-
Notifications
You must be signed in to change notification settings - Fork 371
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ability to handle sensitive yaml input without leaking sensitive data #546
Comments
Hello, just wondering if this change is still planned or it was just forgotten. |
Hey @dak1n1 @redeux @mcuadros ! Guys could you please make some effort to push this issue and make it alive, this is a cool feature and PRs are ready but it's abandoned over a year for some unknown reason. Thank you in advance! Also is any way to inherit the sensitivity of the terraform variables, like if the variable pointed as sensitive |
Marking this issue as stale due to inactivity. If this issue receives no comments in the next 30 days it will automatically be closed. If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. This helps our maintainers find and focus on the active issues. Maintainers may also remove the stale label at their discretion. Thank you! |
Marking this issue as stale due to inactivity. If this issue receives no comments in the next 30 days it will automatically be closed. If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. This helps our maintainers find and focus on the active issues. Maintainers may also remove the stale label at their discretion. Thank you! |
Description
Currently, the only way to pass in yaml formatted input is through the
values
attribute which will expose any sensitive data through themetadata.values
output attribute on thehelm_release
resource. I desire a similarvalues_sensitive
attribute (likeset_sensitive
) whose values will be cloaked in any console output (exactly howset_sensitive
does so after #480).My use case is to input sensitive values that are outside of our control (passwords controlled by external parties) through a "secure file" in an Azure Devops pipeline. Secondarily, I want the flexibility to template various other (terraform managed) secrets into a yaml file using the
templatefile
function (as I find the number ofset_sensitive
blocks that would be required to be prohibitively time consuming to create and maintain).Again, while it would be possible to prevent these values from leaking using
set_sensitive
, when building enterprise software with many secrets (at varying depths in the yaml values structure) this becomes prohibitively complex and time consuming.Also, I am willing to give implementing this a shot (would be my first contribution using Go, but seems pretty straightforward).
Potential Terraform Configuration
References
#480 (I am suggesting a new attribute that is a combination of functionality offered through
set_sensitive
and the existingvalues
attributes)#340 (Rejected in favor of 480)
Community Note
The text was updated successfully, but these errors were encountered: