Skip to content

Commit cee064e

Browse files
markjmillerkorinne
andauthored
Update src/content/changelog/fundamentals/2025-03-21-sensitive-values-redacted.mdx
Co-authored-by: korinne <[email protected]>
1 parent c2f133c commit cee064e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/content/changelog/fundamentals/2025-03-21-sensitive-values-redacted.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ products:
66
date: 2025-03-21T00:00:00Z
77
---
88

9-
In [Cloudflare Terraform Provider](https://github.com/cloudflare/terraform-provider-cloudflare) >5.2.0, resources that have sensitive properties will not have those values show up in logs. This was done by annotating properties in the [Cloudflare OpenAPI Schema](https://raw.githubusercontent.com/cloudflare/api-schemas/refs/heads/main/openapi.yaml) with `x-sensitive: true`. This results in proper auto-generation of the corresponding Terraform resources.
9+
In the [Cloudflare Terraform Provider](https://github.com/cloudflare/terraform-provider-cloudflare) versions 5.2.0 and above, resources that have sensitive properties will not have those values show up in logs. To fix this, we annotated properties in our [Cloudflare OpenAPI Schema](https://raw.githubusercontent.com/cloudflare/api-schemas/refs/heads/main/openapi.yaml) with `x-sensitive: true`. This results in proper auto-generation of the corresponding Terraform resources, and prevents sensitive values from being leaked.
1010

1111
This issue affected [resources](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs) related to these products and features:
1212

0 commit comments

Comments
 (0)