powerful-oyster-89864
08/05/2025, 1:02 PMother_secret_version = aws.secretsmanager.get_secret_version(
secret_id=other_secret_arn,
)
other_secret = json.loads(other_secret_version.secret_string)
google_idp = None
if idp_config.get("google") and idp_config["google"].get("enabled", False):
google_client_id = other_secret.get("GOOGLE_CLIENT_ID")
google_client_secret = other_secret.get("GOOGLE_CLIENT_SECRET")
if not google_client_id or not google_client_secret:
raise ValueError(f"Google client ID and secret must be provided in the {other_secret_arn}.")
google_idp = aws.cognito.IdentityProvider(
f"{resource_prefix}-google-idp",
user_pool_id=user_pool.id,
provider_name="Google",
provider_type="Google",
provider_details={
"client_id": google_client_id,
"client_secret": google_client_secret,
"authorize_scopes": idp_config["google"].get("authorize_scopes", "")
},
attribute_mapping=idp_config["google"].get("attribute_mapping", {})
)little-cartoon-10569
08/05/2025, 11:21 PMsecret() function, which will obfuscate the value in state. There are other ways of hiding secrets, but for the code you've got right now, this is the simplest fix.
https://www.pulumi.com/docs/reference/pkg/python/pulumi/#pulumi.Output.secretlittle-cartoon-10569
08/05/2025, 11:23 PMconst secretSeven = pulumi.secret(7);
I don't know what the equivalent in Python is, hopefully the docs linked make more sense to you than to me.No matter how you like to participate in developer communities, Pulumi wants to meet you there. If you want to meet other Pulumi users to share use-cases and best practices, contribute code or documentation, see us at an event, or just tell a story about something cool you did with Pulumi, you are part of our community.
Powered by