Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Display Sink Configs In Terraform Plan with sensitive values #124

Open
asher-goldberg opened this issue Jul 30, 2024 · 0 comments
Open

Display Sink Configs In Terraform Plan with sensitive values #124

asher-goldberg opened this issue Jul 30, 2024 · 0 comments

Comments

@asher-goldberg
Copy link

Community Note

  • Please vote on this issue by adding a
    👍 reaction to the original
    issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra
    noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Description

When using the provider to create Snowflake sinks, the private_key attribute within the configs block is sensitive, causing Terraform to treat the entire configs attribute as a sensitive value.
This makes it impossible to know what might actually be changing. For example, this plan included multiple changes to the buffer size and batch time, but we'd never know that because the whole configs key is sensitive and not viewable.

Terraform will perform the following actions:

  # module.pulsar_snowflake_ingestion_telemetry_sink.pulsar_sink.sink will be updated in-place
  ~ resource "pulsar_sink" "sink" {
      ~ configs                          = (sensitive value)
        id                               = "public/default/snowflake-ingestion-telemetry"
        name                             = "snowflake-ingestion-telemetry"
        # (18 unchanged attributes hidden)

        # (1 unchanged block hidden)

If there was a way to display the whole config, but just mark the private key as sensitive that would be great.

New or Affected Resource(s)

  • pulsar_sinks

Potential Terraform Configuration

# Copy-paste your Terraform configurations here - for large Terraform configs,
# please use a service like Dropbox and share a link to the ZIP file. For
# security, you can also encrypt the files using our GPG public key.

References

  • #0000
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant