We are using GOCD v21.3.0 and Elastic Agent plugin v7.0.0-4.
We noticed that the AWS keys were being kept in plaintext in the UI on the Elastic Agents plugin page some of the time. Sometimes the values were asterisks, but sometimes they were plaintext.
As an audit mechanism, we push /var/lib/go-server/db/config.git to our git repo, and I noticed that "anonymous" was in fact decrypting the AWS keys and keeping them as plaintext in the cruise-config.xml file. We have deleted the sensitive information from git and have stopped pushing the config.
I'm not sure if the plugin, or the application itself is doing this, but it seems like a very bad thing to do.
/var/lib/go-server/db/config.git $ git log -2
commit b59ce12641c95f0a1115d4a41d05e15c55ea2a69 (HEAD -> master, origin/master)
Author: anonymous <sup...@thoughtworks.com>
Date: Thu Feb 10 03:04:46 2022 +0000
user:anonymous|timestamp:1644462286044|schema_version:139|go_edition:OpenSource|go_version:21.3.0 (13067-4c4bb4780eb0d3fc4cacfc4cfcc0b07e2eaf0595)|md5:bfdb1c2b01e1d12160157a43f0084a09
commit 2e062be833ae1c773eea3284d8129470e1ee9c5d
Author: Upgrade <sup...@thoughtworks.com>
Date: Thu Feb 10 03:04:43 2022 +0000
user:Upgrade|timestamp:1644462283228|schema_version:139|go_edition:OpenSource|go_version:21.3.0 (13067-4c4bb4780eb0d3fc4cacfc4cfcc0b07e2eaf0595)|md5:d8157d571d3c607034b98177681bdd9b