-
Notifications
You must be signed in to change notification settings - Fork 115
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automatically mark Secret data as Pulumi secrets #1577
Conversation
Does the PR have any schema changes?Looking good! No breaking changes found. |
Does the PR have any schema changes?Looking good! No breaking changes found. |
1 similar comment
Does the PR have any schema changes?Looking good! No breaking changes found. |
49a08ef
to
409725f
Compare
Does the PR have any schema changes?Looking good! No breaking changes found. |
Does the PR have any schema changes?Looking good! No breaking changes found. |
This seems important enough for us to have a test case for each sdk? |
To avoid inadvertently leaking sensitive data into the Pulumi state for Kubernetes v1/Secret resources, this change manually marks the "stringData" and "data" fields as secret. The output fields were already marked as secret. This combination will also prevent sensitive data that appears in raw YAML from the YAML and Helm SDKs from appearing in the state.
b9e9569
to
1e2ffc7
Compare
Does the PR have any schema changes?Looking good! No breaking changes found. |
1e2ffc7
to
99fa44e
Compare
Does the PR have any schema changes?Looking good! No breaking changes found. |
@viveklak Added tests and finished the .NET implementation |
Does the PR have any schema changes?Looking good! No breaking changes found. |
Looks like there might be some test failures? Looks good otherwise! |
3f6836c
to
80eaf5b
Compare
Does the PR have any schema changes?Looking good! No breaking changes found. |
Overriding the generated files with these point-in-time snapshots feels like it introduces non-trivial maintainability debt - and a lot of ways we could accidentally not pick up other codegen and/or functionality changes in the future. Could we just improve the code generators to support generating the right thing here? (A secret annotation on inputs)? |
80eaf5b
to
7c60e18
Compare
Most likely, but I wanted to make sure everything was working as expected in the k8s provider first. My intention is to follow up with the schema changes in the near term. Since all of these tests will already be in place, it should be easier to make sure the codegen is working as expected. |
Does the PR have any schema changes?Looking good! No breaking changes found. |
1 similar comment
Does the PR have any schema changes?Looking good! No breaking changes found. |
I started working on the code generators to see how difficult it would be to generalize this, and am about halfway done with the required changes now. My plan for this PR is:
|
Does the PR have any schema changes?Looking good! No breaking changes found. |
Codegen changes are here: pulumi/pulumi#7128 |
Does the PR have any schema changes?Looking good! No breaking changes found. |
89fbc49
to
706a448
Compare
Does the PR have any schema changes?Looking good! No breaking changes found. |
Proposed changes
To avoid inadvertently leaking sensitive data into the Pulumi
state for Kubernetes v1/Secret resources, this change manually
marks the "stringData" and "data" fields as secret. The output
fields were already marked as secret.
This combination will also prevent sensitive data that appears
in raw YAML from the YAML and Helm SDKs from appearing
in the state.
Related issues (optional)
Fix #999
Fix #1353