A lot of software has the ability to email users. When developing software it’s often useful to be able to test systems end to end by actually sending emails. This has the pitfall that emails can be accidentally sent from a staging or development environment to a real user, or even worst an entire user base. You want to avoid this at all costs unless you’re a fan of EDD: Embarrassment Driven Development.
In order to avoid this embarrassment many people disable email sending in all environments except production. The compromise here is the system is only ever fully testable in production.
GDPR states that we shouldn’t have Personally Identifiable Information in development environments. Anonymising email addresses not only keeps the GDPR Police happy but avoids the danger of emailing users by mistake. The following SQL anonymises user email addresses in a database table:
UPDATE user SET email = id || '@petegraham.co.uk';
It changes the
user table’s data from this:
The provided SQL is known to work with Postgres but the technique should work on other SQL databases. You’ll notice all my users now have email addresses with the format
email@example.com this is because I have the petegraham.co.uk domain set-up with a catch-all email address.
Catch-all email addresses
A catch-all email address is a special email addresses for a domain, it “catches” any emails sent to addresses at the domain which aren’t real email addresses. So if you were to email firstname.lastname@example.org it would go to the catch-all address.
Having a catch-all email address can be incredibly useful for testing systems where users need to have unique emails addresses, especially when testing registrations forms. Without this people end up having to exhaust their Hotmail or Yahoo email addresses from the 90s to be able to test. I use G Suite for the petegraham.co.uk email, however other email providers have catch-all functionality.
If you’re backing up your database to an S3 bucket it’s a good idea to using two buckets:
- The real back-ups with limited access
- Annoymised back-ups which the entire development team can access
The S3 buckets should have different credentials allowing you to be much more selective with who has access to your users data. It’s possible to use the same technique I wrote about in S3 Automatic Image Compression to take a newly uploaded production back-up, annoymise it, then upload this to the other bucket.
If you'd lke to contact me about this article then use twitter @petexgraham or email email@example.com.