Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Codepipeline OAuthToken property inside source configuration should be sensitive #4768

Closed
manemarron opened this issue Jun 6, 2018 · 4 comments · Fixed by #14175
Closed
Assignees
Labels
enhancement Requests to existing resources that expand the functionality or scope. service/codepipeline Issues and PRs that pertain to the codepipeline service.
Milestone

Comments

@manemarron
Copy link

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Terraform Version

Terraform v0.11.7

  • provider.aws v1.22.0

Affected Resource(s)

  • aws_codepipeline

Terraform Configuration Files

resource "aws_codepipeline" "pipeline" {
  # ...
  stage {
    name = "Source"

    action {
      name             = "Source"
      category         = "Source"
      owner            = "ThirdParty"
      provider         = "GitHub"
      version          = "1"
      output_artifacts = ["code"]

      configuration {
        Owner                = "owner"
        Repo                 = "repo"
        Branch               = "master"
        PollForSourceChanges = false
        OAuthToken           = "<REDACTED>"
      }
    }
  }
}

Expected Behavior

stage.0.action.0.configuration.OAuthToken should appear as sensitive in terraform plan and apply

Actual Behavior

stage.0.action.0.configuration.OAuthToken value is shown in plan and apply.

Steps to Reproduce

  1. terraform plan -out=plan
  2. terraform apply plan

References

@radeksimko radeksimko added service/codepipeline Issues and PRs that pertain to the codepipeline service. enhancement Requests to existing resources that expand the functionality or scope. labels Jun 13, 2018
@bflad bflad added this to the v3.0.0 milestone Jan 11, 2020
@ghost
Copy link

ghost commented Jul 31, 2020

This has been released in version 3.0.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.

For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks!

@fishfacemcgee
Copy link
Contributor

fishfacemcgee commented Aug 13, 2020

@gdavison @bflad PR #14175 claims to fix this issue, but as far as I can tell, nothing has changed with the GitHub OAuth Token being treated as sensitive in that PR. A change was made to make the whole block sensitive but was later reverted.

Can you clarify how this issue is supposed to be fixed and/or what I've missed?

@fishfacemcgee
Copy link
Contributor

Alternatively, if any advice could be provided around using ignore_changes to limit handling around the OAuth token exclusively, that'd at least be a good workaround. Right now, we have to ignore the whole configuration block, which means changing branch and the like has to be done by hand.

@ghost
Copy link

ghost commented Aug 30, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks!

@ghost ghost locked and limited conversation to collaborators Aug 30, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement Requests to existing resources that expand the functionality or scope. service/codepipeline Issues and PRs that pertain to the codepipeline service.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants