-
-
Notifications
You must be signed in to change notification settings - Fork 8.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[🚀 Feature]: Secret variables / plain-text passwords #12043
Comments
@spea1, thank you for creating this issue. We will troubleshoot it as soon as we can. Info for maintainersTriage this issue by using labels.
If information is missing, add a helpful comment and then
If the issue is a question, add the
If the issue is valid but there is no time to troubleshoot it, consider adding the
If the issue requires changes or fixes from an external project (e.g., ChromeDriver, GeckoDriver, MSEdgeDriver, W3C),
add the applicable
After troubleshooting the issue, please add the Thank you! |
The last issue was closed due to lack of interest. Is this something you would be interested in working on? |
I offer myself as a tester. |
The issue is it is not a priority for the devs right now, so we'd need help from someone in the community to help implement this. |
This issue is looking for contributors. Please comment below or reach out to us through our IRC/Slack/Matrix channels if you are interested. |
This issue is stale because it has been open 280 days with no activity. Remove stale label or comment or this will be closed in 14 days. |
This issue was closed because it has been stalled for 14 days with no activity. |
This issue has been automatically locked since there has not been any recent activity since it was closed. Please open a new issue for related bugs. |
Feature and motivation
Nowadays, IT security has become an important issue. In many environments, plain-text passwords are unacceptable. Therefore, the introduction of secret variables should be reconsidered.
Usage example
Selenium hub and nodes could be started with a magic word to decrypt these secret variables before they are used. The decrypted contents of these secret variables should also not be logged away. Creating these secret variables with the same magic word should be possible in the IDE, for example.
Hide/mask/scrub secrets/passwords in logs #9339
#9339
The text was updated successfully, but these errors were encountered: