provider/aws: Mark password fields as sensitive (#13147)

This commit is contained in:
Radek Simko 2017-03-29 11:15:22 +01:00 committed by GitHub
parent 55230c03df
commit 5db819d852
5 changed files with 17 additions and 11 deletions

View File

@ -48,6 +48,7 @@ func resourceAwsApiGatewayDomainName() *schema.Resource {
Type: schema.TypeString,
ForceNew: true,
Optional: true,
Sensitive: true,
ConflictsWith: []string{"certificate_arn"},
},

View File

@ -36,6 +36,7 @@ func resourceAwsDirectoryServiceDirectory() *schema.Resource {
Type: schema.TypeString,
Required: true,
ForceNew: true,
Sensitive: true,
},
"size": &schema.Schema{
Type: schema.TypeString,

View File

@ -152,6 +152,7 @@ func resourceAwsKinesisFirehoseDeliveryStream() *schema.Resource {
"password": {
Type: schema.TypeString,
Required: true,
Sensitive: true,
},
"role_arn": {

View File

@ -104,6 +104,7 @@ func resourceAwsOpsworksApplication() *schema.Resource {
"password": {
Type: schema.TypeString,
Optional: true,
Sensitive: true,
},
"revision": {
@ -189,6 +190,7 @@ func resourceAwsOpsworksApplication() *schema.Resource {
"private_key": {
Type: schema.TypeString,
Required: true,
Sensitive: true,
StateFunc: func(v interface{}) string {
switch v.(type) {
case string:

View File

@ -113,6 +113,7 @@ func resourceAwsOpsworksStack() *schema.Resource {
"password": {
Type: schema.TypeString,
Optional: true,
Sensitive: true,
},
"revision": {