Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Don't hide account ID in Actions logs by default #459

Closed
danielcompton opened this issue Jun 20, 2022 · 8 comments
Closed

Don't hide account ID in Actions logs by default #459

danielcompton opened this issue Jun 20, 2022 · 8 comments
Labels
effort/small This issue will take less than a day of effort to fix feature-request A feature should be added or improved. next-major-version This issue will be fixed/implemented in the next major version

Comments

@danielcompton
Copy link

According to https://www.lastweekinaws.com/blog/are-aws-account-ids-sensitive-information/ which was confirmed with AWS:

“Account IDs are not considered sensitive. Based on your feedback,
we’ve started updating our documentation to make this more clear.”

@peterwoodworth peterwoodworth added needs-triage This issue still needs to be triaged next-major-version This issue will be fixed/implemented in the next major version feature-request A feature should be added or improved. effort/small This issue will take less than a day of effort to fix and removed needs-triage This issue still needs to be triaged labels Oct 1, 2022
@peterwoodworth
Copy link
Contributor

Thanks for the feature request @danielcompton, the request makes a lot of sense.

This is something we won't want to implement until we release a new major version however. I'm concerned that customers using v1 who are still concerned with their account id security may be caught off-guard by this sudden change if we were to implement this in our current major version. We already document and support the option to unmask the value, so the benefit this brings isn't quite worth the risk of altering the functionality in a non-major version release imo. I'll be closing the PR you've been so helpful to contribute, thanks for letting us know about this desired functionality 🙂

@RyPeck
Copy link

RyPeck commented Oct 5, 2022

We already document and support the option to unmask the value

@peterwoodworth where is that option?

@peterwoodworth
Copy link
Contributor

@RyPeck I was wrong about us documenting it, we have an issue open tracking adding this to our docs

You can use mask-aws-account-id and set it to false. I'll see about getting an example up on our readme next week probably

@mike-dodge-eq
Copy link

Is there an ETA for the next major version (presumably v2)? Debating whether to chase around updating the mask-flag, vs picking up the v2 update...timing will drive the configuration vs convention play.

@peterwoodworth
Copy link
Contributor

There's not really an ETA yet @mike-dodge-eq. I would expect it to arrive within a couple months, but no promises

@jmeekhof
Copy link

I'm seeing some odd behavior related to this.

Run aws-actions/[email protected]
  with:
    role-to-assume: arn:aws:iam::505480154940:role/ci_agent_role
    role-duration-seconds: 1200
    role-skip-session-tagging: true
    aws-access-key-id: ***
    aws-secret-access-key: ***
    aws-region: ***
    mask-aws-account-id: false
    audience: sts.amazonaws.com
  env:
    REGISTRY: 505480154940.dkr.ecr.***.amazonaws.com
(node:1632) NOTE: We are formalizing our plans to enter AWS SDK for JavaScript (v2) into maintenance mode in 2023.

Please migrate your code to use AWS SDK for JavaScript (v3).
For more information, check the migration guide at https://a.co/7PzMCcy
(Use `node --trace-warnings ...` to show where the warning was created)
1s
0s
0s
0s
Evaluate and set job outputs
Warning: Skip output 'registry' since it may contain secret.
Set output 'docker_username'
Set output 'docker_password'
Cleaning up orphan processes

Even though I've used the make-aws-account-id parameter, it's still being masked.

@peterwoodworth
Copy link
Contributor

v3 does not mask the account id by default 🙂

@github-actions
Copy link

** Note **
Comments on closed issues are hard for our team to see.
If you need more assistance, please either tag a team member or open a new issue that references this one.
If you wish to keep having a conversation with other community members under this issue feel free to do so.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
effort/small This issue will take less than a day of effort to fix feature-request A feature should be added or improved. next-major-version This issue will be fixed/implemented in the next major version
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants