diff --git a/spring-boot-actuator/src/main/java/org/springframework/boot/actuate/endpoint/ConfigurationPropertiesReportEndpoint.java b/spring-boot-actuator/src/main/java/org/springframework/boot/actuate/endpoint/ConfigurationPropertiesReportEndpoint.java index 363f58563fb..132b7165a03 100644 --- a/spring-boot-actuator/src/main/java/org/springframework/boot/actuate/endpoint/ConfigurationPropertiesReportEndpoint.java +++ b/spring-boot-actuator/src/main/java/org/springframework/boot/actuate/endpoint/ConfigurationPropertiesReportEndpoint.java @@ -38,12 +38,13 @@ import com.fasterxml.jackson.databind.ser.impl.SimpleFilterProvider; /** * {@link Endpoint} to expose application properties from {@link ConfigurationProperties} - * annotated classes. + * annotated beans. * *
* To protect sensitive information from being exposed, certain property values are masked
* if their names end with a set of configurable values (default "password" and "secret").
- * Configure property names by using {@link #setKeysToSanitize(String[])}.
+ * Configure property names by using endpoints.configprops.keys_to_sanitize
+ * in your Spring Boot application configuration.
*
* @author Christian Dupuis
*/
@@ -61,15 +62,15 @@ public class ConfigurationPropertiesReportEndpoint extends
super("configprops");
}
+ public String[] getKeysToSanitize() {
+ return this.keysToSanitize;
+ }
+
@Override
public void setApplicationContext(ApplicationContext context) throws BeansException {
this.context = context;
}
- public String[] getKeysToSanitize() {
- return this.keysToSanitize;
- }
-
public void setKeysToSanitize(String... keysToSanitize) {
Assert.notNull(keysToSanitize, "KeysToSanitize must not be null");
this.keysToSanitize = keysToSanitize;
@@ -80,6 +81,10 @@ public class ConfigurationPropertiesReportEndpoint extends
return extract(this.context);
}
+ /**
+ * Extract beans annotated {@link ConfigurationProperties} and serialize into
+ * {@link Map}.
+ */
@SuppressWarnings("unchecked")
protected Map