-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_key_vault_secret omit value from tfstate #7857
Comments
Hi @mrdavidkendall , I think this is not only about |
Thanks for opening this issue - apologies for the delayed response here. Unfortunately this needs to be fixed in Terraform Core, rather than the Provider - since these values get stored in the state by default. Support for Encrypted Values in the State File is being tracked in this issue and Encrypting the Statefile is being tracked in this issue within Terraform Core - would you mind subscribing to those issues for updates, where once this is fixed this'll be available for all Providers? Thanks! |
Thanks @tombuildsstuff. I have subscribed to those other issues. Encrypting the state file would make this incrementally better, but I think I'm still curious as to why the secret value needs to be store on the file system at all. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 hashibot-feedback@hashicorp.com. Thanks! |
Community Note
Description
Since secrets have versions with id's, there is no strong reason to store the secret value in tfstate. This is a large security concern and should be a high priority.
New or Affected Resource(s)
The text was updated successfully, but these errors were encountered: