From ba7679b6791a306a73062ddd5a00359452e152fc Mon Sep 17 00:00:00 2001 From: Paddy Date: Wed, 6 Nov 2019 17:05:09 -0800 Subject: [PATCH] website: Remove reference to the now-deprecated pgp_key provider design pattern --- website/docs/state/sensitive-data.html.md | 4 ---- 1 file changed, 4 deletions(-) diff --git a/website/docs/state/sensitive-data.html.md b/website/docs/state/sensitive-data.html.md index 8ecaf4ea9..854df573e 100644 --- a/website/docs/state/sensitive-data.html.md +++ b/website/docs/state/sensitive-data.html.md @@ -13,10 +13,6 @@ and your definition of "sensitive." The state contains resource IDs and all resource attributes. For resources such as databases, this may contain initial passwords. -Some resources (such as AWS IAM Access Keys) have options for PGP encrypting the -values within the state. This is implemented on a per-resource basis and -you should assume the value is plaintext unless otherwise documented. - When using local state, state is stored in plain-text JSON files. When using [remote state](/docs/state/remote.html), state is only ever held in memory when used by Terraform. It may be encrypted at rest but this depends on the specific remote state