Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Treat x-api-key header as sensitive #1236

Merged
merged 2 commits into from Mar 28, 2022

Conversation

simonschmidt
Copy link
Contributor

Putting credentials in x-api-key header seems to be popular, it should probably be treated as sensitive by default.

This PR adds it to the default list of filtered headers used by e.g. SentryAsgiMiddleware

I ran into this when wanting to filter the header client-side for asgi traces, where before_send and add_global_event_processor are a bit problematic (See #1226 )

@github-actions
Copy link

This pull request has gone three weeks without activity. In another week, I will close it.

But! If you comment or otherwise update it, I will reset the clock, and if you label it Status: Backlog or Status: In Progress, I will leave it alone ... forever!


"A weed is but an unloved flower." ― Ella Wheeler Wilcox 🥀

Copy link
Member

@antonpirker antonpirker left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@antonpirker antonpirker self-assigned this Mar 23, 2022
@antonpirker antonpirker merged commit c33cac9 into getsentry:master Mar 28, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants