Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature] Create azurerm_key_vault_secret with value stored as sensitive variable in terraform.tfvars file #321

Open
rrmistry opened this issue Dec 11, 2022 · 2 comments
Labels
enhancement New feature or request

Comments

@rrmistry
Copy link

At this time the secrets from Azure Key Vault are imported into the main.tf file in plain text.

It would be good to create the Terraform resource for azurerm_key_vault_secret with a corresponding sensitive variable that has the value appended to a variables file (e.g. terraform.tfvars).

When importing massive amounts of secrets, this would make it easy to add the produced Terraform code to a Git repo with appropriate .gitignore for *.tfvars files.


A great tool in any case. Thanks team! Much appreciated 🙏

@rrmistry rrmistry changed the title [Feature] Create azurerm_key_vault_secret with value stored as variable in terraform.tfvars file [Feature] Create azurerm_key_vault_secret with value stored as sensitive variable in terraform.tfvars file Dec 11, 2022
@magodo
Copy link
Collaborator

magodo commented Dec 12, 2022

@rrmistry Thank you for raising this! This is a fair feature request, while to be honest, we are not going to support property level features, as that will become hard to maintain real fastly. Sorry for this.

@magodo magodo added the question Further information is requested label Dec 12, 2022
@magodo magodo added enhancement New feature or request and removed question Further information is requested labels May 24, 2023
@magodo
Copy link
Collaborator

magodo commented Aug 9, 2024

Relating to magodo/tfadd#8

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants