Fork me on GitHub
#clojure-spec
<
2019-01-01
>
seancorfield00:01:30

@richiardiandrea Isn't the concern there more than you need to not display ex-data values "as-is" to anyone?

seancorfield00:01:07

It would be the same as any other ex-info you throw -- it could well include sensitive data in some context...

richiardiandrea00:01:22

that's a tough one, because then my display thing needs to know about what is displaying

richiardiandrea00:01:04

aka, I need to call dissoc on things, maybe it should

seancorfield00:01:06

I wouldn't expect production code to just display any spec failure as is -- those exceptions are intended for code, not humans, and certainly not end users.

seancorfield00:01:22

FWIW, our application error logging/reporting code has always contained logic to strip known, sensitive fields from any data logged or reported, long before spec was a thing...

richiardiandrea00:01:30

ok yeah maybe that's something I would need to do anyways

richiardiandrea00:01:00

I wonder though if things change ...say the string for password changes now I need to change spec AND dissoc

seancorfield02:01:32

@richiardiandrea That's a good reason to use a globally-unique qualified key name 🙂