Resource Sanitization
Terraform state can contain very sensitive data. Sometimes this is unavoidable because of the design of certain Terraform providers, or because the definition of what is sensitive isn't always simple and may vary between individuals and organizations. To avoid leaking sensitive data, Spacelift takes the approach of automatically sanitizing any resources stored or passed to plan policies by default.
For example, if we take the following definition for an EC2 instance:
Spacelift will supply something similar to the following to any plan policies:
Sanitization and Plan Policies
Disabling Sanitization
If you have a situation where the sanitized()
helper function doesn't provide you with enough flexibility to create a particular policy, you can disable sanitization completely for a stack. To do this, add the feature:disable_resource_sanitization
label to your stack. This will disable sanitization for any future runs.
Last updated
Was this helpful?