You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This issue seems to be covering the same problem or request as hashicorp/terraform-plugin-sdk#201, so we're going to close it just to consolidate the discussion over there. Thanks!
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
ghost
locked and limited conversation to collaborators
Mar 29, 2020
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Terraform Version
Terraform Configuration Files
Expected Behavior
When making a change and running
terraform plan
the plan should hide all sensitive values.Actual Behavior
Running
terraform plan
on azurerm_kubernetes_cluster shows the kube_admin_config and kube_config sensitive values in clear text in plan. The kube_admin_config_raw is shown as sensitive value though. kube_admin_config[].password should be sensitive according to code (https://github.com/terraform-providers/terraform-provider-azurerm/blob/master/azurerm/resource_arm_kubernetes_cluster.go#L558)Plan output:
Steps to Reproduce
Make a change and run
terraform plan
. Output should show the sensitive value in clear text.The text was updated successfully, but these errors were encountered: