-
Notifications
You must be signed in to change notification settings - Fork 542
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
resource vault_generic_secret should not print out the content of data_json to console #144
Comments
Vad1mo
added a commit
to Vad1mo/terraform-provider-vault
that referenced
this issue
Jun 27, 2018
This MR fixes hashicorp#144 and masks `data_json` as sensitive.
This was referenced Jun 27, 2018
Vad1mo
added a commit
to Vad1mo/terraform-provider-vault
that referenced
this issue
Jun 27, 2018
This MR fixes hashicorp#144 and masks `data_json` as sensitive.
@tyrannosaurus-becks Can this not be configurable with a default to true? I was using |
Please reopen this. I now get this when I do terraform plan:
None of the above contains actual sensitive data... but now I cannot see what Terraform wants to change. Also, why is stuff like this not in the Changelog? |
dandandy
pushed a commit
to dandandy/terraform-provider-vault
that referenced
this issue
Jun 17, 2021
This MR fixes hashicorp#144 and masks `data_json` as sensitive.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
When running and trying to store generated secrets, the secrets are printed out on the screen during planning. This should be avoided as this is a security relevant providers that almost always will contain sensitive data. So by default they should not be printed out.
Related to: hashicorp/terraform#16643, hashicorp/terraform#8076
The text was updated successfully, but these errors were encountered: