You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are aware that secret was visible on terraform apply. Some features like import and export even base on comparison of access key secret to value which we have in exported configuration. But you are right, that we did not consider that terraform logs maybe reveled in Github actions output.
I will create ticket to make them sensitive on schema level, and align it to our import/export logic, but in meantime as I noticed that you are using .var file to may add sensitive = true flag to these variables, to hide them in cli output as temporary solution.
Additionally I would like to warn, that even though we will make this secret sensitive on schema level, it can be viewed in state file. It is stored in state as plain text. Storing sensitive values in state is commonly known issue in Terraform community, and the only recommendation we may provide to store state file in secure place, and not reveal it. We also mention it in our CAM documentation.
If you will have any additional questions, please ask we will do our best to reply to them.
okay, marking the variable with "sensitive=true" helps here. We can use the resource this way. And yes, i know about the stored secrets in state file - but our state files are much more protected then the output of the Github actions.
mimazaka
changed the title
akamai_cloudaccess_key should handle cloud_secret_access_key as sensitive value
DXE-4201 akamai_cloudaccess_key should handle cloud_secret_access_key as sensitive value
Sep 17, 2024
Hi there,
akamai_cloudaccess_key should handle cloud_secret_access_key as sensitive value
Terraform and Akamai Terraform Provider Versions
Affected Resource(s)
Terraform Configuration Files
Debug Output
A
terraform apply
shows this output:Expected Behavior
At least the
cloud_secret_access_key
should handled as "sensitive"Actual Behavior
The key is displayed - and thus also stored in the output of our CI/CD (Github Action) and can be viewed by many users.
This is a blocker and prohibits the use of this Terraform resource!
The text was updated successfully, but these errors were encountered: