You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am running a module which deploys apps + spns + secrets. The module is called by different environments with the respective root module. The azuread_application does NOT utilize the new password block.
variables.tf
variable"service_principals" {
description="The Service Principals to create."type=map(object({
create_password =optional(bool, false)
display_name =string
description =string
required_resource_access =optional(list(object({
resource_app_id =string
resource_access =list(object({
id =string
type =string
}))
})), [])
}))
}
azuread_application_password is NOT a defined output (the module also handles directly adding the secret to f.e. Key Vault and TFE Workspaces without human interaction but i omitted the code as it is not relevant)
outputs.tf
output"applications" {
description="Relevant infos of generated Application Registrations."value=azuread_application.this
}
Debug Output
Only relevant part from the root module calling the module using the azuread_application resource without password block:
{"@level":"error","@message":"Error: Output refers to sensitive values","@module":"terraform.ui","@timestamp":"2024-06-28T09:24:18.003275Z","diagnostic":{"severity":"error","summary":"Output refers to sensitive values","detail":"To reduce the risk of accidentally exporting sensitive data that was intended to be only internal, Terraform requires that any root module output containing sensitive data be explicitly marked as sensitive, to confirm your intent.\n\nIf you do intend to export this data, annotate the output value as sensitive by adding the following argument:\n sensitive = true","range":{"filename":"outputs.tf","start":{"line":1,"column":1,"byte":0},"end":{"line":1,"column":36,"byte":35}},"snippet":{"context":null,"code":"output \"managed_entraid_identities\" {","start_line":1,"highlight_start_offset":0,"highlight_end_offset":35,"values":[]}},"type":"diagnostic"}
Human readable (hopefully)
Error: Output refers to sensitive values
on outputs.tf line 1: output "managed_entraid_identities" {
To reduce the risk of accidentally exporting sensitive data that was intended to be only internal, Terraform requires that any root module output containing sensitive data be explicitly marked as sensitive, to confirm your intent.
If you do intend to export this data, annotate the output value as sensitive by adding the following argument: sensitive = true
Panic Output
Expected Behavior
Terraform doesn't force me to chain sensitive = true for existing deployments which don't use the password block in resource azuread_application.
Actual Behavior
Run exists with 1 because output is not marked as sensitive = true while not using the new password block.
Community Note
Terraform (and AzureAD Provider) Version
Running on Terraform Cloud hosted runner
Updating via Renovate Bot
chore(deps): update terraform azuread to v2.53.0
:2.52.0
->2.53.0
Affected Resource(s)
azuread_application
Terraform Configuration Files
I am running a module which deploys apps + spns + secrets. The module is called by different environments with the respective root module. The
azuread_application
does NOT utilize the newpassword
block.variables.tf
main.tf
azuread_application_password
is NOT a defined output (the module also handles directly adding the secret to f.e. Key Vault and TFE Workspaces without human interaction but i omitted the code as it is not relevant)outputs.tf
Debug Output
Only relevant part from the root module calling the module using the
azuread_application
resource withoutpassword
block:Human readable (hopefully)
Error: Output refers to sensitive values
on outputs.tf line 1:
output "managed_entraid_identities" {
To reduce the risk of accidentally exporting sensitive data that was intended to be only internal, Terraform requires that any root module output containing sensitive data be explicitly marked as sensitive, to confirm your intent.
If you do intend to export this data, annotate the output value as sensitive by adding the following argument:
sensitive = true
Panic Output
Expected Behavior
Terraform doesn't force me to chain
sensitive = true
for existing deployments which don't use thepassword
block in resourceazuread_application
.Actual Behavior
Run exists with
1
because output is not marked assensitive = true
while not using the newpassword
block.Steps to Reproduce
v.2.52.0
tov2.53.0
plan
Important Factoids
References
The text was updated successfully, but these errors were encountered: