It would be nice if load-secrets-action had a way to exempt certain values from being registered with the runner as secrets -- particularly username values. These are often not particularly (or at all) secret, and in some environments they tend to be very common strings like admin or readonly (or the name of a client, say).
Making these secrets can have unintended effects, like forcing important debug information to be redacted in logs and preventing other strings that coincidentally contain these values from being passed correctly between jobs via outputs.
It would be nice if load-secrets-action had a way to exempt certain values from being registered with the runner as secrets -- particularly
usernamevalues. These are often not particularly (or at all) secret, and in some environments they tend to be very common strings likeadminorreadonly(or the name of a client, say).Making these secrets can have unintended effects, like forcing important debug information to be redacted in logs and preventing other strings that coincidentally contain these values from being passed correctly between jobs via outputs.