-
Notifications
You must be signed in to change notification settings - Fork 44
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Functions return secret values as plain #1051
Labels
Comments
Added to the project board |
Platform features have been built 🥇 We can build this into the bridge now. |
pulumi/pulumi#12710 to be precise. |
@t0yv0 raised a good point that we need to figure out how to roll this out without breaking existing usage. Otherwise #2887 fixes the bridge bit of not outputting secrets in invokes. More details here: #2887 (review) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
What happened?
Invoking a function that has output properties marked as sensitive returns plain values to Pulumi program, bypassing the secret bit propagation functionality of
Output<T>
. If the user later uses this data in a way that's recorded in the state file, such as using it as an input to the Resource, it can compromise safety by exposing the sensitive data in plaintext in the statefile.Blocker: pulumi/pulumi#12710
Currently cannot be implemented in the bridge as updating providers to the bridge version that supports this would break user programs. Some assistance is needed from the engine to dis-intermediate.
Expected Behavior
Sensitive data is protected and encrypted if it ends up in the state file.
Steps to reproduce
Use https://www.pulumi.com/registry/packages/aws/api-docs/secretsmanager/getrandompassword/ and store the results in the statefile.
Note that the password is NOT
[secret]
in the stack output.Output of
pulumi about
Additional context
Plugin Framework version (./pf Go module) started by doing this right but had to manually remove secrets due to the blocker in the engine. Reminder to remove those lines when this is ready to go.
Contributing
Vote on this issue by adding a 👍 reaction.
To contribute a fix for this issue, leave a comment (and link to your pull request, if you've opened one already).
The text was updated successfully, but these errors were encountered: