careful-television-82602
01/29/2025, 6:00 PMclever-sunset-76585
01/29/2025, 7:15 PMadditionalSecretOuts
(I think?) So you could potentially end up with a state file that has a sensitive output property that isn't encrypted unless you mark it as such. The state file as a whole, though, is only gzip'd and not encrypted. You may encrypt it yourself, for eg. using gpg or some other method, but you'd have to decrypt it before Pulumi can read it, of course.little-cartoon-10569
01/29/2025, 7:50 PMcareful-television-82602
01/29/2025, 9:26 PMclever-sunset-76585
01/29/2025, 9:33 PMmodern-zebra-45309
01/29/2025, 9:45 PMmodern-zebra-45309
01/29/2025, 9:48 PMcareful-television-82602
01/30/2025, 3:33 AMmodern-zebra-45309
01/30/2025, 10:15 AMcareful-television-82602
01/30/2025, 11:55 AMmodern-zebra-45309
01/30/2025, 12:17 PMI read that section as "you are on your own", but it seems like the aws client does support client side encryption (now)I think you are correct that you're on your own in the situation you're dealing with. The client is "just" a client-library that handles encryption as well as the S3 interactions, you can also use any other means of encryption or create your own client by combining an AWS SDK with an encryption library. After all, from S3's perspective, it doesn't matter whether the files you send are encrypted or not. It will add its own encryption anyway.
If pulumi does not support it, we are back to my question.Pulumi uses https://pkg.go.dev/gocloud.dev/blob/s3blob for the S3 backend (per https://github.com/pulumi/pulumi/blob/master/pkg/backend/diy/backend.go#L39C5-L39C28), which as far as I can tell doesn't support "transparent" client-side encryption. If the encryption within the state file is not sufficient for you, you'll probably have to point Pulumi to a locally mounted encrypted volume, which you can then store and share. I'd be interested in hearing what solution you eventually go with.