-
Notifications
You must be signed in to change notification settings - Fork 888
Hide secret parameters in workspace creation and template insights #13472
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Related to coder/terraform-provider-coder#194 |
We should do this. Thanks @michaelbrewer! |
I am up for any kind of solution that can be done in the short term:
|
@michaelbrewer why do you want to use a |
For insights there should at least be a way for Some secrets only an end-user will know. So user level secret management would work, whether we do this via a Hashicorp value or AWS KMS or AWS Secret Manager, would be fine. Yes, the fact the end-user even needs to know a secret is probably not good. But sometimes where is no way round it, and this would be user-scoped secrets, and not service user accounts for deployments. In some cases, integration could be handled at the provider level (like nexus) or via OpenID Connect level like Git and Artifactory. Regarding a template:
I have logged and voted for various related issues, but this feature exposes all coder_parameters in a single api call or page. |
This is a great request we get pretty frequently. Will be a part of our Magic Parameters effort. |
Is there an option to hide or mask
coder_parameter
which might be sensitive in the Workspace template insights?Order of preference:
coder_parameter
from workspace template insightscoder_parameter
in generalThe text was updated successfully, but these errors were encountered: