Add 'secret' to sensitive keys
Change-Id: Iaf1ffe5085315be6b1c26b5f8a7fa43aefe65dde Closes-Bug: #1505420
This commit is contained in:
parent
a6eb150ea8
commit
9776cdd332
@ -53,7 +53,7 @@ SLUGIFY_HYPHENATE_RE = re.compile(r"[-\s]+")
|
|||||||
# NOTE(flaper87): The following globals are used by `mask_password`
|
# NOTE(flaper87): The following globals are used by `mask_password`
|
||||||
_SANITIZE_KEYS = ['adminPass', 'admin_pass', 'password', 'admin_password',
|
_SANITIZE_KEYS = ['adminPass', 'admin_pass', 'password', 'admin_password',
|
||||||
'auth_token', 'new_pass', 'auth_password', 'secret_uuid',
|
'auth_token', 'new_pass', 'auth_password', 'secret_uuid',
|
||||||
'sys_pswd', 'token']
|
'secret', 'sys_pswd', 'token']
|
||||||
|
|
||||||
# NOTE(ldbragst): Let's build a list of regex objects using the list of
|
# NOTE(ldbragst): Let's build a list of regex objects using the list of
|
||||||
# _SANITIZE_KEYS we already have. This way, we only have to add the new key
|
# _SANITIZE_KEYS we already have. This way, we only have to add the new key
|
||||||
|
Loading…
x
Reference in New Issue
Block a user