#309 was the first change in Terraform that I could find that moved to store sensitive values in state files, in this case the password
value for Amazon RDS. This was a bit of a surprise for me, as previously I've been sharing our state files publicly. I can't do that now, and feel pretty nervous about the idea of storing state files in version control at all (and definitely can't put them on github or anything).
If Terraform is going to store secrets, then some sort of field-level encryption should be built in as well. In the meantime, I'm going to change things around to use https://github.com/AGWA/git-crypt on sensitive files in my repos.
rmldsky, gtramontina, dhait, ajlanghorn, Almad and 529 morekorncola and jorgetovarmanjitkumar, rowi1de, aucampia, brentcetinich, TryTryAgain and 1 more
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4