Closed whoracle closed 7 hours ago
Voting for Prioritization
Volunteering to Work on This Issue
Hey @whoracle 👋 Thank you for taking the time to raise this! I agree that this should probably be marked as sensitive, so I'm going to leave this open for someone from the team or community to pick up.
You may already know this, but in case anyone else comes across this issue, I did want to mention that the password
attribute will only ever be populated by a random password that the AWS Provider generates on resource creation (it's not possible to read the current value from the upstream API), and is only populated if the pgp_key
argument is not populated. Because of this, supplying pgp_key
or setting password_reset_required
to true
can help mitigate some of the problem in the meantime.
Hi all, I have some capacity left and would like into this.
[!WARNING] This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them.
Ongoing conversations amongst community members are welcome, however, the issue will be locked after 30 days. Moving conversations to another venue, such as the AWS Provider forum, is recommended. If you have additional concerns, please open a new issue, referencing this one where needed.
Terraform Core Version
1.55
AWS Provider Version
5.35.0
Affected Resource(s)
Expected Behavior
field
password
should be marked assensitive
, and thus not be shown in plan outputs.Actual Behavior
The content of field
password
is shown interraform plan
output, for example whenplan
ning to delete a resource.Relevant Error/Panic Output Snippet
Terraform Configuration Files
Steps to Reproduce
aws_iam_user_login_profile
terraform apply
terraform plan
Debug Output
No response
Panic Output
No response
Important Factoids
No response
References
No response
Would you like to implement a fix?
None