Use datatype Sensitive to prevent credentials leaks.
I believe this might be better served by using the Sensitive data type. Let me know if that doesn't cover your use case, I may be missing something.
@austb Cool! I missed that type. :+1:
The pr is updated.
Looks like tests are failing on this. Think you could address that @camilo-schoeningh-sociomantic?
error during compilation: Evaluation Error: Error while evaluating a Resource
Statement, Evaluation Error: Left match operand must result in a String value.
Got a Sensitive. (file: /home/travis/build/puppetlabs/puppetlabs-puppetdb/spec/fixtures/modules/postgresql/manifests/server/role.pp,
line: 127, column: 10) (file: /home/travis/build/puppetlabs/puppetlabs-
puppetdb/spec/fixtures/modules/postgresql/manifests/server/db.pp, line: 41)
on node travis-job-cf78c5e3-7fbd-42e7-ab4f-fcf405004c05.c.travis-ci-prod-2.internal
It's just Sensitive, not Sensitive[String]
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.
superseded by #331