-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Cloud Security] Secrets are showing [object Object] once displayed on the screen #172071
[Cloud Security] Secrets are showing [object Object] once displayed on the screen #172071
Comments
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
@maxcold commented on the issue where I found this bug https://github.com/elastic/security-team/issues/7380#issuecomment-1829832615
|
Fleet has a document where they track the UX changes regarding secrets https://docs.google.com/document/d/1bDVPe90eXxUOcbKK_0Uo9J74io7_lVvYzQ2kk8mJHR0/edit#heading=h.ic4r6ausqrli Ideally we find a way to reuse as much as possible from what Fleet already has, otherwise we will have hard time catching up with their UX changes |
i think the best way forward here is to use the original input component from fleet ( |
Resumed working on ticket |
I found a bug in Fleet where when I try to save the Cloud Security Posture Integration and we get undefined id error. I pinged Fleet Channel
|
Currently, this task is blocked by bug issue ticket when saving integration with secrets. Moving the ticket to Todo until the bug is fixed. |
Delaying to 8.14 |
#173718 merged, moved back to |
To verify include also:
Make sure that for type: password on the manifest we don't expose the previous secret. |
Kibana version:
8.12-SNAPSHOT
Elasticsearch version:
8.12-SNAPSHOT
Describe the bug:
During the development of https://github.com/elastic/security-team/issues/7380 some variables are no longer simple values (string, numbers, booleans) but secret objects.
Secrets should be update-only, so secrets can't be leaked in services (bugs, logs) or humans.
Once a secret is stored, kibana retrieves the following:
But when the stored secret is shown in a password field (and I assume in other text representation) it shows
[object Object]
because it tries to render the secret objectSteps to reproduce:
While https://github.com/elastic/security-team/issues/7380 is not done
secret: true
to any field in cloud security posture findings manifest.yml. I recomend adding to streamcloudbeat/cis_aws
field namesecret_access_key
# from integrations root elastic-package stack up -v --version 8.12.0-SNAPSHOT --services package-registry
If the secrets adoption in cloud security posture is finished:
Expected behavior:
It's not clear to me what should be shown, but not
[object Object]
. The secrets project should have that answer.The text was updated successfully, but these errors were encountered: