-
New Feature
-
Resolution: Unresolved
-
Minor
-
None
The credentials-binding-plugin currently installs logfilters that take care of masking secrets while logging.
However this is only applied to secrets that are currently bound.
If the secret is stored into a variable and printed later it will not be masked.
(or the secret is part of an exceptions message)
It would be nice to have a way to either
a) Mask secrets that were in scope before, but are not anymore
b) Explicitly mask secrets inside a given string before passing it out of the current scope
Note: This is not meant to protect against intentional misuse but to make it easier for pipeline authors to write non-leaking pipelines.
- is blocked by
-
JENKINS-65076 Define API to mask out-of-scope credentials
- Resolved
-
JENKINS-65077 Define API to mask out-of-scope credentials
- Closed