-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(codebuild): prevent using Secrets in plain-text environment variables #12150
Conversation
Probably should wait with merging this until #12121 is merged. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍🏻
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
…ables If you use a Secret in an environment variable of the default type `BuildEnvironmentVariableType.PLAINTEXT`, it will be visible in plain text in the AWS Console. Add validation that checks for this common mistake, along with a flag that allows you to opt out of it.
063d1bc
to
364f4e8
Compare
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
…ables (aws#12150) If you use a Secret in an environment variable of the default type `BuildEnvironmentVariableType.PLAINTEXT`, it will be visible in plain text in the AWS Console. Add validation that checks for this common mistake, along with a flag that allows you to opt out of it. ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
If you use a Secret in an environment variable of the default type
BuildEnvironmentVariableType.PLAINTEXT
,it will be visible in plain text in the AWS Console.
Add validation that checks for this common mistake,
along with a flag that allows you to opt out of it.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license