From e2c6bb2f15a7ad61d277d9bc64025fe5df4186ab Mon Sep 17 00:00:00 2001 From: Maria Zhelezova <43066499+mazhelez@users.noreply.github.com> Date: Mon, 26 Feb 2024 12:58:05 +0100 Subject: [PATCH] Mask password value in Run-ALPipeline logs (#3373) While the password is harmless, it's undesirable to have secrets in logs. --- AppHandling/Run-AlPipeline.ps1 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/AppHandling/Run-AlPipeline.ps1 b/AppHandling/Run-AlPipeline.ps1 index 996d04ad0..cfae0469a 100644 --- a/AppHandling/Run-AlPipeline.ps1 +++ b/AppHandling/Run-AlPipeline.ps1 @@ -668,7 +668,7 @@ if ($credential) { } else { $password = GetRandomPassword - Write-Host "admin/$password" + Write-Host "Username: admin, Password: ***" $credential= (New-Object pscredential 'admin', (ConvertTo-SecureString -String $password -AsPlainText -Force)) } Write-Host -NoNewLine -ForegroundColor Yellow "CompanyName "; Write-Host $companyName