github.com/upcmd/up@v0.8.1-0.20230108151705-ad8b797bf04f/tests/functests/c0203.yml (about) 1 doc_meta: | 2 folder: security 3 title: mask senstive info in shell execution 4 head: | 5 When you use verbose level greater than vvv, it will print out the debugging final shell scripts rendered, which possiblly contains the secure vars. In such a case, upcmd will automatically mask the senstive variable with SECURE_SENSITIVE_INFO_MASKED 6 7 sections: 8 - title: Demo 9 log: yes 10 11 tasks: 12 - 13 name: task 14 task: 15 - 16 func: shell 17 dvars: 18 - name: enc_key 19 value: my_enc_key 20 flags: 21 - secret 22 23 - name: value_encrypted 24 value: '{{ "ENV_AAA" | encryptAES .enc_key }}' 25 flags: 26 - vvvv 27 - taskScope 28 29 - name: ENV_AAA 30 value: '{{.value_encrypted}}' 31 flags: 32 - secure 33 34 do: | 35 echo "hello, this is a secrt value: {{.secure_ENV_AAA}}"