Hello
For an OSS project (with public CI/CD), I’m using the cognito_identity_provider
resource from the AWS
provider.
To configure this resource I have to provide the client_id
and the client_secret
inside the provider_details
attribute, and those informations are not marked as sensitive.
I looked at the code and discovered that provider_details
is of type schema.TypeMap
which makes impossible to mark client_id
and client_secret
as sensitive.
Is there any way to secure informations in this case ?
Hi @VEBERArnaud,
It seems like the provider treats this map as an opaque collection of values to send verbatim to the remote API, so it can’t distinguish sensitive elements from non-sensitive elements.
However, given that the document purpose of provider_details
is to include client secrets and/or access tokens, the provider could potentially just mark that entire map as sensitive, which would then obscure any attribute inside it.
I’d suggest opening a feature request in the AWS provider repository if there isn’t one for this already, to start a discussion about the tradeoffs of marking this map as sensitive. The provider maintainers may have had a good reason for not marking this as sensitive, but it could also have just been an oversight, so opening an issue will be an opportunity to revisit that and see.