You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, the webhook url is used as key for associating a webhook defined in the configuration to available live webhooks.
In some cases, the webhook url might contains tokens, e.g. as query parameter, that we do not want to expose to the public as these tokens might be misused. We need to find a way to store the query parameters in a separate field that can be resolved using a credential provider to avoid exposing this information. Example: adoptium/.eclipsefdn#13
The text was updated successfully, but these errors were encountered:
One idea would be to add a url_part field that would be appended to the url if not empty.
This field would contain the sensitive parts of the url and could be resolved e.g. with pass.
I tested this out locally, and it would work, however it is in the responsibility of the user to setup this correctly after an import as the import will have the full url including any sensitive parts:
In GitLab by @netomi on Jul 25, 2023, 09:14
Currently, the webhook url is used as key for associating a webhook defined in the configuration to available live webhooks.
In some cases, the webhook url might contains tokens, e.g. as query parameter, that we do not want to expose to the public as these tokens might be misused. We need to find a way to store the query parameters in a separate field that can be resolved using a credential provider to avoid exposing this information. Example: adoptium/.eclipsefdn#13
The text was updated successfully, but these errors were encountered: