cel: add secret_state for encrypted credentials in CEL programs#18834
cel: add secret_state for encrypted credentials in CEL programs#18834efd6 wants to merge 1 commit intoelastic:mainfrom
Conversation
Add a secret_state variable (type: textarea, secret: true) that lets users store API keys and credentials encrypted by Fleet and reference them in CEL programs as state.secret.<key>. Wire the variable into the agent input template and add a system test that validates the secret value reaches the CEL program via a header check against the mock server. Requires the matching beats change to accept string values for secret_state, since Fleet resolves secrets to strings. Bumps kibana.version to the versions that will include the Fleet fix.
| changes: | ||
| - description: Add secret state configuration for encrypted credentials in CEL programs. | ||
| type: enhancement | ||
| link: https://github.com/elastic/integrations/pull/18834 |
There was a problem hiding this comment.
🟠 High cel/changelog.yml:5
The changelog entry at line 5 uses https://github.com/elastic/integrations/pull/XXXXX as a placeholder PR link, which will be published as a broken link that 404s. Consider replacing XXXXX with the actual pull request number before merging.
- link: https://github.com/elastic/integrations/pull/XXXXX
+ link: https://github.com/elastic/integrations/pull/XXXXX🤖 Copy this AI Prompt to have your agent fix this:
In file packages/cel/changelog.yml around line 5:
The changelog entry at line 5 uses `https://github.com/elastic/integrations/pull/XXXXX` as a placeholder PR link, which will be published as a broken link that 404s. Consider replacing `XXXXX` with the actual pull request number before merging.
💔 Build Failed
Failed CI StepsHistorycc @efd6 |
This comment has been minimized.
This comment has been minimized.
TL;DR
Remediation
Investigation detailsRoot Cause
That selected version cannot be pulled in CI right now, so stack startup fails before running CEL tests. Evidence
Verification
Follow-upIf this constraint bump is required for the Fleet fix, keeping the manifest as-is is fine; CI just needs to target an available stack tag (or wait for Note 🔒 Integrity filter blocked 3 itemsThe following items were blocked because they don't meet the GitHub integrity level.
To allow these resources, lower tools:
github:
min-integrity: approved # merged | approved | unapproved | noneWhat is this? | From workflow: PR Buildkite Detective Give us feedback! React with 🚀 if perfect, 👍 if helpful, 👎 if not. |
Proposed commit message
Note
Depends on a workaround in beats for a fleet bug.
Checklist
changelog.ymlfile.Author's Checklist
How to test this PR locally
Related issues
type: yamlvariables withsecret: trueare silently corrupted during policy compilation kibana#267859Screenshots