We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
We should ensure that the following attributes are marked as sensitive.
I have seen an example in hcp-terraform-provider where they return data.hcp_vault_secrets_secret.example.secret_value as a sensitive value.
hcp-terraform-provider
data.hcp_vault_secrets_secret.example.secret_value
A related code snippet for this is:
https://github.com/hashicorp/terraform-provider-hcp/blob/d58d335805f6c67ecd26d547afdc10273aa96709/internal/provider/vaultsecrets/data_source_vault_secrets_secret.go#L54-L58
We are already doing it for
data.coder_workspace_owner.me.ssh_private_key
coder_agent.example.token
We should also do it for
data.coder_workspace_owner.me.oidc_access_token
data.coder_workspace_owner.me.session_token
data.coder_external_auth.example.access_token
The text was updated successfully, but these errors were encountered:
No branches or pull requests
We should ensure that the following attributes are marked as sensitive.
I have seen an example in
hcp-terraform-provider
where they returndata.hcp_vault_secrets_secret.example.secret_value
as a sensitive value.A related code snippet for this is:
https://github.com/hashicorp/terraform-provider-hcp/blob/d58d335805f6c67ecd26d547afdc10273aa96709/internal/provider/vaultsecrets/data_source_vault_secrets_secret.go#L54-L58
We are already doing it for
data.coder_workspace_owner.me.ssh_private_key
coder_agent.example.token
We should also do it for
data.coder_workspace_owner.me.oidc_access_token
data.coder_workspace_owner.me.session_token
data.coder_external_auth.example.access_token
The text was updated successfully, but these errors were encountered: