Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove aws_db_instance_readable_password rule #379

Merged
merged 1 commit into from
Aug 17, 2019

Conversation

wata727
Copy link
Member

@wata727 wata727 commented Aug 3, 2019

In my current opinion, the aws_db_instance_readable_password rule makes no sense.

For example, the following way is recommended to handle sensitive values:

We don't recommend saving usernames and password to version control, but you can create a local secret variables file and use -var-file to load it.

https://learn.hashicorp.com/terraform/getting-started/variables.html#from-a-file

However, the aws_db_instance_readable_password loads the local secret variable file even if the file is outside of version control. As a result, the rule reports a warning. This is wrong.

In addition to this, current TFLint cannot accurately determine whether sensitive values are handled correctly. So, remove this rule to avoid confusing users.

@wata727 wata727 merged commit cb0add0 into master Aug 17, 2019
@wata727 wata727 deleted the remove_aws_db_instance_readable_password_rule branch August 17, 2019 07:53
@PatMyron
Copy link
Contributor

PatMyron commented Feb 2, 2022

related discussions of sensitive properties that shouldn't be hardcoded if we ever figure out how to re-write this rule:
aws-cloudformation/cfn-lint#1181
stelligent/cfn_nag#253

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants