Skip to content
This repository has been archived by the owner on Nov 30, 2022. It is now read-only.

Fideosps config scripts #1413

Closed
wants to merge 11 commits into from
Closed

Fideosps config scripts #1413

wants to merge 11 commits into from

Conversation

seanpreston
Copy link
Contributor

Purpose

This PR adds some configuration scripts to be run against a live Fidesops container, based on our quickstart.

Changes

Checklist

  • Update CHANGELOG.md file
    • Merge in main so the most recent CHANGELOG.md file is being appended to
    • Add description within the Unreleased section in an appropriate category. Add a new category from the list at the top of the file if the needed one isn't already there.
    • Add a link to this PR at the end of the description with the PR number as the text. example: #1
  • Applicable documentation updated (guides, quickstart, postman collections, tutorial, fidesdemo, database diagram.
  • If docs updated (select one):
    • documentation complete, or draft/outline provided (tag docs-team to complete/review on this branch)
    • documentation issue created (tag docs-team to complete issue separately)
  • Good unit test/integration test coverage
  • This PR contains a DB migration. If checked, the reviewer should confirm with the author that the down_revision correctly references the previous migration before merging
  • The Run Unsafe PR Checks label has been applied, and checks have passed, if this PR touches any external services

Ticket

Fixes #

)
else:
logger.info(
f"Created user with username: {username} and password: {password}"

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information

[Sensitive data (password)](1) is logged here.
f"fidesops email config secrets update failed! response.status_code={response.status_code}, response.json()={response.json()}"
)

logger.info(response.json()["msg"])

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information

[Sensitive data (secret)](1) is logged here. [Sensitive data (secret)](2) is logged here. [Sensitive data (secret)](3) is logged here.
f"fidesops connection test failed! response.status_code={response.status_code}, response.json()={response.json()}"
)

logger.info(f"Configured fidesops postgres connection secrets for via {url}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information

[Sensitive data (secret)](1) is logged here. [Sensitive data (secret)](2) is logged here. [Sensitive data (secret)](3) is logged here.
@seanpreston
Copy link
Contributor Author

Closing this to be merged into Fides directly.

@seanpreston seanpreston closed this Oct 3, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant