Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove NoEcho option from Parameter #19

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

Conversation

azend
Copy link

@azend azend commented Aug 18, 2023

The NoEcho option on the DataHubAccessToken prevents the parameter from being accessible in resources within the Cloudformation template. This bugfix removes the NoEcho option which makes the parameter accessible but with the tradeoff that the token is accessible as plain text within the AWS context. While this bugfix stabilizes a failing template, an alternative solution which better handles secret values should be next steps.

@azend azend requested review from dpeterka and pedro93 August 18, 2023 20:03
@pedro93
Copy link
Contributor

pedro93 commented Aug 22, 2023

token is accessible as plain text within the AWS context

Do you mean that it appears in the cloudformation stack details?

an alternative solution which better handles secret values should be next steps.
Do you have suggestions we can look into?

@azend
Copy link
Author

azend commented Aug 22, 2023

token is accessible as plain text within the AWS context

Do you mean that it appears in the cloudformation stack details?

I do. It is available in the Parameters tab of the deployed stack.

an alternative solution which better handles secret values should be next steps. Do you have suggestions we can look into?

AWS currently recommends using a feature called dynamic references which allows Cloudformation stack templates to access secrets configured in advance in Parameter Store or Secrets Manager. This isn't much different to what the current Cloudformation stack does except for a difference in order. The current stack template requires a token as a parameter then builds a secret secret in Secrets Manager.

@pedro93
Copy link
Contributor

pedro93 commented Aug 22, 2023

AWS currently recommends using a feature called dynamic references which allows Cloudformation stack templates to access secrets configured in advance in Parameter Store or Secrets Manager. This isn't much different to what the current Cloudformation stack does except for a difference in order. The current stack template requires a token as a parameter then builds a secret secret in Secrets Manager.

Please add a backlog item for this then. I would rather we go for recommend approaches than this trade-off.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants