Skip to content

[Bug]: Sensitive values are stripped from resources passing through OpenvoxDB #177

@smortex

Description

@smortex

Is this a critical security issue?

  • This is not a security issue.

Describe the Bug

While working on voxpupuli/puppet-bacula#241, I realized that OpenvoxDB strips Sensitive parameters from resources. This is not compatible with exporting a resource with a Sensitive password on one host, and collecting it on another host (so that the same password can be used to setup the client and the server without having to repeat passwords).

It looks like this was done on purpose in fdd4cef 😲.

Expected Behavior

PuppetDB store the resource as exported, without stripping Sensitive parameters.

When collecting exported resources, Sensitive parameters are as they where when the resource was exported.

Maybe puppet query shows [REDACTED] by default if this is a concern?

Steps to Reproduce

  1. Have a class with a required Sensitive parameter
  2. Export this class
  3. Collect the exported class

Environment

n/a

Additional Context

No response

Relevant log output

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions