You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mcasperson
changed the title
Save terraform sensitive values as Octopus sensitive values
Save terraform sensitive values as Octopus sensitive values (CVE-2019-8944)
Feb 20, 2019
This thread has been automatically locked since there has not been any recent activity after it was closed. If you think you've found a related issue, please contact our support team so we can triage your issue, and make sure it's handled appropriately.
lockbot
locked as resolved and limited conversation to collaborators
May 21, 2019
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Sensitive Terraform output variables are saved and exposed as regular variables, and printed in the logs.
For example, if you deploy the following Terraform template:
The value
hi
would appear in the logs.The text was updated successfully, but these errors were encountered: