powerful-oyster-89864
08/05/2025, 1:02 PMother_secret_version = aws.secretsmanager.get_secret_version(
secret_id=other_secret_arn,
)
other_secret = json.loads(other_secret_version.secret_string)
google_idp = None
if idp_config.get("google") and idp_config["google"].get("enabled", False):
google_client_id = other_secret.get("GOOGLE_CLIENT_ID")
google_client_secret = other_secret.get("GOOGLE_CLIENT_SECRET")
if not google_client_id or not google_client_secret:
raise ValueError(f"Google client ID and secret must be provided in the {other_secret_arn}.")
google_idp = aws.cognito.IdentityProvider(
f"{resource_prefix}-google-idp",
user_pool_id=user_pool.id,
provider_name="Google",
provider_type="Google",
provider_details={
"client_id": google_client_id,
"client_secret": google_client_secret,
"authorize_scopes": idp_config["google"].get("authorize_scopes", "")
},
attribute_mapping=idp_config["google"].get("attribute_mapping", {})
)
little-cartoon-10569
08/05/2025, 11:21 PMsecret()
function, which will obfuscate the value in state. There are other ways of hiding secrets, but for the code you've got right now, this is the simplest fix.
https://www.pulumi.com/docs/reference/pkg/python/pulumi/#pulumi.Output.secretlittle-cartoon-10569
08/05/2025, 11:23 PMconst secretSeven = pulumi.secret(7);
I don't know what the equivalent in Python is, hopefully the docs linked make more sense to you than to me.