Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use audited fork that allows reading encrypted attrs #1357

Merged
merged 1 commit into from
May 29, 2024

Commits on May 29, 2024

  1. Use audited fork that allows reading encrypted attrs

    Audited automatically replaces entries in the `audited_changes` field on
    audits with `[FILTERED]` for attributes that are encrypted. This is
    designed to prevent leaking of sensitive information in
    `audited_changes` which is an unencrypted field.
    
    The downside to this is that the `audited_changes` field now provides
    less information about what the audit actually changed.
    
    To solve this, collectiveidea/audited#694 adds
    additional configuration attributes:
    
    - `Audited.filter_encrypted_attributes = false` disables the automatic
      replacement with `[FILTERED]`
    - `Audited.encrypt_audited_changes = true` encrypts the actual entire
      `audited_changes` field, ensuring that sensitive information isn't
      leaked
    
    See:
    
    - collectiveidea/audited#690
    - collectiveidea/audited#694
    tvararu committed May 29, 2024
    Configuration menu
    Copy the full SHA
    5a8bd35 View commit details
    Browse the repository at this point in the history