-
Notifications
You must be signed in to change notification settings - Fork 556
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
data.vault_generic_secret: make data and data_json sensitive #844
Conversation
Changes to Terraform 0.13.0 mean that these values are currently printed during terraform apply. See hashicorp/terraform#25800 for dicussion.
This is an urgent change... With terraform v 0.13 all secrets become exposed in the plan output |
Hello, when can we expect a fix/next release for this ? Thank you! |
Our team is facing the same issue, with sensitive data shown in plan output. Is there an ETA for a fix ? Thanks. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍 Thanks!
Hello - we'd like to roll this fix out as soon as possible, however I'm investigating #847 as well and feel that should be included. |
Hello all - this was released in |
Hi @catsby We are on 2.14 with tf 0.13.3 and we are seeing some regression of #849 whereby the
Is it possibly related to #844 ? Thanks! |
Hey @jravetch - could you open a separate issue with an example configuration that reproduces this? |
…rp#844) Changes to Terraform 0.13.0 mean that these values are currently printed during terraform apply. See hashicorp/terraform#25800 for dicussion.
Changes to Terraform 0.13.0 mean that these values are currently
printed during terraform apply.
See hashicorp/terraform#25800 for discussion.
Community Note
Relates OR Closes #0000
Release note for CHANGELOG:
Output from acceptance testing: