-
Notifications
You must be signed in to change notification settings - Fork 77
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement additional filtering for Sentry #347
Comments
yeah the reason i've been shy about this is bc it's really really hard to test this code AND it's like the stuff that runs IN the failsafe so i don't want to write a lot of stuff that could fail. but it does seem like we have to do this. |
The Add |
Ah I'm remembering that Backend already strips out cookie values, passing only cookie names to Sentry. So I think no change is needed for this cookie. But is this value passed in any other way? Like using the
We filter out the request body for |
When did the additional stripping get added? https://sentry.io/organizations/getodk/issues/2291374869 (needs credentials) is an example that illustrates both I mentioned. This specific one is a POST on
Yes. |
The stripping was added in 8f16ad8, which went out with v1.1.0. We won't see the stripping though from servers using earlier versions of Central. (On another note, it'd be amazing to somehow get the Central version into Sentry, but obviously that's out of scope for this issue.)
Sounds good. Based on that, I've added /users/reset/initiate, POST /users, PATCH /users/:id, and POST /sessions to the description above. I've also added that we should filter out the |
Right, it's not unlikely they just haven't updated. |
We have an example of a hosted server that we know is running v1.1 still sending the full |
Interesting, that's definitely unexpected. 🤔 I think we should look into that as part of this ticket. |
More Sentry filtering: remove draft from token from URL Unit tests for sentry filtering functionality Sentry filtering: preserve some query params, always clear request body Better organization and comments Removed duplicate test url Code and tests to sanitize enketo st query parameter Remove x-action-notes header Added GET + projects/formList to sensitive endpoints appease linter with const sanitizedEvent
We currently filter many Sentry events. This issue is to implement additional filtering. Here are some ideas for that filtering:
q
query parameter from/users
st
query parameter)Authorization
header. I think Sentry filters it out server-side, but recommends not sending it in the first place. I think it would be easy to remove?The text was updated successfully, but these errors were encountered: