Skip to content
This repository has been archived by the owner on Feb 15, 2024. It is now read-only.

Open existing Terraform Issue [516]: [Storing sensitive values in state files] #19

Closed
mwarkentin opened this issue Aug 28, 2023 · 4 comments

Comments

@mwarkentin
Copy link

Sorry.. I had to.. I've been following this issue for probably over half a decade. 😆

#516 Storing sensitive values in state files

@cube2222
Copy link
Collaborator

cube2222 commented Aug 28, 2023

Haha, state file encryption is actually one of the first items we wanna put up an RFC for.

@StephanHCB
Copy link

I already made a PR for full client side state encryption for all backends except the extended backends 2 years ago.

I am planning to submit it as a "stale PR" in the next days.

Based on this 5 year old issue called, aptly, "Proposal: State Encryption": hashicorp/terraform#9556

Technical description / Proposal for my solution was here: hashicorp/terraform#9556 (comment)

Unmerged pull request is here:
hashicorp/terraform#28603

I have tried it extensively with state stored on Azure storage accounts, and it is known to work in this scenario.

@StephanHCB
Copy link

Haha, state file encryption is actually one of the first items we wanna put up an RFC for.

Hi! Please check out opentofu/opentofu#297

@roni-frantchi
Copy link
Collaborator

Hey @mwarkentin !
Now that OpenTF is available, the project's roadmap has moved there, and will be managed via GitHub issues and milestones on that repo 🚀

Looks like this issue already has its twin in opentofu/opentofu#297 (thanks @StephanHCB 😉 )

So I'll be closing this one instead of moving it like the others.
Looking forward to seeing you there!

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

4 participants