summaryrefslogtreecommitdiff
path: root/lib/chef/resource.rb
diff options
context:
space:
mode:
authorAdam Leff <adam@leff.co>2016-08-09 23:56:06 -0400
committerAdam Leff <adam@leff.co>2016-08-25 10:28:16 -0400
commit3baa2c1abc07a21acf9dd1430d4b97700c2835a1 (patch)
tree0cdd3b2c6bd35e5a2135bf6aaedb2adb2e820f20 /lib/chef/resource.rb
parentdd3ba2a80cbc5dd991800f1529240c7d9e6cc94c (diff)
downloadchef-3baa2c1abc07a21acf9dd1430d4b97700c2835a1.tar.gz
Allow flagging a resource property as sensitiveadamleff/sensitive-properties
Some properties in custom resources may include sensitive data, such as a password for a database server. When the Resource's state is built for use by Data Collector or similar auditing tool, `Chef::Resource#state_for_resource_reporter` builds a hash of all state properties for that resource and their values. This leads to sensitive data being transmitted and potentially stored in the clear. This change enhances properties with the ability to set an individual property as sensitive and then have the value of that property suppressed when exporting the Resource's state.
Diffstat (limited to 'lib/chef/resource.rb')
-rw-r--r--lib/chef/resource.rb2
1 files changed, 1 insertions, 1 deletions
diff --git a/lib/chef/resource.rb b/lib/chef/resource.rb
index 0de5c89475..d11fa1c80c 100644
--- a/lib/chef/resource.rb
+++ b/lib/chef/resource.rb
@@ -497,7 +497,7 @@ class Chef
state_properties = self.class.state_properties
state_properties.each do |property|
if property.identity? || property.is_set?(self)
- state[property.name] = send(property.name)
+ state[property.name] = property.sensitive? ? "*sensitive value suppressed*" : send(property.name)
end
end
state