[azure-cli] better default configuration to reduce chances of accidental data leaks #27858
Labels
Auto-Assign
Auto assign by bot
Azure CLI Team
The command of the issue is owned by Azure CLI team
Configure
az configure/config
customer-reported
Issues that are reported by GitHub users external to the Azure organization.
feature-request
Milestone
Description
The Azure cli has a tendency to be quite chatty and this can expose secrets stored in Azure in the logs of CI tools that run it.
See:
There are a number of sensible configuration settings that can be applied to greatly reduced the chance of this happening:
These can either be set using
az config
or registered as environment variables. The latter being more secure as the AzureCLI@2 task in Azure pipelines ignores the global config by default.Ideally azure-cli would detect it's running on a ci platform, using a package similar to
is-ci
.This way command output isn't echo'ed to the log by default and also not written to disk where it can easily be intercepted.
I've suggested the actions-runner team would apply these settings on the GitHub Actions and Azure Pipelines hosted runners, but they feel it's up to the individual tools to act in a proper manner:
Expected behavior
Azure-cli is configured with sane CI/CD defaults.
There is an extension to Azure cli called
init
which provides sane automation defaults.Actual behavior
Azure-cli is configured in standard interactive mode.
Repro steps
https://www.paloaltonetworks.com/blog/prisma-cloud/secrets-leakage-user-error-azure-cli/
The text was updated successfully, but these errors were encountered: