Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Sign in / Register
Toggle navigation
S
spring-boot
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
DEMO
spring-boot
Commits
bbdd6cc9
Commit
bbdd6cc9
authored
Oct 06, 2018
by
Andy Wilkinson
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch '1.5.x'
parents
ca329d3d
2c7b74db
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
2 additions
and
2 deletions
+2
-2
howto.adoc
...oot-project/spring-boot-docs/src/main/asciidoc/howto.adoc
+2
-2
No files found.
spring-boot-project/spring-boot-docs/src/main/asciidoc/howto.adoc
View file @
bbdd6cc9
...
@@ -2439,11 +2439,11 @@ of how to register handlers in the servlet container.
...
@@ -2439,11 +2439,11 @@ of how to register handlers in the servlet container.
=== Sanitize sensible values
=== Sanitize sensible values
Information returned by the `env` and `configprops` endpoints can be somewhat sensitive
Information returned by the `env` and `configprops` endpoints can be somewhat sensitive
so keys matching a certain pattern are sanitized by default (i.e. their values are
so keys matching a certain pattern are sanitized by default (i.e. their values are
replaced by `
******
`).
replaced by `
+******+
`).
Spring Boot uses sensible defaults for such keys: for instance, any key ending with the
Spring Boot uses sensible defaults for such keys: for instance, any key ending with the
word "password", "secret", "key" or "token" is sanitized. It is also possible to use a
word "password", "secret", "key" or "token" is sanitized. It is also possible to use a
regular expression instead, such as `
*credentials.*
` to sanitize any key that holds the
regular expression instead, such as `
+*credentials.*+
` to sanitize any key that holds the
word `credentials` as part of the key.
word `credentials` as part of the key.
The patterns to use can be customized using the `management.endpoint.env.keys-to-sanitize`
The patterns to use can be customized using the `management.endpoint.env.keys-to-sanitize`
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment