-
Notifications
You must be signed in to change notification settings - Fork 157
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
hashivault_read exposes secrets in logs #414
Comments
This was a limitation of ansible in the past. There was no way to redact these and ansible stance was don't log it if you don't want to see it. |
@TerryHowe does it mean it was fixed since then or something that can be fixed? |
I'm not entirely sure if something can be done about it now. Would the lookup plugin work better for you? |
@TerryHowe I have lookups with dynamic keys, so I need it in a step. Not sure what is happening in vars, but it is not my use case anyway.
But that basically means that if anyone forgot to add no_log statements, secrets need to be rotated. |
Running ansible with verbose flags exposes secrets read from vault which results them to be preserved in logs of systems like Jenkins and Rundeck.
Not sure if this is fixed in newer versions (currently on 4.6.3 due to ansible 2.9 in use) or if it is possible to address at all.
Example:
Will yield something like this in logs:
ok: [superserver -> localhost] => {"changed": false, "lease_duration": 0, "lease_id": "", "rc": 0, "renewable": false, "value": "Should Be Secret"}
The text was updated successfully, but these errors were encountered: