pulumi/pkg
Matt Ellis ade366544e Encrypt secrets in Pulumi.yaml
We now encrypt secrets at rest based on a key derived from a user
suplied passphrase.

The system is designed in a way such that we should be able to have a
different decrypter (either using a local key or some remote service
in the Pulumi.com case in the future).

Care is taken to ensure that we do not leak decrypted secrets into the
"info" section of the checkpoint file (since we currently store the
config there).

In addtion, secrets are "pay for play", a passphrase is only needed
when dealing with a value that's encrypted. If secure config values
are not used, `pulumi` will never prompt you for a
passphrase. Otherwise, we only prompt if we know we are going to need
to decrypt the value. For example, `pulumi config <key>` only prompts
if `<key>` is encrypted and `pulumi deploy` and friends only prompt if
you are targeting a stack that has secure configuration assoicated
with it.

Secure values show up as unecrypted config values inside the language
hosts and providers.
2017-10-24 16:48:12 -07:00
..
apitype Add login and logout commands. (#437) 2017-10-19 15:22:07 -07:00
compiler/errors Use Stack over Environment to describe a deployment target 2017-10-16 13:04:20 -07:00
diag Have engine emit "events" instead of writing to streams 2017-10-09 18:24:56 -07:00
encoding Use go-yaml directly 2017-10-20 14:01:37 -07:00
engine Merge pull request #448 from pulumi/TwoPhaseSnapshot 2017-10-23 10:27:30 -07:00
graph Rename pulumi-fabric to pulumi 2017-09-21 19:18:21 -07:00
pack Encrypt secrets in Pulumi.yaml 2017-10-24 16:48:12 -07:00
resource Encrypt secrets in Pulumi.yaml 2017-10-24 16:48:12 -07:00
testing/integration Encrypt secrets in Pulumi.yaml 2017-10-24 16:48:12 -07:00
tokens Rename pulumi-fabric to pulumi 2017-09-21 19:18:21 -07:00
tools Rename pulumi-fabric to pulumi 2017-09-21 19:18:21 -07:00
util Do not trap signals in rpcutil.Serve. 2017-10-24 14:35:59 -07:00
workspace Use go-yaml directly 2017-10-20 14:01:37 -07:00