Hide the most sensitive user data from logs
Else admins may accidentally leak password (hashes) or expose their users emails when sharing logs for debugging
This commit is contained in:
parent
d81b8a9e14
commit
6d241a18da
1 changed files with 3 additions and 0 deletions
|
|
@ -91,6 +91,9 @@ defmodule Pleroma.User do
|
|||
|
||||
@cachex Pleroma.Config.get([:cachex, :provider], Cachex)
|
||||
|
||||
# hide sensitive data from logs
|
||||
@derive {Inspect, except: [:password, :password_hash, :email]}
|
||||
|
||||
schema "users" do
|
||||
field(:bio, :string, default: "")
|
||||
field(:raw_bio, :string)
|
||||
|
|
|
|||
Loading…
Reference in a new issue