The OpenAPI Terraform provider should not log the payload received from a resource provider's API in case there are secrets included in the response.
To Reproduce
Run a Terraform command with debugging enabled (for example, TF_LOG=DEBUG terraform refresh) on a tf file with a resource that has sensitive properties returned by the resource API.
Scenario:
Given a tf file containing resources with sensitive properties
When running the file in debug mode (eg: TF_LOG=DEBUG terraform refresh)
Then the OpenAPI provider plugin should not log the resource API's response payload in case sensitive properties are returned
Checklist (for admin only)
Don't forget to go through the checklist to make sure the issue is created properly:
[x] I have added a corresponding label (bug) to the issue (right side menu)
[x] I have added this issue to the 'API Terraform Provider' GitHub project (right side menu)
Describe the bug
The OpenAPI Terraform provider should not log the payload received from a resource provider's API in case there are secrets included in the response.
To Reproduce
Run a Terraform command with debugging enabled (for example,
TF_LOG=DEBUG terraform refresh
) on a tf file with a resource that has sensitive properties returned by the resource API.Example:
Expected behaviour
Checklist (for admin only)
Don't forget to go through the checklist to make sure the issue is created properly: