You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please vote on this issue by adding a 馃憤 reaction to the original issue to help the community and maintainers prioritize this request
Please do not leave comments along the lines of "+1", "me too" or "any updates", they generate extra noise for issue followers and do not help prioritize the request
If you are interested in working on this issue or have submitted a pull request, please leave a comment and review the contribution guide to help.
Terraform will perform the following actions:
# azurerm_communication_service.acs is tainted, so must be replaced
-/+ resource "azurerm_communication_service""acs" {
~ id = "/subscriptions/***/resourceGroups/<rg>/providers/Microsoft.Communication/communicationServices/<comm_service>" -> (known after apply)
name = "<comm_service>"~ primary_connection_string = "endpoint=https://<comm_service>.europe.communication.azure.com/;accesskey=LyCpcTrjBJl" -> (known after apply)
~ primary_key = "AsKMyrpsdfoRnViXBOAB3BJl" -> (known after apply)
~ secondary_connection_string = "endpoint=https://<comm_service>.europe.communication.azure.com/;accesskey=FlIcA1KUBaM" -> (known after apply)
~ secondary_key = "BaMqkHACg2dssefsdAAAAZCSEX4x" -> (known after apply)
# (2 unchanged attributes hidden)
}
Plan: 1 to add, 0 to change, 1 to destroy.
Expected Behaviour
We expect primary_connection_string, primary_key, secondary_connection_string, secondary_key to be hidden in azurerm_communication_service.
Expected log:
Terraform will perform the following actions:
# azurerm_communication_service.acs is tainted, so must be replaced
-/+ resource "azurerm_communication_service" "acs" {
~ id = "/subscriptions/***/resourceGroups/<rg>/providers/Microsoft.Communication/communicationServices/<comm_service>" -> (known after apply)
name = "<comm_service>"
~ primary_connection_string = "******" -> (known after apply)
~ primary_key = "******" -> (known after apply)
~ secondary_connection_string = "******" -> (known after apply)
~ secondary_key = "******" -> (known after apply)
# (2 unchanged attributes hidden)
}
Plan: 1 to add, 0 to change, 1 to destroy.
Actual Behaviour
Azurerm_communication_service resource displays sensitive data that is hidden in azure portal:
primary_connection_string
primary_key
secondary_connection_string
secondary_key
Steps to Reproduce
terraform plan -destroy
terraform destroy
or
terraform apply
Important Factoids
No response
References
No response
The text was updated successfully, but these errors were encountered:
Thanks @MariiaDzhenkova for opening this issue to us, I agree with you, these fields should be considered as sensitive. I'll try to make a pr for this one.
Is there an existing issue for this?
Community Note
Terraform Version
1.9.1
AzureRM Provider Version
3.111.0
Affected Resource(s)/Data Source(s)
azurerm_communication_service
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
We expect primary_connection_string, primary_key, secondary_connection_string, secondary_key to be hidden in azurerm_communication_service.
Expected log:
Actual Behaviour
Azurerm_communication_service resource displays sensitive data that is hidden in azure portal:
Steps to Reproduce
terraform plan -destroy
terraform destroy
or
terraform apply
Important Factoids
No response
References
No response
The text was updated successfully, but these errors were encountered: