-
I have noticed that although it possible to hide keys in
how can keys be totally hidden? |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 1 reply
-
I did some digging here last Friday. Ideally, we would obfuscate any secrets in the endpoint url. Unfortunately, once the I'm not sure if we can get a list of secrets to just do the hacky thing and encode anything that lives in a secret. I'd love to automatically obscure secrets, though, if anyone can find a way! |
Beta Was this translation helpful? Give feedback.
-
Hi there, we just added a way to do this with this #26. You can now use an optional Option 1: use a string boolean mask: true # removes the source entirely from the commit message, defaults to false Option 2: use a string array with each secret to mask mask: '["${{ secrets.SECRET1 }}", "${{ secrets.SECRET2 }}"]' |
Beta Was this translation helpful? Give feedback.
-
The thought was that there are cases where you might want to show part of
the source like:
`source: www.mypage.com/?flag=yes&flag2=***`
Especially when chaining multiple flat actions together the source let's
you see quickly what commits came from what sources. Trying to keep the
tool as flexible as possible if it's an easy add to just support both use
cases.
…On Wed, Jun 2, 2021, 10:22 AM Taras Novak ***@***.***> wrote:
why not just mask them by default without any mask parameter?
might be unrelated, but I really like how vscode restbook extension
handles it now. you guys should try it and see its outputs : tanhakabir/rest-book#78
(comment)
<tanhakabir/rest-book#78 (comment)>
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#21 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACEQB3VHQBCUZJZKUHQ2EBLTQY5EFANCNFSM45JAZIHA>
.
|
Beta Was this translation helpful? Give feedback.
Hi there, we just added a way to do this with this #26. You can now use an optional
mask
parameter in two ways:Option 1: use a string boolean
mask: true # removes the source entirely from the commit message, defaults to false
Option 2: use a string array with each secret to mask
mask: '["${{ secrets.SECRET1 }}", "${{ secrets.SECRET2 }}"]'