Sanitize request headers like other metadata fields #104
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Goal
Make sure that all data sanitization using
Config.ParamsFilters
behaves the same. theParamsFilters
slice should contain "sensitive substrings", so if a key contains any of theParamsFilters
, it should be considered sensitive.This is already the case in the metadata sanitizer:
bugsnag-go/metadata.go
Lines 185 to 192 in 834d8fe
Design
Why was this approach to the goal used?
Use the same
string.Contains
logic also for request headers. Makes sure to filter heades likeSet-Cookie
orX-Service-Secret
.Changeset
Changed
Changed
request_extractor.contains
.Tests
Updated the corresponding test case.
Discussion
Alternative Approaches
Outstanding Questions
Linked issues
Review
For the submitter, initial self-review:
For the pull request reviewer(s), this changeset has been reviewed for: