Details
-
Sub-task
-
Status: Resolved
-
Major
-
Resolution: Fixed
-
None
-
None
-
None
Description
If a file is accessed as azure://account:key@a/b/c the account and key should never be logged or displayed to the user. It may mean queryFilename() has to remove the credentials, or a new function that is used as a display name. This should be primarily solved by allowing the key to be specified as a secret instead.
Attachments
Issue Links
- is cloned by
-
HPCC-24285 Ensure credentials are not leaked from filenames
-
- Accepted
-
- relates to
-
HPCC-24285 Ensure credentials are not leaked from filenames
-
- Accepted
-