Allow prevent_secrets parameter value to be visible in logs
## Problem to solve
Currently, the `prevent_secrets` parameter value is automatically filtered out in GitLab logs because it contains the word "secret". This filtering is controlled by the parameter filtering configuration in `config/application.rb`.
The relevant code that causes this filtering is here:
https://gitlab.com/gitlab-org/gitlab/-/blob/08d081ca8e665fe644a00d0054fdede69869290a/config/application.rb#L117
When the `prevent_secrets` parameter is logged (for example, in push rule updates), its value appears as `"[FILTERED]"` instead of showing the actual boolean value (`true`/`false` or `1`/`0`).
## Intended users
- GitLab administrators who need to audit push rule changes
- Users monitoring security-related configuration changes
## User experience goal
When reviewing logs for push rule updates, administrators should be able to see the actual value of the `prevent_secrets` setting to understand what changes were made.
## Proposal
Modify the parameter filtering configuration to exclude `prevent_secrets` from being filtered, since this parameter name refers to a feature setting rather than containing actual secret data.
## What does success look like, and how can we measure that?
Success would be measured by:
- The `prevent_secrets` parameter value appearing as `true`/`false` or `1`/`0` in logs instead of `"[FILTERED]"`
- No regression in filtering of actual secret parameters
- Improved auditability of push rule configuration changes
## What is the type of buyer?
This affects all GitLab instances where push rules are used and administrators need to audit configuration changes.
## Links / references
- Current filtering implementation: https://gitlab.com/gitlab-org/gitlab/-/blob/08d081ca8e665fe644a00d0054fdede69869290a/config/application.rb#L117
- Related to push rules functionality and audit logging
issue