Skip to content

Commit

Permalink
Clarify structured secrets (#54069)
Browse files Browse the repository at this point in the history
Co-authored-by: Copilot <[email protected]>
Co-authored-by: hubwriter <[email protected]>
  • Loading branch information
3 people authored Jan 23, 2025
1 parent 1db4c9e commit d0e866e
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ The following rules apply to secret names:

{% data reusables.codespaces.secret-precedence %} Similarly, if an organization, repository, and environment all have a secret with the same name, the environment-level secret takes precedence.

To help ensure that {% data variables.product.prodname_dotcom %} redacts your secret in logs, avoid using structured data as the values of secrets. For example, avoid creating secrets that contain JSON or encoded Git blobs.
To help ensure that {% data variables.product.prodname_dotcom %} redacts your secrets in logs correctly, avoid using structured data as the values of secrets. For example, avoid creating secrets that contain JSON or encoded Git blobs. Using structured data as secrets could cause non-secrets to be detected as such, making passing data between workflows harder to implement. In such cases, consider manipulating the structured data, for example encoding them to a string, before storing them as secrets, and decoding them before they are used.

### Accessing your secrets

Expand Down

0 comments on commit d0e866e

Please sign in to comment.