Replies: 11 comments
-
|
Hello @schammah Could you provide some more details around this?
I'd be happy to discuss this thoroughly with you and make any necessary improvements that we can agree upon :) |
Beta Was this translation helpful? Give feedback.
-
|
@schammah Hello 👋 |
Beta Was this translation helpful? Give feedback.
-
|
hi @duedares-rvj my reference is about variable assigned with
in this case i read the secret from a data source defined as replacing this with: would break and is the answer for #2 So with data source works, but then the problem is in this case the secret is also stored in the state file, using ephemeral allow you to read secrets and apply them to the resources without them being stored in the state file, which pose a security risk. to resolve this you would need to define fields that can be ephemeral in your provider schema |
Beta Was this translation helpful? Give feedback.
-
|
Having absolutely the same problem - in exactly the same place (connection resource, It would be great to have these ephemeral values support especially for Auth0 provider of all - just by the nature of the thing people are very very likely to use secrets in TF scripts to provide configuration for connections, etc. The original issue by me was opened in main TF repo: hashicorp/terraform#37202 |
Beta Was this translation helpful? Give feedback.
-
|
@schammah @dzmitry-kankalovich Thank you guys for laying out the use case here. I don't have strict timelines at this point, but expect to hear back from us soon! |
Beta Was this translation helpful? Give feedback.
-
|
@duedares-rvj ... |
Beta Was this translation helpful? Give feedback.
-
|
As far as I can see there's currently no se secure mechanism to "ship" a client secret to some sort of vault infrastructure via Terraform. Ephemeral values and resources are made for exactly that, so having support for this in the Auth0 provider shouldn't just be a nice-to-have, but actually should have been supported from the get going for an infrastructure piece which is supposed to be central to security. |
Beta Was this translation helpful? Give feedback.
-
|
@duedares-rvj Have you since gotten any insights on when the Auth0 provider might support write-only attributes, so that we can take advantage of ephemeral values functionality? 🙇 |
Beta Was this translation helpful? Give feedback.
-
|
I'm currently working on cleaning up our state files to remove all sensitive values and this exact issue has come up for me as well. In my case, the See: https://developer.hashicorp.com/terraform/language/manage-sensitive-data/write-only Using the GCP provider's |
Beta Was this translation helpful? Give feedback.
-
|
Hello again everyone 👋 Regarding this issue: To address this, we’re already in the process of redesigning the options schema. Instead of keeping everything bundled into a single large block, we plan to separate the attributes based on connection type. This will give us better granularity, clearer schema definitions, and more flexibility for features like WriteOnly. But I currently cannot provide specific timelines on this. That said, we are actively identifying sensitive attributes that can support the WriteOnly tag, and we plan to introduce the corresponding _wo and _wo_version fields for those attributes. This work is already on our roadmap and part of our ongoing schema improvements. Happy to clarify anything further. |
Beta Was this translation helpful? Give feedback.
-
|
Hi everyone, We want to update you on our progress regarding ephemeral values in the Auth0 Terraform provider. However, please note that for Auth0 connections, we won’t be supporting WriteOnly attributes immediately, as described in my previous comment. Also, we’re moving this from a generic issue to a dedicated discussion thread so that we can gather more community input on which attributes should be marked as WriteOnly in the future. We’re excited to collaborate and refine this process based on your feedback. Thank you for your patience and support as we continue to improve the provider! |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Checklist
Describe the problem you'd like to have solved
The Auth0 Terraform provider should support Terraform 1.10's ephemeral values to ensure that secrets retrieved provided in some resources are never persisted in Terraform state or plan files. This is a critical improvement for organizations that need to enforce strict security policies while managing secrets in their infrastructure.
Describe the ideal solution
The Provider Supports that
and variables can be defined with
ephemeral=truewithout failing on errors such as:Ephemeral values are not valid for "secrets", because it is not an assignable attribute.Alternatives and current workarounds
No response
Additional context
No response
Beta Was this translation helpful? Give feedback.
All reactions