Skip to content

Conversation

@gautamrajur
Copy link

@gautamrajur gautamrajur commented Dec 22, 2025

Summary

Adds SecretMarkingProvider - a wrapper that marks config values as secrets based on key patterns.

Motivation

External config sources (env vars, third-party providers) don't always mark sensitive data properly. This lets you retroactively apply secret marking without writing a custom wrapper.

Changes

  • SecretMarkingProvider<Upstream> wrapper
  • Convenience methods: markSecrets(where:), markSecretsForKeys(_:)
  • Tests
  • Proposal SCO-0004

Note

Based on your comment on #131, I can switch to SecretsSpecifier<AbsoluteConfigKey, ConfigValue> instead of the custom predicate - let me know.

Closes #131

This adds a new wrapper provider that marks configuration values as secrets
based on key patterns, useful when integrating with external providers that
don't properly identify sensitive data.

Changes:
- Add SecretMarkingProvider wrapper
- Add convenience methods: markSecrets(where:), markSecretsForKeys(_:)
- Add comprehensive tests
- Add proposal SCO-0004
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add SecretMarkingProvider for post-hoc secret marking

1 participant