-
-
Notifications
You must be signed in to change notification settings - Fork 160
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sensitive variables #266
Comments
Hello @salarali, what do you mean? Are you seeing sensitive variables that are not being masked, or are you seeing masked variables but would prefer to see the value? |
The later. I need to compare the plan output manually and an unable to do so because of the masking. |
Where do you see the masking?
|
Mostly looking at the PR comment. It looks something like this:
|
Oh, it seems I misunderstood the questions. I am not using any variables. I am just running terraform plan. And in the above comment, that is one of the outputs I see from the plan. |
The provider I am using is https://registry.terraform.io/providers/strongdm/sdm/latest/docs And the resource is |
I also see it for other providers:
|
What version of terraform are you using? |
1.4.6 |
I think this is coming from tfmask, which gets run on any plan output. It will mask any attribute with env:
TFMASK_VALUES_REGEX="(?i)^.*[^a-zA-Z](oauth|secret|token|password|key|result).*$" Let me know if that stops your id's from getting masked. |
That seems to be working. Thanks for pointing me in the correct direction. In the end, if it doesnt work, I can just use It would be great if this is a configurable option though. |
@dflook
|
If the variables are defined to be 'sensitive=true' they will be masked both by terraform and anywhere the sensitive values appear in the workflow log. All actions environment secrets are masked in the workflow log also. tfmask is doing extra masking on top of this. |
Just to clarify is this how to set
|
You would set it where the variable is defined, e.g. in a variable "aws_account" {
type = string
sensitive = true
} More details are here |
Suggestion
Would it be possible to make the masking of sensitive variables a configurable value for terraform-plan?
The text was updated successfully, but these errors were encountered: