-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add insecure_value
to datasource aws_ssm_parameter
#30817
feat: Add insecure_value
to datasource aws_ssm_parameter
#30817
Conversation
Community NoteVoting for Prioritization
For Submitters
|
insecure_value
to datasource aws_ssm_parameter
@Jno21 ThankYou for this PR! |
@agupta94 Thank you for your comment.
That would be an idea, my first though was to have the Globally I follow what was done here: #25721 to have the same behavior on the To answer the last part, yes indeed doing If there is a better solution possible, that I didn't think of and it respect the way this provider wants to go, I would be totally down to work on it :) |
42ffaa9
to
df071f8
Compare
🚀 LGTM! Thank you for your contribution!!
|
This functionality has been released in v5.8.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
Add
insecure_value
to datasourceaws_ssm_parameter
. The idea is to have the possibility to expose the value as insecure like in the resourceaws_ssm_parameter
.Relations
Closes #26915
References
Output from Acceptance Testing