-
-
Notifications
You must be signed in to change notification settings - Fork 93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Accept Datatype Sensitive for Secrets #668
Conversation
Thank you for your pull request. Before we can look at it, you'll need to sign a Contributor License Agreement (CLA). Please follow instructions at https://icinga.com/company/contributor-agreement to sign the CLA. After that, please reply here with a comment and we'll verify. Contributors that have not signed yet: @cocker-cc
|
In these cases the data type Sensitive is superfluous because the passwords are made visible again with show_diff. |
What do you mean by "in these cases"? To make it clear: My main Goal is not to make Passwords invisible – although this is nice. My Effort to make many Component-Modules sensitive-aware is: As an Author of Profile-Modules I do not want to fiddle with In an ideal World even the Component-Module should never use |
Thank you for your pull request. Before we can look at it, you'll need to sign a Contributor License Agreement (CLA). Please follow instructions at https://icinga.com/company/contributor-agreement to sign the CLA. After that, please reply here with a comment and we'll verify. Contributors that have not signed yet: @cocker-cc
|
I did a |
Thanks for your detailed explanation. Now I understand and will add your changes to the upcoming release. Fortunately I was able to hold myself back from a release. |
What's about keys and certificates for TLS? |
I created this PR for the |
refs #689 |
No description provided.