-
-
Notifications
You must be signed in to change notification settings - Fork 82
sanitize preview when handling secret parameters #1036
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Should this PR have a changelog entry? |
I'll add it. |
With this change the only way to check i typed a secret correctly will be to use the visibility button on each secret field added in #1035, right? Will this affect secret fields with an object or array? Today, preview is the only way I can validate that I typed or pasted structured data correctly. |
|
Does the preview make |
If the above is not satisfactory, perhaps I can, instead of replacing all chars with * just generate random alphanumeric strings to replace the originals with? Would that be better? |
That is better. Something nicer would be great, but it's probably not required to get this in. That would be a great follow-up PR though. I think we need the hide/show secrets button merged before this goes in. |
do not merge this pls, this needs adjustment |
re-introducing sanitization of preview when handling secrets - issue #1005