3083 bugs terraform google gcp cloud native drupal resources module #10
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
User description
As detailed here: hashicorp/terraform#30633 (comment)
PR Type
Bug fix, Enhancement
Description
templatefile
function, which could potentially expose sensitive information in the Terraform state.local-exec
provisioner configuration by using theenvironment
block to pass variables to the script, reducing the risk of secret exposure.Changes walkthrough 📝
main.tf
Improve security and simplify SQL user provisioning
main.tf
templatefile
function with direct script executionenvironment
block for better securitylocal-exec
provisioner configuration