-
Notifications
You must be signed in to change notification settings - Fork 99
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DXE-4201 akamai_cloudaccess_key should handle cloud_secret_access_key as sensitive value #580
Comments
Hello @rolmo, We are aware that secret was visible on I will create ticket to make them sensitive on schema level, and align it to our import/export logic, but in meantime as I noticed that you are using .var file to may add Additionally I would like to warn, that even though we will make this secret sensitive on schema level, it can be viewed in state file. It is stored in state as plain text. Storing sensitive values in state is commonly known issue in Terraform community, and the only recommendation we may provide to store state file in secure place, and not reveal it. We also mention it in our CAM documentation. If you will have any additional questions, please ask we will do our best to reply to them. Regards, |
Hi Michał, okay, marking the variable with "sensitive=true" helps here. We can use the resource this way. And yes, i know about the stored secrets in state file - but our state files are much more protected then the output of the Github actions. |
Hi @rolmo, this issue has been addressed in recent release. |
Hi there,
akamai_cloudaccess_key should handle cloud_secret_access_key as sensitive value
Terraform and Akamai Terraform Provider Versions
Affected Resource(s)
Terraform Configuration Files
Debug Output
A
terraform apply
shows this output:Expected Behavior
At least the
cloud_secret_access_key
should handled as "sensitive"Actual Behavior
The key is displayed - and thus also stored in the output of our CI/CD (Github Action) and can be viewed by many users.
This is a blocker and prohibits the use of this Terraform resource!
The text was updated successfully, but these errors were encountered: