Security: Sanitize test scripts for Open Source packages #101
Labels
No labels
apache
api
api-contract
api-gateway
authentication
automation
breaking-change
comments
component/deployment
component/documentation
component/service-management
configuration
contact-form
coordination/cross-repo
coordination/needed
core
deployment
development
development-ready
digital-sovereignty
distribution
effort
large
effort
medium
effort
small
enhancement
frontend
furt-service
furt/gateway
furt/installation
gateway
gateway-integration
generator
gitea-testing
health-check
help-wanted
hugo
hugo-integration
infrastructure
installation
logging
low-tech
mail
meta
meta/duplicate
meta/planning
meta/wontfix
monitoring
observability
openapi
organization
packaging
performance
planning
platform/linux
priority
high
priority
low
priority
medium
production
question
sagjan
security
service
service-analytics
service-development
service-formular2mail
service-newsletter
service-request
service-sagjan
session
blocker
session
handover
session
next
shortcode
specs
ssl
status
blocked
status
done
status
in-progress
status
review
status
to-go
systemd
testing
tooling
type
admin
type
bug
type
config
type
deployment
type
docs
type
enhancement
type
feature
type
handover
type
infrastructure
type
installation
type
maintenance
type
migration
type/refactor
type
research
type
security
type/testing
v0.1.0
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: DAW/furt#101
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Security Issue: Test-Scripts enthalten interne DAW-Infrastruktur-Details
Problem: Test-Scripts in furt-Packages enthalten interne DAW-Infrastruktur-Details die nicht für End-User bestimmt sind.
Gefundene interne Details:
Mail-Server:
mail.dragons-at-work.de→ solltemail.example.comseinmichael@dragons-at-work.de→ sollteadmin@example.comseinnoreply@dragons-at-work.de→ solltenoreply@example.comseinAPI-Endpoints:
api.dragons-at-work.de→ sollteapi.example.comseinsmida.dragons-at-work.de→ solltegit.example.comseinTest-API-Keys mit internen Patterns:
hugo-dev-key-change-in-production→ sollteYOUR_API_KEY_HEREseinadmin-dev-key-change-in-production→ sollteYOUR_ADMIN_KEY_HEREseinBetroffene Dateien (aus Security-Audit):
Kritisch:
scripts/setup_env.sh- SMTP-Config mit dragons-at-work.descripts/production_test_sequence.sh- Production-API-Testsscripts/test_smtp.sh- Mail-Server-Testsscripts/manual_mail_test.sh- Manual-TestsMedium:
scripts/test_auth.sh- API-Key-Testsscripts/test_modular.sh- API-Testsscripts/stress_test.sh- Load-TestsLösungsansatz:
File-by-File Sanitization (nicht Exclusion - Tests sind wertvoll für Entwickler):
Domain-Sanitization:
E-Mail-Sanitization:
API-Key-Sanitization:
Why Tests bleiben sollten:
Implementation Tasks:
scripts/setup_env.shsanitizen - Mail-Configscripts/production_test_sequence.shsanitizen - API-Testsscripts/test_smtp.shsanitizen - SMTP-Testsscripts/manual_mail_test.shsanitizen - Manual-Testsscripts/test_auth.shsanitizen - Auth-Testsscripts/test_modular.shsanitizen - Modular-Testsscripts/stress_test.shsanitizen - Load-TestsSuccess Criteria:
Priority: Medium (nach Package-Distribution-Setup)
Effort: Small-Medium (7 Dateien sanitizen + testen)
Type: security, packaging
Security Sanitization Complete
Status: All internal DAW infrastructure details successfully removed from open source package.
Files Removed:
Files Sanitized:
Testing: All test scripts remain functional with example domains.
Security Impact: Zero internal infrastructure exposure in open source packages.
Branch: security/sanitize-test-scripts merged to main and cleaned up.
Package ready for distribution without security concerns.