-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: Ability to declare & mask sensitive data in the output of "terraform show" command. #16643
Comments
This request extends to ALL possible output paths of terraform -- logs and Right now, I realize it isn't quite that easy :) but am trying to point out the bigger picture of wanting to close all SPI leakages. |
Hi @ashishth09, @davetropeano, Currently Terraform has a couple mechanisms for redacting sensitive information:
In the short term, if you find a provider attribute that is documented as accepting or producing a secret and it doesn't appear as Currently these features are limited only to the "main workflow" ( I understand that there is a subtlety here between what Terraform might consider "sensitive" (attributes that are documented as containing passwords, private keys, etc) and what a business might consider sensitive (personal information about individuals, account numbers that might be used to aid some other attack, etc). Terraform cannot currently model the latter, and will not be able to in the short term. We have a longer-term plan to perform static analysis on interpolations within the configuration to infer when one value is derived from another value that is marked as sensitive, so the It's not clear at this time whether |
Defining input variables as sensitive in order to redact the values from UI output is now available in 0.14! A recent blog post has more information on this feature, and I'll be closing this one as a result! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
We have a service wrapped around terraform and the users of the service don't have access to the state file. The service runs
terraform show
and displays all the info from the state file in some UI logs. We want a mechanism to allow writers of the tf file to specify which fields should be shown in the output of the command.The text was updated successfully, but these errors were encountered: