-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sanitize kube_admin_config in terraform plan/apply output #4105
Comments
Submitted a PR for this: #4107 |
Since this issue has been reported a long time ago and relates to the version of provider we no longer support - I'm going to close it. Please open a new updated bug report on current versions of terraform and provider if this is still relevant. Thank you. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
This is still a valid issue in the latest version of the provider, as such we've opened a PR to add a flag that will mark the entire block as sensitive as a stop gap measure #13732 without breaking any existing users - for 3.0 we'll remove the flag and make this the default behaviour unless the underlying bug in the plugin-sdk is resolved. |
Hey folks. #13732 doesn't appear to work for printing of state values during data reads. Example (redacted by me, fully readable in the GHA logs): We are using provider 2.82.0 and running in Terraform Cloud
EDIT: We think a 'final apply' with everything having the env var set seems to have updated the Cloud state so that it no longer prints these on plans. So is there anything we could have done to prevent the 'first-time' logging of these values? |
This functionality has been released in v3.0.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Terraform (and AzureRM Provider) Version
Affected Resource(s)
azurerm_kubernetes_cluster
Terraform Configuration Files
Expected Behavior
When running
terraform plan
orterraform apply
I should not be able to see the attributes forkube_admin_config
, much likekube_admin_config_raw
is sanitized.Actual Behavior
If run
terraform plan
to create an AKS cluster with terraformv0.12.6
, the output forkube_admin_config
is shown unsanitized in the output of aterraform plan
. Oddly,kube_admin_config_raw
is sanitized. Both should be sanitized because as of this moment someone with only cluserUser access could easily view the job output in our CI platform and grab the admin credentials, thus bypassing RBAC.Steps to Reproduce
terraform plan
The text was updated successfully, but these errors were encountered: