@checkly/playwright-reporter 1.6.1 → 1.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +6 -0
- package/dist/index.d.ts +6 -0
- package/dist/index.js +1 -1
- package/package.json +1 -1
package/CHANGELOG.md
CHANGED
|
@@ -4,6 +4,12 @@ All notable changes to `@checkly/playwright-reporter` will be documented in this
|
|
|
4
4
|
|
|
5
5
|
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/).
|
|
6
6
|
|
|
7
|
+
## 1.7.0 (2026-02-27)
|
|
8
|
+
|
|
9
|
+
### Added
|
|
10
|
+
|
|
11
|
+
- **Sensitive header scrubbing** - HTTP headers like `Authorization`, `Cookie`, `Set-Cookie`, `Proxy-Authorization`, `X-API-Key`, and `X-Auth-Token` are now automatically redacted from reports and traces when scrubbing is enabled — no configuration needed. This prevents tokens and session cookies from leaking through network request data, even if their values aren't registered as secrets. Disable with `scrubbing: { sensitiveHeaders: false }` or pass a custom list of header names to control which headers are redacted.
|
|
12
|
+
|
|
7
13
|
## 1.6.1 (2026-02-27)
|
|
8
14
|
|
|
9
15
|
### Fixed
|
package/dist/index.d.ts
CHANGED
|
@@ -128,6 +128,12 @@ interface ScrubbingOptions {
|
|
|
128
128
|
* Custom replacement string for scrubbed values.
|
|
129
129
|
*/
|
|
130
130
|
replacement?: string;
|
|
131
|
+
/**
|
|
132
|
+
* HTTP header names whose values should always be redacted, regardless of secret matching.
|
|
133
|
+
* Defaults to well-known sensitive headers (Authorization, Cookie, Set-Cookie, etc.).
|
|
134
|
+
* Pass `false` to disable header-name-based scrubbing entirely.
|
|
135
|
+
*/
|
|
136
|
+
sensitiveHeaders?: string[] | false;
|
|
131
137
|
}
|
|
132
138
|
|
|
133
139
|
/**
|