Open swagat2020 opened 2 years ago
Any update?
@swagat2020 for the time being you can fix this by removing the secret_version
output from the outputs.tf
file, or you can update the secret_version
output resource to include the parameter sensitive = true
. This should fix your issue while we get this pushed into the mainline code.
Thanks mate, it works :) changed it to output "secret_version" { description = "AWS SecretManager Secret Version resource" value = aws_secretsmanager_secret_version.secret sensitive = true }
On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson @.***> wrote:
@swagat2020 https://github.com/swagat2020 for the time being you can fix this by removing the secret_version output from the outputs.tf file, or you can update the secret_version output resource to include the parameter sensitive = true. This should fix your issue while we get this pushed into the mainline code.
— Reply to this email directly, view it on GitHub https://github.com/rhythmictech/terraform-aws-secretsmanager-secret/issues/15#issuecomment-1203293765, or unsubscribe https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA . You are receiving this because you were mentioned.Message ID: <rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@ github.com>
One more help I want, actually we're using the terratest framework, do you have the golang code for the same template? It'll be helpful :)
On Wed, Aug 3, 2022 at 11:36 AM swagat biswal @.***> wrote:
Thanks mate, it works :) changed it to output "secret_version" { description = "AWS SecretManager Secret Version resource" value = aws_secretsmanager_secret_version.secret sensitive = true }
On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson @.***> wrote:
@swagat2020 https://github.com/swagat2020 for the time being you can fix this by removing the secret_version output from the outputs.tf file, or you can update the secret_version output resource to include the parameter sensitive = true. This should fix your issue while we get this pushed into the mainline code.
— Reply to this email directly, view it on GitHub https://github.com/rhythmictech/terraform-aws-secretsmanager-secret/issues/15#issuecomment-1203293765, or unsubscribe https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA . You are receiving this because you were mentioned.Message ID: <rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@ github.com>
I want to bypass the secret name and value in runtime, how can I do that? Can you guide me on the same please.
On Wed, Aug 3, 2022 at 11:36 AM swagat biswal @.***> wrote:
Thanks mate, it works :) changed it to output "secret_version" { description = "AWS SecretManager Secret Version resource" value = aws_secretsmanager_secret_version.secret sensitive = true }
On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson @.***> wrote:
@swagat2020 https://github.com/swagat2020 for the time being you can fix this by removing the secret_version output from the outputs.tf file, or you can update the secret_version output resource to include the parameter sensitive = true. This should fix your issue while we get this pushed into the mainline code.
— Reply to this email directly, view it on GitHub https://github.com/rhythmictech/terraform-aws-secretsmanager-secret/issues/15#issuecomment-1203293765, or unsubscribe https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA . You are receiving this because you were mentioned.Message ID: <rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@ github.com>
Dear Team,
Thanks for being able to implement the terraform template using the github repository code.
Can you pls help me with, replica & rotation enabled under terraform template for secret manager secret.
Regards, Swagat
On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson @.***> wrote:
@swagat2020 https://github.com/swagat2020 for the time being you can fix this by removing the secret_version output from the outputs.tf file, or you can update the secret_version output resource to include the parameter sensitive = true. This should fix your issue while we get this pushed into the mainline code.
— Reply to this email directly, view it on GitHub https://github.com/rhythmictech/terraform-aws-secretsmanager-secret/issues/15#issuecomment-1203293765, or unsubscribe https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA . You are receiving this because you were mentioned.Message ID: <rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@ github.com>
While doing the plan its asking for few parameters like:
var.name Name of secret to store
I've passed the value as default-secret
var.value Secret value to store
Enter a value: I've passed the value as- password.
I'm getting the below exception, can you pls kindly help me here?