github.com/upcmd/up@v0.8.1-0.20230108151705-ad8b797bf04f/tests/functests/c0203.yml (about)

     1  doc_meta: |
     2    folder: security
     3    title: mask senstive info in shell execution
     4    head: |
     5      When you use verbose level greater than vvv, it will print out the debugging final shell scripts rendered, which possiblly contains the secure vars. In such a case, upcmd will automatically mask the senstive variable with SECURE_SENSITIVE_INFO_MASKED
     6  
     7    sections:
     8      - title: Demo
     9        log: yes
    10  
    11  tasks:
    12    -
    13      name: task
    14      task:
    15        -
    16          func: shell
    17          dvars:
    18            - name: enc_key
    19              value: my_enc_key
    20              flags:
    21                - secret
    22  
    23            - name: value_encrypted
    24              value: '{{ "ENV_AAA" | encryptAES .enc_key }}'
    25              flags:
    26                - vvvv
    27                - taskScope
    28  
    29            - name: ENV_AAA
    30              value: '{{.value_encrypted}}'
    31              flags:
    32                - secure
    33  
    34          do: |
    35            echo "hello, this is a secrt value: {{.secure_ENV_AAA}}"