-
Notifications
You must be signed in to change notification settings - Fork 118
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
random_string leaking sensitive information on rotate #47
Comments
@mildwonkey Is there any timeline for addressing this? Do you think proceeding with #48 is the best plan here, or would it make sense to revisit the idea of a separate |
I prefer a separate resource - As for the timeline, the core team is still entirely focused on terraform 0.12 and will continue to be focused on it for the next several weeks. I know it's been a frustrating, long wait and appreciate your patience! |
I agree a separate resource would be useful however at the minute the documentation does seem to suggest that the random_string is suitable for passwords, on this page https://www.terraform.io/docs/providers/random/r/string.html It says that:
And the example uses the resource id |
I did seriously consider updating the |
As discussed above Thanks to everyone involved. I am going to close this as there is nothing more to be done. |
The problem is that the proposed fix in #52 doesn't actually address the broader problem highlighted in this issue, namely that keepers in the random provider leak their data regardless of what resource you use:
If you are legitimately using random strings/integers/passwords/ that need to be triggered to change when other sensitive data changes, the |
@essjayhch To my best knowledge, rendering of each field should reflect sensitivity. For example, resource "random_password" "password" {
length = 16
special = true
keepers = {
resource_group = azurerm_resource_group.example.id
}
} the You can however force it to be treated as sensitive using the resource "random_password" "password" {
length = 16
special = true
keepers = {
resource_group = sensitive(azurerm_resource_group.example.id)
}
} There are fields other than I don't see a reason why If it isn't then I would treat that as a bug and would ask you kindly to describe the details and attach repro case in a new issue here: https://github.com/hashicorp/terraform/issues/new/choose FYI we also have a discourse forum available for questions: https://discuss.hashicorp.com/c/terraform-core/27 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
The random_string resource leaks the current value when planning with a changed keeper value
Terraform Version
Terraform v0.11.7
Affected Resource(s)
Terraform Configuration Files
Output of apply:
Up until this point the value is safe. However if you then change the keeper e.g.
And run a plan it exposes the current value in the diff:
Expected Behavior
The diff should say:
Actual Behavior
The sensitive value is leaked in a plain text.
Steps to Reproduce
References
#17
The text was updated successfully, but these errors were encountered: