-
New Feature
-
Resolution: Unresolved
-
Minor
In a pipeline script when a developer uses `withCredentials` credentials are hidden in logs to reduces the chance of accidental disclosure (see JENKINS-38181)
When using a password parameter in a job the same concept should be applied to it and it should be impossible to display its value in logs
A work-around is to use the MaskPasswordsBuildWrapper but it has to be manually done (and it's a bit crappy)
node { wrap([$class: 'MaskPasswordsBuildWrapper', varPasswordPairs: [[password: "${myPassword}", var: 'PASSWORD']]]) { println myPassword sh 'echo "Hello World ${myPassword}"' } }
.
- relates to
-
JENKINS-27392 API to decorate console output
- Resolved
-
JENKINS-57717 showRawYaml doesn't work inside podTemplate
- Resolved
-
JENKINS-36007 Way to mask arbitrary Secret (was: Password is clear on log with input parameter)
- Open
-
JENKINS-34101 Option for input parameters to be flattened to string
- Open
-
JENKINS-44779 Add @Symbol to MaskPasswordsBuildWrapper
- In Progress