-
Notifications
You must be signed in to change notification settings - Fork 712
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #3571 from weaveworks/implement-report-censorship
Conditional report censoring
- Loading branch information
Showing
13 changed files
with
536 additions
and
9 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
package detailed | ||
|
||
import ( | ||
"github.com/weaveworks/scope/report" | ||
) | ||
|
||
func censorNodeSummary(s NodeSummary, cfg report.CensorConfig) NodeSummary { | ||
if cfg.HideCommandLineArguments && s.Metadata != nil { | ||
// Iterate through all the metadata rows and strip the | ||
// arguments from all the values containing a command | ||
// (while making sure everything is done in a non-mutable way). | ||
metadata := []report.MetadataRow{} | ||
for _, row := range s.Metadata { | ||
if report.IsCommandEntry(row.ID) { | ||
row.Value = report.StripCommandArgs(row.Value) | ||
} | ||
metadata = append(metadata, row) | ||
} | ||
s.Metadata = metadata | ||
} | ||
if cfg.HideEnvironmentVariables && s.Tables != nil { | ||
// Copy across all the tables except the environment | ||
// variable ones (ensuring the operation is non-mutable). | ||
tables := []report.Table{} | ||
for _, table := range s.Tables { | ||
if !report.IsEnvironmentVarsEntry(table.ID) { | ||
tables = append(tables, table) | ||
} | ||
} | ||
s.Tables = tables | ||
} | ||
return s | ||
} | ||
|
||
// CensorNode removes any sensitive data from a node. | ||
func CensorNode(node Node, cfg report.CensorConfig) Node { | ||
node.NodeSummary = censorNodeSummary(node.NodeSummary, cfg) | ||
return node | ||
} | ||
|
||
// CensorNodeSummaries removes any sensitive data from a list of node summaries. | ||
func CensorNodeSummaries(summaries NodeSummaries, cfg report.CensorConfig) NodeSummaries { | ||
censored := NodeSummaries{} | ||
for key := range summaries { | ||
censored[key] = censorNodeSummary(summaries[key], cfg) | ||
} | ||
return censored | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,228 @@ | ||
package detailed_test | ||
|
||
import ( | ||
"reflect" | ||
"testing" | ||
|
||
"github.com/weaveworks/common/test" | ||
"github.com/weaveworks/scope/render/detailed" | ||
"github.com/weaveworks/scope/report" | ||
) | ||
|
||
func TestCensorNode(t *testing.T) { | ||
node := detailed.Node{ | ||
NodeSummary: detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "cmdline", Label: "Command", Value: "prog -a --b=c"}, | ||
}, | ||
Tables: []report.Table{ | ||
{ID: "blibli", Rows: []report.Row{{ID: "bli"}}}, | ||
{ID: "docker_env_", Rows: []report.Row{{ID: "env_var"}}}, | ||
}, | ||
}, | ||
} | ||
|
||
for _, c := range []struct { | ||
label string | ||
have, want detailed.Node | ||
}{ | ||
{ | ||
label: "no censoring", | ||
have: detailed.CensorNode(node, report.CensorConfig{ | ||
HideCommandLineArguments: false, | ||
HideEnvironmentVariables: false, | ||
}), | ||
want: detailed.Node{ | ||
NodeSummary: detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "cmdline", Label: "Command", Value: "prog -a --b=c"}, | ||
}, | ||
Tables: []report.Table{ | ||
{ID: "blibli", Rows: []report.Row{{ID: "bli"}}}, | ||
{ID: "docker_env_", Rows: []report.Row{{ID: "env_var"}}}, | ||
}, | ||
}, | ||
}, | ||
}, | ||
{ | ||
label: "censor only command line args", | ||
have: detailed.CensorNode(node, report.CensorConfig{ | ||
HideCommandLineArguments: true, | ||
HideEnvironmentVariables: false, | ||
}), | ||
want: detailed.Node{ | ||
NodeSummary: detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "cmdline", Label: "Command", Value: "prog"}, | ||
}, | ||
Tables: []report.Table{ | ||
{ID: "blibli", Rows: []report.Row{{ID: "bli"}}}, | ||
{ID: "docker_env_", Rows: []report.Row{{ID: "env_var"}}}, | ||
}, | ||
}, | ||
}, | ||
}, | ||
{ | ||
label: "censor only env variables", | ||
have: detailed.CensorNode(node, report.CensorConfig{ | ||
HideCommandLineArguments: false, | ||
HideEnvironmentVariables: true, | ||
}), | ||
want: detailed.Node{ | ||
NodeSummary: detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "cmdline", Label: "Command", Value: "prog -a --b=c"}, | ||
}, | ||
Tables: []report.Table{ | ||
{ID: "blibli", Rows: []report.Row{{ID: "bli"}}}, | ||
}, | ||
}, | ||
}, | ||
}, | ||
{ | ||
label: "censor both command line args and env vars", | ||
have: detailed.CensorNode(node, report.CensorConfig{ | ||
HideCommandLineArguments: true, | ||
HideEnvironmentVariables: true, | ||
}), | ||
want: detailed.Node{ | ||
NodeSummary: detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "cmdline", Label: "Command", Value: "prog"}, | ||
}, | ||
Tables: []report.Table{ | ||
{ID: "blibli", Rows: []report.Row{{ID: "bli"}}}, | ||
}, | ||
}, | ||
}, | ||
}, | ||
} { | ||
if !reflect.DeepEqual(c.want, c.have) { | ||
t.Errorf("%s - %s", c.label, test.Diff(c.want, c.have)) | ||
} | ||
} | ||
} | ||
|
||
func TestCensorNodeSummaries(t *testing.T) { | ||
summaries := detailed.NodeSummaries{ | ||
"a": detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "blublu", Label: "blabla", Value: "blu blu"}, | ||
{ID: "docker_container_command", Label: "Command", Value: "scope --token=blibli"}, | ||
}, | ||
}, | ||
"b": detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "cmdline", Label: "Command", Value: "prog -a --b=c"}, | ||
}, | ||
Tables: []report.Table{ | ||
{ID: "blibli", Rows: []report.Row{{ID: "bli"}}}, | ||
{ID: "docker_env_", Rows: []report.Row{{ID: "env_var"}}}, | ||
}, | ||
}, | ||
} | ||
|
||
for _, c := range []struct { | ||
label string | ||
have, want detailed.NodeSummaries | ||
}{ | ||
{ | ||
label: "no censoring", | ||
have: detailed.CensorNodeSummaries(summaries, report.CensorConfig{ | ||
HideCommandLineArguments: false, | ||
HideEnvironmentVariables: false, | ||
}), | ||
want: detailed.NodeSummaries{ | ||
"a": detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "blublu", Label: "blabla", Value: "blu blu"}, | ||
{ID: "docker_container_command", Label: "Command", Value: "scope --token=blibli"}, | ||
}, | ||
}, | ||
"b": detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "cmdline", Label: "Command", Value: "prog -a --b=c"}, | ||
}, | ||
Tables: []report.Table{ | ||
{ID: "blibli", Rows: []report.Row{{ID: "bli"}}}, | ||
{ID: "docker_env_", Rows: []report.Row{{ID: "env_var"}}}, | ||
}, | ||
}, | ||
}, | ||
}, | ||
{ | ||
label: "censor only command line args", | ||
have: detailed.CensorNodeSummaries(summaries, report.CensorConfig{ | ||
HideCommandLineArguments: true, | ||
HideEnvironmentVariables: false, | ||
}), | ||
want: detailed.NodeSummaries{ | ||
"a": detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "blublu", Label: "blabla", Value: "blu blu"}, | ||
{ID: "docker_container_command", Label: "Command", Value: "scope"}, | ||
}, | ||
}, | ||
"b": detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "cmdline", Label: "Command", Value: "prog"}, | ||
}, | ||
Tables: []report.Table{ | ||
{ID: "blibli", Rows: []report.Row{{ID: "bli"}}}, | ||
{ID: "docker_env_", Rows: []report.Row{{ID: "env_var"}}}, | ||
}, | ||
}, | ||
}, | ||
}, | ||
{ | ||
label: "censor only env variables", | ||
have: detailed.CensorNodeSummaries(summaries, report.CensorConfig{ | ||
HideCommandLineArguments: false, | ||
HideEnvironmentVariables: true, | ||
}), | ||
want: detailed.NodeSummaries{ | ||
"a": detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "blublu", Label: "blabla", Value: "blu blu"}, | ||
{ID: "docker_container_command", Label: "Command", Value: "scope --token=blibli"}, | ||
}, | ||
}, | ||
"b": detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "cmdline", Label: "Command", Value: "prog -a --b=c"}, | ||
}, | ||
Tables: []report.Table{ | ||
{ID: "blibli", Rows: []report.Row{{ID: "bli"}}}, | ||
}, | ||
}, | ||
}, | ||
}, | ||
{ | ||
label: "censor both command line args and env vars", | ||
have: detailed.CensorNodeSummaries(summaries, report.CensorConfig{ | ||
HideCommandLineArguments: true, | ||
HideEnvironmentVariables: true, | ||
}), | ||
want: detailed.NodeSummaries{ | ||
"a": detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "blublu", Label: "blabla", Value: "blu blu"}, | ||
{ID: "docker_container_command", Label: "Command", Value: "scope"}, | ||
}, | ||
}, | ||
"b": detailed.NodeSummary{ | ||
Metadata: []report.MetadataRow{ | ||
{ID: "cmdline", Label: "Command", Value: "prog"}, | ||
}, | ||
Tables: []report.Table{ | ||
{ID: "blibli", Rows: []report.Row{{ID: "bli"}}}, | ||
}, | ||
}, | ||
}, | ||
}, | ||
} { | ||
if !reflect.DeepEqual(c.want, c.have) { | ||
t.Errorf("%s - %s", c.label, test.Diff(c.want, c.have)) | ||
} | ||
} | ||
} |
Oops, something went wrong.