Skip to content
This repository has been archived by the owner on May 14, 2021. It is now read-only.

Prevent Database Secrets From Being Logged During Chef Run #92

Merged
merged 1 commit into from
Sep 7, 2017

Conversation

mugizico
Copy link
Contributor

@mugizico mugizico commented Sep 7, 2017

Why

  • chef run is outputing sensitive database secrets such as
    admin password, secure token, api keys, etc. to the shell and
    the log file.

How

  • add sensitive = true, the same way secrets.yml configs are handled.

__Why__

* chef run is outputing sensitive database secrets such as
  admin password, secure token, api keys, etc. to the shell and
  the log file.

__How__

* add sensitive = true, the same way secrets.yml configs are handled.
@coderanger
Copy link
Member

Good catch, thanks!

@coderanger coderanger merged commit aa3cd87 into poise:master Sep 7, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants