-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Getting error while executing the code with command "terraform plan", getting the below exception. #15
Labels
bug
Something isn't working
Comments
swagat2020
changed the title
Getting while executing the code with command "terraform plan", getting the below exception.
Getting error while executing the code with command "terraform plan", getting the below exception.
Jul 31, 2022
Any update? |
@swagat2020 for the time being you can fix this by removing the |
Thanks mate, it works :)
changed it to
output "secret_version" {
description = "AWS SecretManager Secret Version resource"
value = aws_secretsmanager_secret_version.secret
sensitive = true
}
…On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson ***@***.***> wrote:
@swagat2020 <https://github.com/swagat2020> for the time being you can
fix this by removing the secret_version output from the outputs.tf file,
or you can update the secret_version output resource to include the
parameter sensitive = true. This should fix your issue while we get this
pushed into the mainline code.
—
Reply to this email directly, view it on GitHub
<#15 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA>
.
You are receiving this because you were mentioned.Message ID:
<rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@
github.com>
|
One more help I want, actually we're using the terratest framework, do you
have the golang code for the same template?
It'll be helpful :)
On Wed, Aug 3, 2022 at 11:36 AM swagat biswal ***@***.***>
wrote:
… Thanks mate, it works :)
changed it to
output "secret_version" {
description = "AWS SecretManager Secret Version resource"
value = aws_secretsmanager_secret_version.secret
sensitive = true
}
On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson ***@***.***>
wrote:
> @swagat2020 <https://github.com/swagat2020> for the time being you can
> fix this by removing the secret_version output from the outputs.tf file,
> or you can update the secret_version output resource to include the
> parameter sensitive = true. This should fix your issue while we get this
> pushed into the mainline code.
>
> —
> Reply to this email directly, view it on GitHub
> <#15 (comment)>,
> or unsubscribe
> <https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA>
> .
> You are receiving this because you were mentioned.Message ID:
> <rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@
> github.com>
>
|
I want to bypass the secret name and value in runtime, how can I do that?
Can you guide me on the same please.
On Wed, Aug 3, 2022 at 11:36 AM swagat biswal ***@***.***>
wrote:
… Thanks mate, it works :)
changed it to
output "secret_version" {
description = "AWS SecretManager Secret Version resource"
value = aws_secretsmanager_secret_version.secret
sensitive = true
}
On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson ***@***.***>
wrote:
> @swagat2020 <https://github.com/swagat2020> for the time being you can
> fix this by removing the secret_version output from the outputs.tf file,
> or you can update the secret_version output resource to include the
> parameter sensitive = true. This should fix your issue while we get this
> pushed into the mainline code.
>
> —
> Reply to this email directly, view it on GitHub
> <#15 (comment)>,
> or unsubscribe
> <https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA>
> .
> You are receiving this because you were mentioned.Message ID:
> <rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@
> github.com>
>
|
Dear Team,
Thanks for being able to implement the terraform template using the github
repository code.
Can you pls help me with, replica & rotation enabled under terraform
template for secret manager secret.
Regards,
Swagat
…On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson ***@***.***> wrote:
@swagat2020 <https://github.com/swagat2020> for the time being you can
fix this by removing the secret_version output from the outputs.tf file,
or you can update the secret_version output resource to include the
parameter sensitive = true. This should fix your issue while we get this
pushed into the mainline code.
—
Reply to this email directly, view it on GitHub
<#15 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA>
.
You are receiving this because you were mentioned.Message ID:
<rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@
github.com>
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
While doing the plan its asking for few parameters like:
var.name
Name of secret to store
I've passed the value as default-secret
var.value
Secret value to store
Enter a value:
I've passed the value as- password.
I'm getting the below exception, can you pls kindly help me here?
The text was updated successfully, but these errors were encountered: