The output from the above `terraform` commands should be viewable in the job logs.
CAUTION: **Caution:**
Like any other job artifact, Terraform plan data is [viewable by anyone with Guest access](../permissions.md) to the repository.
Neither Terraform nor GitLab encrypts the plan file by default. If your Terraform plan
includes sensitive data such as passwords, access tokens, or certificates, GitLab strongly
recommends encrypting plan output or modifying the project visibility settings.
## Example project
See [this reference project](https://gitlab.com/nicholasklick/gitlab-terraform-aws) using GitLab and Terraform to deploy a basic AWS EC2 within a custom VPC.
curl --silent--show-error--request PUT --header"PRIVATE-TOKEN: ${REVIEW_APPS_ROOT_TOKEN}""${CI_ENVIRONMENT_URL}/api/v4/application/settings?signup_enabled=false"
retry 'curl --silent --show-error --request PUT --header "PRIVATE-TOKEN: ${REVIEW_APPS_ROOT_TOKEN}" "${CI_ENVIRONMENT_URL}/api/v4/application/settings?signup_enabled=false"'
local signup_enabled=$(curl --silent--show-error--request GET --header"PRIVATE-TOKEN: ${REVIEW_APPS_ROOT_TOKEN}""${CI_ENVIRONMENT_URL}/api/v4/application/settings" | jq ".signup_enabled")
local signup_enabled=$(retry 'curl --silent --show-error --request GET --header "PRIVATE-TOKEN: ${REVIEW_APPS_ROOT_TOKEN}" "${CI_ENVIRONMENT_URL}/api/v4/application/settings" | jq ".signup_enabled"')
if[["${signup_enabled}"=="false"]];then
echoinfo "Sign-ups have been disabled successfully."