Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[feature] Redact / Mask atlantis output #46

Closed
atlantisbot opened this issue Mar 6, 2018 · 2 comments
Closed

[feature] Redact / Mask atlantis output #46

atlantisbot opened this issue Mar 6, 2018 · 2 comments
Milestone

Comments

@atlantisbot
Copy link

Issue by @so0k
Monday Jan 29, 2018 at 06:59 GMT
Migrated from hootsuite/atlantis#235
Why was it migrated?


Is there any way to redact Atlantis output into the PR comments?

In our company there is a concern with secrets in PR comments and we would need finer control over the comments created by Atlantis.

for Terraform, opencredo/terrahelp provides masking functionality by piping Terraform output through it and masking any variables that are in the tfvars file.

At this stage I see 2 options:

  1. Provide a way to pipe terraform output through other binaries before sending it to the github comment renderer (this would be the most flexible way)
  2. Make the comment templates configurable and including a functionmap that can help masking (most likely too complicated as the masking functions would need to be compiled within Atlantis)

or maybe there is a workaround I'm not seeing?

@atlantisbot
Copy link
Author

Comment by @lkysow
Tuesday Jan 30, 2018 at 00:48 GMT


@so0k I think I favour option 1 (for now at least). If there was a way to configure exactly what command was run for plan/apply, then you could run terraform with the terrahelp wrapper.

I'm going to be looking at this soon.

@lkysow
Copy link
Member

lkysow commented Jul 10, 2018

Specific to terrahelp it's possible now:

With 0.4.1, you can override the default plan commands via an atlantis.yaml file:

version: 2
projects:
- dir: terrahelp
  workflow: terrahelp
workflows:
  terrahelp:
    plan:
      steps:
      - init
      - run: terraform plan -no-color -out $PLANFILE | terrahelp mask

The issue is where terrahelp's terraform.tfvars file comes from (this is where it has the secrets) because if you check this in, it's not secret anymore! Maybe you could use a provisioner or a custom run step to download it from a secure location prior to plan?

@lkysow lkysow closed this as completed Jul 10, 2018
meringu pushed a commit to meringu/atlantis that referenced this issue May 29, 2023
* Return locks when they're deleted

* Implement DeletePlan and DeletePlanByPull

* Clean up data from pull request on close

* Delete plan on successful apply
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants