Skip to content

Commit

Permalink
Make outputs sensitive when they contain a secret
Browse files Browse the repository at this point in the history
  • Loading branch information
saliceti committed Jan 14, 2025
1 parent ae970d0 commit 3dcd124
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 1 deletion.
1 change: 1 addition & 0 deletions aks/cluster_data/outputs.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ output "kubernetes_client_key" {
value = (local.azure_RBAC_enabled ? null :
base64decode(data.azurerm_kubernetes_cluster.main.kube_config.0.client_key)
)
sensitive = true
}

output "kubernetes_cluster_ca_certificate" {
Expand Down
3 changes: 2 additions & 1 deletion aks/secrets/outputs.tf
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
output "map" {
value = { for key, secret in data.azurerm_key_vault_secret.main : key => secret.value }
value = { for key, secret in data.azurerm_key_vault_secret.main : key => secret.value }
sensitive = true
}

0 comments on commit 3dcd124

Please sign in to comment.