From 1789e436317b32a5db34b02a8a65111700ad67e0 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C5=81ukasz=20Mierzwa?= Date: Mon, 4 Dec 2017 16:10:19 -0800 Subject: [PATCH] Hide sentry secrets in startup logs No need to leak sentry secrets in the internal DSN --- internal/config/config.go | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/internal/config/config.go b/internal/config/config.go index e3c3bbabd..b15ef21f9 100644 --- a/internal/config/config.go +++ b/internal/config/config.go @@ -168,6 +168,11 @@ func (config *configSchema) LogValues() { } cfg.Alertmanager.Servers = servers + // replace secret in Sentry DNS with 'xxx' + if config.Sentry.Private != "" { + config.Sentry.Private = hideURLPassword(config.Sentry.Private) + } + out, err := yaml.Marshal(cfg) if err != nil { log.Error(err)