Skip to content

Commit 443d7dd

Browse files
Mark startup script as sensitive (#132)
* Mark startup script as sensitive Far from being an ideal solution, it will mitigate some plaintext secret leak issues. * Restyled by gofmt Co-authored-by: Restyled.io <commits@restyled.io>
1 parent f4c42fc commit 443d7dd

File tree

2 files changed

+10
-8
lines changed

2 files changed

+10
-8
lines changed

iterative/resource_machine.go

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -108,10 +108,11 @@ func machineSchema() *map[string]*schema.Schema {
108108
Computed: true,
109109
},
110110
"startup_script": &schema.Schema{
111-
Type: schema.TypeString,
112-
ForceNew: true,
113-
Optional: true,
114-
Default: "#!/bin/bash",
111+
Type: schema.TypeString,
112+
ForceNew: true,
113+
Optional: true,
114+
Default: "#!/bin/bash",
115+
Sensitive: true,
115116
},
116117
"aws_security_group": &schema.Schema{
117118
Type: schema.TypeString,

iterative/resource_runner.go

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -141,10 +141,11 @@ func resourceRunner() *schema.Resource {
141141
Sensitive: true,
142142
},
143143
"startup_script": &schema.Schema{
144-
Type: schema.TypeString,
145-
ForceNew: true,
146-
Optional: true,
147-
Default: "",
144+
Type: schema.TypeString,
145+
ForceNew: true,
146+
Optional: true,
147+
Default: "",
148+
Sensitive: true,
148149
},
149150
"aws_security_group": &schema.Schema{
150151
Type: schema.TypeString,

0 commit comments

Comments
 (0)