-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: deprecate rsadecrypt #18856
docs: deprecate rsadecrypt #18856
Conversation
`rsadecrypt` uses PKCS #1 v1.5 padding which has multiple known weaknesses. While it is possible to use safely in Nomad, we should not encourage our users to use bad cryptographic primitives. If users want to decrypt secrets in jobspecs we should choose a cryptographic primitive designed for that purpose. `rsadecrypt` was inherited from Terraform which only implemented it to support decrypting Window's passwords on AWS EC2 instances: hashicorp/terraform#16647 This is not something that should ever be done in a jobspec, therefore there's no reason for Nomad to support this HCL2 function.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 👍
website/content/docs/job-specification/hcl2/functions/crypto/rsadecrypt.mdx
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Aww yiss!
@schmichael Did you keep the whitespace standoff after the opening tag. If not, the markdown doesn't render. If so, it should render the markdown inside |
I'm going to lock this pull request because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active contributions. |
rsadecrypt
usesPKCS #1 v1.5
padding which has multiple known weaknesses. While it is possible to use safely in Nomad, we should not encourage our users to use bad cryptographic primitives.If users want to decrypt secrets in jobspecs we should choose a cryptographic primitive designed for that purpose.
rsadecrypt
was inherited from Terraform which only implemented it to support decrypting Window's passwords on AWS EC2 instances:hashicorp/terraform#16647
This is not something that should ever be done in a jobspec, therefore there's no reason for Nomad to support this HCL2 function.
Preview to save you a few clicks:
![image](https://private-user-images.githubusercontent.com/113362/277805199-3a250bf4-0d5c-4857-8071-e42008dd3c12.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3Mzk1ODQ0ODYsIm5iZiI6MTczOTU4NDE4NiwicGF0aCI6Ii8xMTMzNjIvMjc3ODA1MTk5LTNhMjUwYmY0LTBkNWMtNDg1Ny04MDcxLWU0MjAwOGRkM2MxMi5wbmc_WC1BbXotQWxnb3JpdGhtPUFXUzQtSE1BQy1TSEEyNTYmWC1BbXotQ3JlZGVudGlhbD1BS0lBVkNPRFlMU0E1M1BRSzRaQSUyRjIwMjUwMjE1JTJGdXMtZWFzdC0xJTJGczMlMkZhd3M0X3JlcXVlc3QmWC1BbXotRGF0ZT0yMDI1MDIxNVQwMTQ5NDZaJlgtQW16LUV4cGlyZXM9MzAwJlgtQW16LVNpZ25hdHVyZT1jMmExYTE2OTlkMDBiN2UyNDJjYzM5MzM2NGE4OGRlMTUwMzFiMjJjYmE0MjllNTdlZDg5ZTQyYWMyYmE5MjdkJlgtQW16LVNpZ25lZEhlYWRlcnM9aG9zdCJ9.It-JuPsiOU72HedVjpPptpL0tD7g9WiJmAScdex_tnw)