-
Notifications
You must be signed in to change notification settings - Fork 120
feat: add sensitive_request_headers
argument
#521
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
This seeks to address issue hashicorp#34 via `sensitive_request_headers`, which serves the same function as `request_headers`, but are denoted as sensitive and their values are obscured as `*****` in Terraform state. Signed-off-by: Mike Ball <[email protected]>
e1b4a01
to
0d4aa69
Compare
if strings.ToLower(name) == "host" { | ||
request.Host = header | ||
} | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
☝️ This and the line 348 loop could probably be DRY'd up :)
Hi @mdb 👋
Does wrapping your secret value in |
Hi @ansgarm - Thanks for the response!
I don't believe so;
|
This seeks to address issue #34 via
sensitive_request_headers
, which serves the same function asrequest_headers
, butsensitive_request_headers
are denoted as sensitive and their values are obscured as*****
in Terraform state.