You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When checking the details view during up, in the ConfigMap it shows as [secret], but in the Secret, it shows the base64 encoded string, a simple decode reveals the plain secret value.
After stack creation, the stack state contains the secret as a plain text, both for the ConfigMap and for Secret.
Versions:
➜ pulumi (28-rabbitmq) ✗ pulumi version
v0.17.28
➜ pulumi (28-rabbitmq) ✗ yarn list --pattern "@pulumi"
yarn list v1.15.2
warning package.json: No license field
warning prmrgt-infra: No license field
├─ @pulumi/aws@0.18.26
├─ @pulumi/cloudflare@0.17.8
├─ @pulumi/kubernetes@0.25.6
├─ @pulumi/pulumi@0.17.28
├─ @pulumi/query@0.3.0
└─ @pulumi/random@0.5.6
Done in 0.18s.
➜ pulumi (28-rabbitmq) ✗ pulumi plugin ls
NAME KIND VERSION SIZE INSTALLED LAST USED
aws resource 0.18.26 209 MB n/a 1 day ago
aws resource 0.18.25 209 MB n/a 1 week ago
aws resource 0.18.24 209 MB n/a 1 week ago
aws resource 0.18.10 204 MB n/a 1 week ago
cloudflare resource 0.17.8 41 MB n/a 1 week ago
cloudflare resource 0.17.3 40 MB n/a 1 week ago
kubernetes resource 0.25.6 51 MB n/a 26 minutes ago
kubernetes resource 0.25.5 51 MB n/a 1 day ago
kubernetes resource 0.25.4 51 MB n/a 6 days ago
kubernetes resource 0.25.3 51 MB n/a 1 week ago
kubernetes resource 0.25.2 51 MB n/a 1 week ago
kubernetes resource 0.24.0 53 MB n/a 1 week ago
random resource 0.5.6 36 MB n/a 1 week ago
random resource 0.5.3 36 MB n/a 1 week ago
random resource 0.5.1 28 MB n/a 1 week ago
TOTAL plugin cache size: 1.3 GB
➜ pulumi (28-rabbitmq) ✗
The text was updated successfully, but these errors were encountered:
ncsibra
changed the title
Secrets handled incorrectly when using pipelines in helm chart
Secrets handled incorrectly in helm chart
Aug 8, 2019
We probably should automatically mark the data and stringData fields of Secret as secret by default.
In case you don't know, Secret is not particularly secret, though. :) Kubernetes stores secrets in plain text in etcd, and generally anyone with kubectl access can get at the values. So our solution here would only affect what you can see via Pulumi itself.
Sadly I know. :)
But the whole point for the mentioned feature and for handling some Outputs as secret, to hide sensitive informations from state and log files.
Sometimes when reporting an issue internally or for pulumi, we have to be very careful to not share sensitive data through log or state snippets, that's why I think it's an important feature.
I'm trying to use the new secret provider feature introduced in pulumi/pulumi#2994.
Using aws kms as provider.
Sample code:
When checking the details view during up, in the ConfigMap it shows as
[secret]
, but in the Secret, it shows the base64 encoded string, a simple decode reveals the plain secret value.After stack creation, the stack state contains the secret as a plain text, both for the ConfigMap and for Secret.
Versions:
The text was updated successfully, but these errors were encountered: