-
Notifications
You must be signed in to change notification settings - Fork 0
fix: mark secrets as sensitive (Sensitive: true). #145
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Co-authored-by: Copilot <[email protected]> Signed-off-by: btfhernandez <[email protected]>
Co-authored-by: Copilot <[email protected]> Signed-off-by: btfhernandez <[email protected]>
Co-authored-by: Copilot <[email protected]> Signed-off-by: btfhernandez <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR enhances security by marking secret values as sensitive in Terraform schemas and outputs to prevent them from being displayed in logs or CLI output. It also updates documentation to clarify the purpose of the api_account_name
parameter.
Key changes:
- Added
Sensitive: true
to all schema fields containing sensitive data (passwords, secrets, file content) - Added
sensitive = true
to Terraform outputs containing secret values - Updated documentation to clarify the role of
api_account_name
in authorization
Reviewed Changes
Copilot reviewed 7 out of 7 changed files in this pull request and generated 1 comment.
Show a summary per file
File | Description |
---|---|
terraform/main.tf | Added sensitive flags to outputs and corrected account name reference |
providers/provider_sdkv2/secrets.go | Marked value, password, text, and file_content fields as sensitive |
providers/provider_sdkv2/provider.go | Updated description for api_account_name parameter |
providers/provider_sdkv2/managed_account.go | Marked value field as sensitive in managed account schema |
providers/provider_sdkv2/common.go | Marked password field as sensitive in managed account schema |
providers/provider_framework/provider.go | Updated description for api_account_name parameter |
docs/index.md | Updated documentation for api_account_name parameter |
Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.
Merging this branch will not change overall coverage
Coverage by fileChanged files (no unit tests)
Please note that the "Total", "Covered", and "Missed" counts above refer to code statements instead of lines of code. The value in brackets refers to the test coverage of that file in the old version of the code. |
Merging this branch will not change overall coverage
Coverage by fileChanged files (no unit tests)
Please note that the "Total", "Covered", and "Missed" counts above refer to code statements instead of lines of code. The value in brackets refers to the test coverage of that file in the old version of the code. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 👏
Purpose of the PR
Mark secrets as sensitive (Sensitive: true).
According to ticket
https://beyondtrust.atlassian.net/browse/BIPS-28983
Summary of changes: