Filter out variables from production logs
This prevents leakage of CI Secure Variables
This commit is contained in:
parent
bce482a59a
commit
4558bb1f4a
1 changed files with 1 additions and 1 deletions
|
@ -31,7 +31,7 @@ module Gitlab
|
|||
config.encoding = "utf-8"
|
||||
|
||||
# Configure sensitive parameters which will be filtered from the log file.
|
||||
config.filter_parameters.push(:password, :password_confirmation, :private_token, :otp_attempt)
|
||||
config.filter_parameters.push(:password, :password_confirmation, :private_token, :otp_attempt, :variables)
|
||||
|
||||
# Enable escaping HTML in JSON.
|
||||
config.active_support.escape_html_entities_in_json = true
|
||||
|
|
Loading…
Reference in a new issue