Sensitive Requisites#

In SLS blocks, use a sensitive requisite to prevent parameters from being outputted to the console.

For Idem state resources that implement the resource contract, parameters specified under the sensitive requisite are hidden from the changes output.

In the following example, State_A uses sensitive requisite to hide its secret from changes output.

State_A:
   cloud.instance.present:
     - name: my-resource
     - public: public-data
     - secret: secret-data
     - sensitive:
       - secret

Assume present() does a creating operation, the console output of this Idem run will be:

changes:
   new:
     name: my-resource
     public: public-data

Note: sensitive requisite only hides data in changes that is outputted to console. All data will still be saved into ESM cache in plain text.