New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security: Obfuscate secret env vars in tf plan output for apps #554
Comments
ChiefMateStarbuck
added a commit
that referenced
this issue
Jan 19, 2021
apps: Mark env var values as sensitive (Closes: #554).
andrewsomething
added a commit
that referenced
this issue
Apr 26, 2021
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Terraform Version
Affected Resource(s)
Transistive dependencies
Terraform Configuration Files
Expected Behavior
Secret values should be redacted, replaced or obfuscated.
Actual Behavior
The tf plan is showing the value of an env var that is marked secret:
I've killed this user and regenerated password for bug reporting purposes.
Steps to Reproduce
digitalocean_database_cluster
anddigitalocean_database_user
resourcedigitalocean_app
resource and reference the db user in a secret env varterraform plan
Important Factoids
Because I use an e2e gitops flow for everything in my project leaking secret env vars into Github or the CI would be too much of a security risk for me. By not being able to do this I wouldn't be able to stand an e2e test environment up automatically as the app couldn't reference the database user / pass.
References
hashicorp/terraform#20051 (comment)
The text was updated successfully, but these errors were encountered: