You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Use audited fork that allows reading encrypted attrs
Audited automatically replaces entries in the `audited_changes` field on
audits with `[FILTERED]` for attributes that are encrypted. This is
designed to prevent leaking of sensitive information in
`audited_changes` which is an unencrypted field.
The downside to this is that the `audited_changes` field now provides
less information about what the audit actually changed.
To solve this, collectiveidea/audited#694 adds
additional configuration attributes:
- `Audited.filter_encrypted_attributes = false` disables the automatic
replacement with `[FILTERED]`
- `Audited.encrypt_audited_changes = true` encrypts the actual entire
`audited_changes` field, ensuring that sensitive information isn't
leaked
See:
- collectiveidea/audited#690
- collectiveidea/audited#694
0 commit comments