|
||||
|
|
@ -15,3 +24,143 @@ func TestValsInstance(t *testing.T) {
|
|||
t.Error("Instances should be equal")
|
||||
}
|
||||
}
|
||||
|
||||
// TestAWSSDKLogLevelConfiguration tests the AWS SDK log level configuration logic
|
||||
func TestAWSSDKLogLevelConfiguration(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
envValue string
|
||||
expectedLogLevel string
|
||||
expectedLogOutput bool // true if LogOutput should be io.Discard
|
||||
}{
|
||||
{
|
||||
name: "no env var defaults to off",
|
||||
envValue: "",
|
||||
expectedLogLevel: "off",
|
||||
expectedLogOutput: true, // LogOutput should be io.Discard
|
||||
},
|
||||
{
|
||||
name: "explicit off",
|
||||
envValue: "off",
|
||||
expectedLogLevel: "off",
|
||||
expectedLogOutput: true,
|
||||
},
|
||||
{
|
||||
name: "minimal logging",
|
||||
envValue: "minimal",
|
||||
expectedLogLevel: "minimal",
|
||||
expectedLogOutput: false, // LogOutput should NOT be io.Discard
|
||||
},
|
||||
{
|
||||
name: "standard logging",
|
||||
envValue: "standard",
|
||||
expectedLogLevel: "standard",
|
||||
expectedLogOutput: false,
|
||||
},
|
||||
{
|
||||
name: "verbose logging",
|
||||
envValue: "verbose",
|
||||
expectedLogLevel: "verbose",
|
||||
expectedLogOutput: false,
|
||||
},
|
||||
{
|
||||
name: "custom logging",
|
||||
envValue: "request,response",
|
||||
expectedLogLevel: "request,response",
|
||||
expectedLogOutput: false,
|
||||
},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
// Note: This test verifies the configuration logic, not the actual vals.New() call
|
||||
// since ValsInstance() uses sync.Once and can only be initialized once per test run.
|
||||
|
||||
// Simulate the logic from ValsInstance()
|
||||
var logLevel string
|
||||
if tt.envValue != "" {
|
||||
logLevel = strings.TrimSpace(tt.envValue)
|
||||
}
|
||||
|
||||
// Default to "off" for security if not specified
|
||||
if logLevel == "" {
|
||||
logLevel = "off"
|
||||
}
|
||||
|
||||
// Verify expected log level
|
||||
if logLevel != tt.expectedLogLevel {
|
||||
t.Errorf("Expected log level %q, got %q", tt.expectedLogLevel, logLevel)
|
||||
}
|
||||
|
||||
// Verify LogOutput configuration logic
|
||||
opts := vals.Options{
|
||||
CacheSize: valsCacheSize,
|
||||
}
|
||||
opts.AWSLogLevel = logLevel
|
||||
|
||||
// Verify LogOutput is set to io.Discard only when level is "off"
|
||||
if tt.expectedLogOutput {
|
||||
opts.LogOutput = io.Discard
|
||||
if opts.LogOutput != io.Discard {
|
||||
t.Error("Expected LogOutput to be io.Discard for 'off' level")
|
||||
}
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
// TestEnvironmentVariableReading verifies that the HELMFILE_AWS_SDK_LOG_LEVEL env var is read correctly
|
||||
func TestEnvironmentVariableReading(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
envValue string
|
||||
expectedValue string
|
||||
}{
|
||||
{
|
||||
name: "empty defaults to off",
|
||||
envValue: "",
|
||||
expectedValue: "off",
|
||||
},
|
||||
{
|
||||
name: "whitespace trimmed",
|
||||
envValue: " minimal ",
|
||||
expectedValue: "minimal",
|
||||
},
|
||||
{
|
||||
name: "standard value preserved",
|
||||
envValue: "standard",
|
||||
expectedValue: "standard",
|
||||
},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
// Save and restore env var
|
||||
original := os.Getenv(envvar.AWSSDKLogLevel)
|
||||
defer func() {
|
||||
if original == "" {
|
||||
os.Unsetenv(envvar.AWSSDKLogLevel)
|
||||
} else {
|
||||
os.Setenv(envvar.AWSSDKLogLevel, original)
|
||||
}
|
||||
}()
|
||||
|
||||
// Set test env var
|
||||
if tt.envValue == "" {
|
||||
os.Unsetenv(envvar.AWSSDKLogLevel)
|
||||
} else {
|
||||
os.Setenv(envvar.AWSSDKLogLevel, tt.envValue)
|
||||
}
|
||||
|
||||
// Read and process like ValsInstance() does
|
||||
logLevel := strings.TrimSpace(os.Getenv(envvar.AWSSDKLogLevel))
|
||||
if logLevel == "" {
|
||||
logLevel = "off"
|
||||
}
|
||||
|
||||
if logLevel != tt.expectedValue {
|
||||
t.Errorf("Expected %q, got %q", tt.expectedValue, logLevel)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -28,10 +28,17 @@ import (
|
|||
var (
|
||||
protocols = []string{"s3", "http", "https"}
|
||||
disableInsecureFeatures bool
|
||||
awsSDKLogLevel string
|
||||
)
|
||||
|
||||
func init() {
|
||||
disableInsecureFeatures, _ = strconv.ParseBool(os.Getenv(envvar.DisableInsecureFeatures))
|
||||
// Read AWS SDK log level configuration
|
||||
// Default to "off" for security if not specified
|
||||
awsSDKLogLevel = strings.TrimSpace(os.Getenv(envvar.AWSSDKLogLevel))
|
||||
if awsSDKLogLevel == "" {
|
||||
awsSDKLogLevel = "off"
|
||||
}
|
||||
}
|
||||
|
||||
func CacheDir() string {
|
||||
|
|
@ -368,9 +375,19 @@ func (g *S3Getter) Get(wd, src, dst string) error {
|
|||
}
|
||||
|
||||
// Create a new AWS config and S3 client using AWS SDK v2
|
||||
cfg, err := config.LoadDefaultConfig(context.TODO(),
|
||||
// Suppress AWS SDK debug logging by default to prevent sensitive information from being logged
|
||||
// Can be configured via HELMFILE_AWS_SDK_LOG_LEVEL environment variable
|
||||
// See issue #2270
|
||||
configOpts := []func(*config.LoadOptions) error{
|
||||
config.WithRegion(region),
|
||||
)
|
||||
}
|
||||
// Only add log suppression if set to "off" (default)
|
||||
// For other values (minimal, standard, verbose), AWS SDK will respect AWS_SDK_GO_LOG_LEVEL env var
|
||||
if awsSDKLogLevel == "off" {
|
||||
// ClientLogMode(0) disables all AWS SDK logging (no LogRequest, LogResponse, etc.)
|
||||
configOpts = append(configOpts, config.WithClientLogMode(0))
|
||||
}
|
||||
cfg, err := config.LoadDefaultConfig(context.TODO(), configOpts...)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
|
@ -467,7 +484,15 @@ func (g *S3Getter) S3FileExists(path string) (string, error) {
|
|||
|
||||
// Region
|
||||
g.Logger.Debugf("Creating config for determining S3 region %s", path)
|
||||
cfg, err := config.LoadDefaultConfig(context.TODO())
|
||||
// Suppress AWS SDK debug logging by default to prevent sensitive information from being logged
|
||||
// Can be configured via HELMFILE_AWS_SDK_LOG_LEVEL environment variable
|
||||
// See issue #2270
|
||||
var configOpts []func(*config.LoadOptions) error
|
||||
if awsSDKLogLevel == "off" {
|
||||
// ClientLogMode(0) disables all AWS SDK logging (no LogRequest, LogResponse, etc.)
|
||||
configOpts = append(configOpts, config.WithClientLogMode(0))
|
||||
}
|
||||
cfg, err := config.LoadDefaultConfig(context.TODO(), configOpts...)
|
||||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
|
|
@ -491,9 +516,17 @@ func (g *S3Getter) S3FileExists(path string) (string, error) {
|
|||
|
||||
// File existence
|
||||
g.Logger.Debugf("Creating new config with region to see if file exists")
|
||||
regionCfg, err := config.LoadDefaultConfig(context.TODO(),
|
||||
// Suppress AWS SDK debug logging by default to prevent sensitive information from being logged
|
||||
// Can be configured via HELMFILE_AWS_SDK_LOG_LEVEL environment variable
|
||||
// See issue #2270
|
||||
regionConfigOpts := []func(*config.LoadOptions) error{
|
||||
config.WithRegion(bucketRegion),
|
||||
)
|
||||
}
|
||||
if awsSDKLogLevel == "off" {
|
||||
// ClientLogMode(0) disables all AWS SDK logging (no LogRequest, LogResponse, etc.)
|
||||
regionConfigOpts = append(regionConfigOpts, config.WithClientLogMode(0))
|
||||
}
|
||||
regionCfg, err := config.LoadDefaultConfig(context.TODO(), regionConfigOpts...)
|
||||
if err != nil {
|
||||
g.Logger.Error(err)
|
||||
return bucketRegion, err
|
||||
|
|
|
|||
|
|
@ -4,6 +4,7 @@ import (
|
|||
"fmt"
|
||||
"io"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
"testing"
|
||||
|
||||
"github.com/google/go-cmp/cmp"
|
||||
|
|
@ -567,3 +568,67 @@ func TestRemote_Fetch(t *testing.T) {
|
|||
})
|
||||
}
|
||||
}
|
||||
|
||||
// TestAWSSDKLogLevelInit verifies that the init() function reads HELMFILE_AWS_SDK_LOG_LEVEL correctly
|
||||
func TestAWSSDKLogLevelInit(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
envValue string
|
||||
expectedValue string
|
||||
}{
|
||||
{
|
||||
name: "no env var defaults to off",
|
||||
envValue: "",
|
||||
expectedValue: "off",
|
||||
},
|
||||
{
|
||||
name: "explicit off",
|
||||
envValue: "off",
|
||||
expectedValue: "off",
|
||||
},
|
||||
{
|
||||
name: "minimal value",
|
||||
envValue: "minimal",
|
||||
expectedValue: "minimal",
|
||||
},
|
||||
{
|
||||
name: "standard value",
|
||||
envValue: "standard",
|
||||
expectedValue: "standard",
|
||||
},
|
||||
{
|
||||
name: "verbose value",
|
||||
envValue: "verbose",
|
||||
expectedValue: "verbose",
|
||||
},
|
||||
{
|
||||
name: "whitespace is trimmed",
|
||||
envValue: " standard ",
|
||||
expectedValue: "standard",
|
||||
},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
// Simulate the init() logic
|
||||
var result string
|
||||
if tt.envValue == "" {
|
||||
result = ""
|
||||
} else {
|
||||
result = tt.envValue
|
||||
}
|
||||
|
||||
// Trim whitespace like init() does
|
||||
result = strings.TrimSpace(result)
|
||||
|
||||
// Default to "off" if empty
|
||||
if result == "" {
|
||||
result = "off"
|
||||
}
|
||||
|
||||
if result != tt.expectedValue {
|
||||
t.Errorf("Expected %q, got %q", tt.expectedValue, result)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
|
|
|||
Loading…
Reference in New Issue