Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding log sanitization #124

Merged
merged 2 commits into from
Jul 4, 2024
Merged

Conversation

madflojo
Copy link
Member

@madflojo madflojo commented Jul 4, 2024

Addressing log sanitization security warnings

Summary by CodeRabbit

  • Bug Fixes

    • Enhanced logging by sanitizing URL paths to remove sensitive data before logging.
  • New Features

    • Introduced a sanitization feature to remove newline characters from user input for improved security.

Copy link
Contributor

coderabbitai bot commented Jul 4, 2024

Walkthrough

Recent modifications in the codebase focus on enhancing the security and readability of log statements in the server.go file of the pkg/app package by sanitizing URL paths before logging them. The sanitize package has been introduced to facilitate this by providing a function that removes non-alphanumeric and newline characters from strings.

Changes

File/Path Summary
pkg/app/server.go Added import for sanitize and updated logging statements to use sanitize.String for URL path sanitization.
pkg/sanitize/sanitize.go Introduced String function to sanitize input by removing non-alphanumeric characters.
pkg/sanitize/tests.go Added TestCase struct and TestSanitize function to verify the sanitize.String functionality.

Sequence Diagram(s)

sequenceDiagram
    participant Client
    participant Server
    participant Logger
    participant Sanitize
    
    Client->>Server: HTTP Request with URL
    Server->>Sanitize: sanitize.String(URL.EscapedPath())
    Sanitize-->>Server: Cleaned URL Path
    Server->>Logger: Log "HTTP Request to [Sanitized URL] received"
    Server-->>Client: Handle Request
    Server->>Sanitize: sanitize.String(URL.EscapedPath())
    Sanitize-->>Server: Cleaned URL Path
    Server->>Logger: Log "HTTP Request to [Sanitized URL] complete"
Loading

Poem

In the server’s gentle light we stand,
Logging paths, by a rabbit's hand.
Sanitized clean, no threat in sight,
Each URL shines, pure and bright.
With safety and clarity, we code anew,
In each log, a safer view. 🌟🐇


Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

Share
Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai generate interesting stats about this repository and render them as a table.
    • @coderabbitai show all the console.log statements in this repository.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (invoked as PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Additionally, you can add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.

CodeRabbit Configration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

Commits

Files that changed from the base of the PR and between 4b757b9 and 98bba3e.

Files selected for processing (3)
  • pkg/app/server.go (3 hunks)
  • pkg/sanitize/sanitize.go (1 hunks)
  • pkg/sanitize/sanitize_test.go (1 hunks)
Additional context used
GitHub Check: codecov/patch
pkg/sanitize/sanitize.go

[warning] 11-12: pkg/sanitize/sanitize.go#L11-L12
Added lines #L11 - L12 were not covered by tests

Additional comments not posted (3)
pkg/sanitize/sanitize.go (1)

11-12: Ensure test coverage for the String function.

The implementation is not covered by tests, as indicated by the static analysis tool.

Verification successful

The String function is covered by tests.

The String function is tested in the pkg/sanitize/sanitize_test.go file.

  • pkg/sanitize/sanitize_test.go: Contains tests for the String function.
Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify if the `String` function is tested.

# Test: Search for tests for the `String` function. Expect: Occurrences in test files.
rg --type go 'String('

Length of output: 89


Script:

#!/bin/bash
# Description: Verify if the `String` function is tested.

# Test: Search for tests for the `String` function. Expect: Occurrences in test files.
rg --type go 'String\(' --glob '*_test.go'

Length of output: 1130

Tools
GitHub Check: codecov/patch

[warning] 11-12: pkg/sanitize/sanitize.go#L11-L12
Added lines #L11 - L12 were not covered by tests

pkg/app/server.go (2)

54-54: LGTM! But verify the function usage in the codebase.

The code changes are approved.

However, ensure that all function calls to sanitize.String are correct.

Verification successful

Verification successful and no issues found.

The sanitize.String function is used correctly in the logging statements.

  • pkg/app/server.go:54
  • pkg/app/server.go:56
Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify all function calls to `sanitize.String` are correct.

# Test: Search for the function usage. Expect: Only occurrences of the correct usage.
rg --type go 'sanitize.String('

Length of output: 116


Script:

#!/bin/bash
# Description: Verify all function calls to `sanitize.String` are correct.

# Test: Search for the function usage. Expect: Only occurrences of the correct usage.
rg --type go 'sanitize\.String\('

Length of output: 233


80-80: LGTM! But verify the function usage in the codebase.

The code changes are approved.

However, ensure that all function calls to sanitize.String are correct.

Verification successful

Function usage of sanitize.String is correct.

  • Both occurrences found in pkg/app/server.go are consistent and used correctly in Debugf statements.
Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify all function calls to `sanitize.String` are correct.

# Test: Search for the function usage. Expect: Only occurrences of the correct usage.
rg --type go 'sanitize.String('

Length of output: 116


Script:

#!/bin/bash
# Description: Verify all function calls to `sanitize.String` are correct.

# Test: Search for the function usage. Expect: Only occurrences of the correct usage.
rg --type go 'sanitize\.String\('

Length of output: 233

pkg/sanitize/sanitize.go Outdated Show resolved Hide resolved
pkg/sanitize/sanitize_test.go Show resolved Hide resolved
Copy link

codecov bot commented Jul 4, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 80.10%. Comparing base (4b757b9) to head (724496b).

Additional details and impacted files
@@            Coverage Diff             @@
##             main     #124      +/-   ##
==========================================
+ Coverage   80.08%   80.10%   +0.02%     
==========================================
  Files          13       14       +1     
  Lines        1461     1463       +2     
==========================================
+ Hits         1170     1172       +2     
  Misses        229      229              
  Partials       62       62              

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

Commits

Files that changed from the base of the PR and between 98bba3e and 724496b.

Files selected for processing (1)
  • pkg/sanitize/sanitize.go (1 hunks)
Additional context used
GitHub Check: codecov/patch
pkg/sanitize/sanitize.go

[warning] 11-12: pkg/sanitize/sanitize.go#L11-L12
Added lines #L11 - L12 were not covered by tests

Comment on lines +11 to +12
func String(s string) string {
return strings.ReplaceAll(strings.ReplaceAll(s, "\r", ""), "\n", "")
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add tests for the new functionality.

The new functionality that removes newline and carriage return characters should be covered by tests.

Do you want me to generate the unit testing code or open a GitHub issue to track this task?

Tools
GitHub Check: codecov/patch

[warning] 11-12: pkg/sanitize/sanitize.go#L11-L12
Added lines #L11 - L12 were not covered by tests

pkg/sanitize/sanitize.go Show resolved Hide resolved
@madflojo madflojo merged commit 96c339c into tarmac-project:main Jul 4, 2024
11 checks passed
@madflojo madflojo deleted the sanitize-logs branch July 4, 2024 23:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

1 participant