Hide sentry secrets in startup logs

No need to leak sentry secrets in the internal DSN
This commit is contained in:
Łukasz Mierzwa
2017-12-04 16:10:19 -08:00
parent af7db67791
commit 1789e43631

View File

@@ -168,6 +168,11 @@ func (config *configSchema) LogValues() {
}
cfg.Alertmanager.Servers = servers
// replace secret in Sentry DNS with 'xxx'
if config.Sentry.Private != "" {
config.Sentry.Private = hideURLPassword(config.Sentry.Private)
}
out, err := yaml.Marshal(cfg)
if err != nil {
log.Error(err)