Skip to content

Commit 96ed9a6

Browse files
feat: Make private_key_data sensitive (#144)
While I was importing the serviceaccount resources, I noticed that it echoes the private_key_data to the console during a terraform plan. Co-authored-by: Rui Fu <[email protected]>
1 parent e001371 commit 96ed9a6

File tree

2 files changed

+2
-0
lines changed

2 files changed

+2
-0
lines changed

cloud/data_source_service_account.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,7 @@ func dataSourceServiceAccount() *schema.Resource {
6363
Type: schema.TypeString,
6464
Description: descriptions["private_key_data"],
6565
Computed: true,
66+
Sensitive: true,
6667
},
6768
},
6869
}

cloud/resource_service_account.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,7 @@ func resourceServiceAccount() *schema.Resource {
8484
Type: schema.TypeString,
8585
Description: descriptions["private_key_data"],
8686
Computed: true,
87+
Sensitive: true,
8788
},
8889
},
8990
Timeouts: &schema.ResourceTimeout{

0 commit comments

Comments
 (0)