Describe the need
Summary
We need to create GitHub environment secrets via Terraform without persisting sensitive values in state.
Problem
Terraform now supports ephemeral values, which allows generating secrets without statefile persistence. However, the GitHub provider does not support write-only (_wo) arguments for secrets, so any secret value passed to github_actions_environment_secret is stored in the Terraform state.
Why this matters
This prevents using Terraform to manage GitHub environment secrets in a secure, state-free way, even when the secret is generated ephemerally.
Expected behavior
Allow write-only (or equivalent) secret inputs for GitHub environment secrets so sensitive values are never written to state.
SDK Version
No response
API Version
No response
Relevant log output
Code of Conduct