-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: data ssm_parameter.value should not be sensitive #31590
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
output "all" { sensitive = true to the output definition, you confirm that the output contains sensitive data and that you intend to export it. This prevents accidental exposure of sensitive information in Terraform outputs. |
But the output does not contain sensitive data, nor is it ever likely to contain sensitive data. That's what |
output "all" { ignore_changes = true, you inform Terraform to ignore any modifications to the output value during plan and apply operations. This can help bypass the sensitivity check if you are certain that the output doesn't contain sensitive information. data "aws_ssm_parameter" "not_sensitive" { output "all" { |
Hey @elduds 👋 Thank you for taking the time to raise this! In this case, the sensitivity is defined at the resource schema level. This is something that the plugin SDK does not currently support toggling dynamically based on something like whether the Interestingly, I've found a feature request on the plugin SDK repository (hashicorp/terraform-plugin-sdk#736) for this exact thing (so much so that the example is precisely what you're calling out here). On that issue, a workaround is called out using the Given that this is an upstream limitation, and not a bug within the provider, I'll close this issue for now. If you feel I've done this in error, please do let me know. |
Awesome, thanks @justinretzolk . I was unaware of |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Terraform Core Version
all
AWS Provider Version
all
Affected Resource(s)
aws_ssm_parameter
Expected Behavior
the
value
attribute of https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ssm_parameter should not be marked as sensitive if thetype
of the parameter isString
.If the
type
is set toSecureString
, assume the value to be sensitive.Actual Behavior
This value is always marked as sensitive, regardless of type.
This makes planning and debugging far more difficult than it should be for no corresponding value / increase in security.
Relevant Error/Panic Output Snippet
Terraform Configuration Files
Steps to Reproduce
attempt to plan the above tf code
Debug Output
No response
Panic Output
No response
Important Factoids
No response
References
https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ssm_parameter
Would you like to implement a fix?
None
The text was updated successfully, but these errors were encountered: