Until this is done, the only way to mask passwords in the log is EnvInject or MaskPassword Plugin (with their respective backdraws). You could possibly externalize parts of your pipeline to a freestyle job and use them.
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Jenkins Users, m...@beckweb.net
Hi all,
thanks for your inputs.
In fact I implemented this with Credentials Binding plugin and it worked great - masking the passwords as it should.
Brian Ray
unread,
Apr 26, 2016, 5:17:56 PM4/26/16
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Jenkins Users, m...@beckweb.net
I recently started experimenting with Credentials Binding with a Pipeline script passing a user-password credential down to a sh/bat step inside a node block, with the secret values masked perfectly in the log. (The step just executed some Groovy that println System.getenv()'d the protected env variable.) In fact the masking worked so well I had to add some equality tests against the value to ensure that the secret value was indeed the right value.
Maybe my use case was different than JENKINS-24805.
Harry G.
unread,
Apr 27, 2016, 5:28:17 AM4/27/16
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Jenkins Users
Wow, this is strange! To be honest, my test case was a freestyle job and I assumed there should be no difference. I tried again and it really works in pipeline, but not in freestyle job - with exact same credential binding and same shell script!
So I think this can help to fix JENKINS-24805 So thanks a lot for bringing this up and sorry for the confusion!
Brian Ray
unread,
Apr 27, 2016, 11:51:35 AM4/27/16
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Jenkins Users
Glad to help. Very good to know the differing behavior between freestyle and pipeline jobs.
Brian Ray
unread,
May 13, 2016, 12:20:17 PM5/13/16
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Jenkins Users
Found a wrinkle to masking secrets in the log, in one of my edge cases Pipeline.
I'm trying to determine whether this edge case warrants a JIRA.
kumar naresh
unread,
Apr 3, 2017, 7:45:08 AM4/3/17
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Jenkins Users, m...@beckweb.net
Hi,
please help to get the global passwords list from jenkins using the groovy scripting.