Merge pull request #28507 from stevematney/patch-1

Updating sensitive/nonsensitive docs with v0.14 specifics.
This commit is contained in:
Alisdair McDiarmid 2021-05-14 13:46:12 -04:00 committed by GitHub
commit 3e40a9a4eb
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 8 additions and 8 deletions

View File

@ -8,7 +8,7 @@ description: |-
# `nonsensitive` Function # `nonsensitive` Function
-> **Note:** This function is only available in Terraform v0.14 and later. -> **Note:** This function is only available in Terraform v0.15 and later.
`nonsensitive` takes a sensitive value and returns a copy of that value with `nonsensitive` takes a sensitive value and returns a copy of that value with
the sensitive marking removed, thereby exposing the sensitive value. the sensitive marking removed, thereby exposing the sensitive value.

View File

@ -8,20 +8,20 @@ description: |-
# `sensitive` Function # `sensitive` Function
-> **Note:** This function is only available in Terraform v0.14 and later. -> **Note:** This function is only available in Terraform v0.15 and later.
`sensitive` takes any value and returns a copy of it marked so that Terraform `sensitive` takes any value and returns a copy of it marked so that Terraform
will treat it as sensitive, with the same meaning and behavior as for will treat it as sensitive, with the same meaning and behavior as for
[sensitive input variables](/docs/language/values/variables.html#suppressing-values-in-cli-output). [sensitive input variables](/docs/language/values/variables.html#suppressing-values-in-cli-output).
Whereever possible we recommend marking your input variable and/or output value Wherever possible we recommend marking your input variable and/or output value
declarations as sensitive directly, instead of using this function, because declarations as sensitive directly, instead of using this function, because in
in that case you can be sure that there is no way to refer to those values that case you can be sure that there is no way to refer to those values without
without Terraform automatically considering them as sensitive. Terraform automatically considering them as sensitive.
The `sensitive` function might be useful in some less-common situations where a The `sensitive` function might be useful in some less-common situations where a
sensitive value arises from a definition _within_ your module, such as if sensitive value arises from a definition _within_ your module, such as if you've
you've loaded sensitive data from a file on disk as part of your configuration: loaded sensitive data from a file on disk as part of your configuration:
``` ```
locals { locals {