|
|
- // Copyright 2017 The Gitea Authors. All rights reserved.
- // Use of this source code is governed by a MIT-style
- // license that can be found in the LICENSE file.
-
- package util
-
- import (
- "net/url"
- "strings"
- )
-
- // urlSafeError wraps an error whose message may contain a sensitive URL
- type urlSafeError struct {
- err error
- unsanitizedURL string
- }
-
- func (err urlSafeError) Error() string {
- return SanitizeMessage(err.err.Error(), err.unsanitizedURL)
- }
-
- // URLSanitizedError returns the sanitized version an error whose message may
- // contain a sensitive URL
- func URLSanitizedError(err error, unsanitizedURL string) error {
- return urlSafeError{err: err, unsanitizedURL: unsanitizedURL}
- }
-
- // SanitizeMessage sanitizes a message which may contains a sensitive URL
- func SanitizeMessage(message, unsanitizedURL string) string {
- sanitizedURL := SanitizeURLCredentials(unsanitizedURL, true)
- return strings.Replace(message, unsanitizedURL, sanitizedURL, -1)
- }
-
- // SanitizeURLCredentials sanitizes a url, either removing user credentials
- // or replacing them with a placeholder.
- func SanitizeURLCredentials(unsanitizedURL string, usePlaceholder bool) string {
- u, err := url.Parse(unsanitizedURL)
- if err != nil {
- // don't log the error, since it might contain unsanitized URL.
- return "(unparsable url)"
- }
- if u.User != nil && usePlaceholder {
- u.User = url.User("<credentials>")
- } else {
- u.User = nil
- }
- return u.String()
- }
|