Sensitive Requisites#
In SLS blocks, use a sensitive requisite to prevent parameters from being outputted to the console.
For Idem state resources that implement the resource
contract, parameters specified under the sensitive requisite are hidden from the changes
output.
In the following example, State_A uses sensitive requisite to hide its secret from changes
output.
State_A:
cloud.instance.present:
- name: my-resource
- public: public-data
- secret: secret-data
- sensitive:
- secret
Assume present() does a creating operation, the console output of this Idem run will be:
changes:
new:
name: my-resource
public: public-data
Note: sensitive requisite only hides data in changes
that is outputted to console. All data will still be saved into ESM cache in plain text.