Skip to content

Commit d0e866e

Browse files
Pantelis-SantoriniosCopilothubwriter
authored
Clarify structured secrets (#54069)
Co-authored-by: Copilot <[email protected]> Co-authored-by: hubwriter <[email protected]>
1 parent 1db4c9e commit d0e866e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/actions/security-for-github-actions/security-guides/using-secrets-in-github-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The following rules apply to secret names:
4040

4141
{% data reusables.codespaces.secret-precedence %} Similarly, if an organization, repository, and environment all have a secret with the same name, the environment-level secret takes precedence.
4242

43-
To help ensure that {% data variables.product.prodname_dotcom %} redacts your secret in logs, avoid using structured data as the values of secrets. For example, avoid creating secrets that contain JSON or encoded Git blobs.
43+
To help ensure that {% data variables.product.prodname_dotcom %} redacts your secrets in logs correctly, avoid using structured data as the values of secrets. For example, avoid creating secrets that contain JSON or encoded Git blobs. Using structured data as secrets could cause non-secrets to be detected as such, making passing data between workflows harder to implement. In such cases, consider manipulating the structured data, for example encoding them to a string, before storing them as secrets, and decoding them before they are used.
4444

4545
### Accessing your secrets
4646

0 commit comments

Comments
 (0)