Open
Description
Hi!
The http provider is leaking secrets on error, relevant source here: if err != nil {
It would be ideal to have this dump controlled via the log level.
Terraform Version
- 1.0.2
- 1.0.3
Affected Resource(s)
Please list the resources as a list, for example:
- http
Terraform Configuration Files
variable "super_sensitive_value" {
type = string
sensitive = true
default = "apparently_not_sensitive_enough"
}
data "http" "use_vault_result_in_a_call" {
url = var.super_sensitive_value
}
Debug Output
│ Error: Error making request: Get "apparently_not_sensitive_enough": unsupported protocol scheme ""
│
│ with data.http.use_vault_result_in_a_call,
│ on main.tf line 18, in data "http" "use_vault_result_in_a_call":
│ 18: data "http" "use_vault_result_in_a_call" {
Expected Behavior
The variable super_sensitive_value
is expected to be hidden from logs as its marked as sensitive.
Actual Behavior
The variable super_sensitive_value
is leaked to the log.
Steps to Reproduce
terraform apply
References
Metadata
Metadata
Assignees
Labels
No labels