You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Some values that need to be defined as terraform variables are sensitive and in my opinion, should not be printed out in StackStorm GUI and logs in a plain text. For example, client_secret is required in backend configuration or any sensitive data we want to set as terraform variable.
Is there any way of defining sensitive data in the current setup?
If there is no option of doing it, in my opinion, we should consider changing "backend" object in the "init" action and "variable_dict" object in other actions like "plan", "apply" and "destroy"
change proposal:
variable_dict:
type: "object"
description: "Terraform variable object (variables in here will overwrite any that are in files)"
required: false
secret: true
I found that enabling the “secret” flag for terraform variables does not solve all security challenges.
For example, when using private repositories, I have passed a git token as a system variable. The default stackstorm “env” dictionary is not secured and there is no “secret” flag that can be enabled, so the required git token is also displayed in plain text.
To enhance security for sensitive terraform variables and environment variables I decided to add an additional parameter called “env_variable_dict” to the “terraform” packs.
Using this single parameter we can pass sensitive terraform variables by setting “TF_VAR_ values and also use private git repositories by setting git token environment variable that will be masked in the UI and logs.
Please check out my PR and let me know if you find this feature useful for the community. #46
Some values that need to be defined as terraform variables are sensitive and in my opinion, should not be printed out in StackStorm GUI and logs in a plain text. For example, client_secret is required in backend configuration or any sensitive data we want to set as terraform variable.
Is there any way of defining sensitive data in the current setup?
If there is no option of doing it, in my opinion, we should consider changing "backend" object in the "init" action and "variable_dict" object in other actions like "plan", "apply" and "destroy"
change proposal:
Let me know please what you think about it.
I can make a pull request if you do agree with this proposal.
The text was updated successfully, but these errors were encountered: