Skip to content

Commit b339d83

Browse files
1 parent 871c437 commit b339d83

File tree

5 files changed

+283
-0
lines changed

5 files changed

+283
-0
lines changed

sentry_sdk/client.py

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@
2929
from sentry_sdk.sessions import SessionFlusher
3030
from sentry_sdk.envelope import Envelope
3131
from sentry_sdk.profiler import has_profiling_enabled, setup_profiler
32+
from sentry_sdk.scrubber import EventScrubber
3233

3334
from sentry_sdk._types import TYPE_CHECKING
3435

@@ -111,6 +112,9 @@ def _get_options(*args, **kwargs):
111112
if rv["enable_tracing"] is True and rv["traces_sample_rate"] is None:
112113
rv["traces_sample_rate"] = 1.0
113114

115+
if rv["event_scrubber"] is None:
116+
rv["event_scrubber"] = EventScrubber()
117+
114118
return rv
115119

116120

@@ -249,6 +253,11 @@ def _prepare_event(
249253
self.options["project_root"],
250254
)
251255

256+
if event is not None:
257+
event_scrubber = self.options["event_scrubber"]
258+
if event_scrubber and not self.options["send_default_pii"]:
259+
event_scrubber.scrub_event(event)
260+
252261
# Postprocess the event here so that annotated types do
253262
# generally not surface in before_send
254263
if event is not None:

sentry_sdk/consts.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,7 @@ def __init__(
133133
trace_propagation_targets=[ # noqa: B006
134134
MATCH_ALL
135135
], # type: Optional[Sequence[str]]
136+
event_scrubber=None, # type: Optional[sentry_sdk.scrubber.EventScrubber]
136137
):
137138
# type: (...) -> None
138139
pass

sentry_sdk/scrubber.py

Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
from sentry_sdk.utils import (
2+
capture_internal_exceptions,
3+
AnnotatedValue,
4+
iter_event_frames,
5+
)
6+
from sentry_sdk._compat import string_types
7+
from sentry_sdk._types import TYPE_CHECKING
8+
9+
if TYPE_CHECKING:
10+
from sentry_sdk._types import Event
11+
from typing import Any
12+
from typing import Dict
13+
from typing import List
14+
from typing import Optional
15+
16+
17+
DEFAULT_DENYLIST = [
18+
# stolen from relay
19+
"password",
20+
"passwd",
21+
"secret",
22+
"api_key",
23+
"apikey",
24+
"auth",
25+
"credentials",
26+
"mysql_pwd",
27+
"privatekey",
28+
"private_key",
29+
"token",
30+
"ip_address",
31+
"session",
32+
# django
33+
"csrftoken",
34+
"sessionid",
35+
# wsgi
36+
"remote_addr",
37+
"x_csrftoken",
38+
"x_forwarded_for",
39+
"set_cookie",
40+
"cookie",
41+
"authorization",
42+
"x_api_key",
43+
"x_forwarded_for",
44+
"x_real_ip",
45+
]
46+
47+
48+
class EventScrubber(object):
49+
def __init__(self, denylist=None):
50+
# type: (Optional[List[str]]) -> None
51+
self.denylist = DEFAULT_DENYLIST if denylist is None else denylist
52+
53+
def scrub_dict(self, d):
54+
# type: (Dict[str, Any]) -> None
55+
if not isinstance(d, dict):
56+
return
57+
58+
for k in d.keys():
59+
if isinstance(k, string_types) and k.lower() in self.denylist:
60+
d[k] = AnnotatedValue.substituted_because_contains_sensitive_data()
61+
62+
def scrub_request(self, event):
63+
# type: (Event) -> None
64+
with capture_internal_exceptions():
65+
if "request" in event:
66+
if "headers" in event["request"]:
67+
self.scrub_dict(event["request"]["headers"])
68+
if "cookies" in event["request"]:
69+
self.scrub_dict(event["request"]["cookies"])
70+
if "data" in event["request"]:
71+
self.scrub_dict(event["request"]["data"])
72+
73+
def scrub_extra(self, event):
74+
# type: (Event) -> None
75+
with capture_internal_exceptions():
76+
if "extra" in event:
77+
self.scrub_dict(event["extra"])
78+
79+
def scrub_user(self, event):
80+
# type: (Event) -> None
81+
with capture_internal_exceptions():
82+
if "user" in event:
83+
self.scrub_dict(event["user"])
84+
85+
def scrub_breadcrumbs(self, event):
86+
# type: (Event) -> None
87+
with capture_internal_exceptions():
88+
if "breadcrumbs" in event:
89+
if "values" in event["breadcrumbs"]:
90+
for value in event["breadcrumbs"]["values"]:
91+
if "data" in value:
92+
self.scrub_dict(value["data"])
93+
94+
def scrub_frames(self, event):
95+
# type: (Event) -> None
96+
with capture_internal_exceptions():
97+
for frame in iter_event_frames(event):
98+
if "vars" in frame:
99+
self.scrub_dict(frame["vars"])
100+
101+
def scrub_spans(self, event):
102+
# type: (Event) -> None
103+
with capture_internal_exceptions():
104+
if "spans" in event:
105+
for span in event["spans"]:
106+
if "data" in span:
107+
self.scrub_dict(span["data"])
108+
109+
def scrub_event(self, event):
110+
# type: (Event) -> None
111+
self.scrub_request(event)
112+
self.scrub_extra(event)
113+
self.scrub_user(event)
114+
self.scrub_breadcrumbs(event)
115+
self.scrub_frames(event)
116+
self.scrub_spans(event)

sentry_sdk/serializer.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -254,6 +254,8 @@ def _serialize_node_impl(
254254
obj, is_databag, should_repr_strings, remaining_depth, remaining_breadth
255255
):
256256
# type: (Any, Optional[bool], Optional[bool], Optional[int], Optional[int]) -> Any
257+
if isinstance(obj, AnnotatedValue):
258+
should_repr_strings = False
257259
if should_repr_strings is None:
258260
should_repr_strings = _should_repr_strings()
259261

tests/test_scrubber.py

Lines changed: 155 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,155 @@
1+
import sys
2+
import logging
3+
4+
from sentry_sdk import capture_exception, capture_event, start_transaction, start_span
5+
from sentry_sdk.utils import event_from_exception
6+
from sentry_sdk.scrubber import EventScrubber
7+
8+
9+
logger = logging.getLogger(__name__)
10+
logger.setLevel(logging.DEBUG)
11+
12+
13+
def test_request_scrubbing(sentry_init, capture_events):
14+
sentry_init()
15+
events = capture_events()
16+
17+
try:
18+
1 / 0
19+
except ZeroDivisionError:
20+
ev, _hint = event_from_exception(sys.exc_info())
21+
22+
ev["request"] = {
23+
"headers": {
24+
"COOKIE": "secret",
25+
"authorization": "Bearer bla",
26+
"ORIGIN": "google.com",
27+
},
28+
"cookies": {
29+
"sessionid": "secret",
30+
"foo": "bar",
31+
},
32+
"data": {
33+
"token": "secret",
34+
"foo": "bar",
35+
},
36+
}
37+
38+
capture_event(ev)
39+
40+
(event,) = events
41+
42+
assert event["request"] == {
43+
"headers": {
44+
"COOKIE": "[Filtered]",
45+
"authorization": "[Filtered]",
46+
"ORIGIN": "google.com",
47+
},
48+
"cookies": {"sessionid": "[Filtered]", "foo": "bar"},
49+
"data": {"token": "[Filtered]", "foo": "bar"},
50+
}
51+
52+
assert event["_meta"]["request"] == {
53+
"headers": {
54+
"COOKIE": {"": {"rem": [["!config", "s"]]}},
55+
"authorization": {"": {"rem": [["!config", "s"]]}},
56+
},
57+
"cookies": {"sessionid": {"": {"rem": [["!config", "s"]]}}},
58+
"data": {"token": {"": {"rem": [["!config", "s"]]}}},
59+
}
60+
61+
62+
def test_stack_var_scrubbing(sentry_init, capture_events):
63+
sentry_init()
64+
events = capture_events()
65+
66+
try:
67+
password = "supersecret" # noqa
68+
api_key = "1231231231" # noqa
69+
safe = "keepthis" # noqa
70+
1 / 0
71+
except ZeroDivisionError:
72+
capture_exception()
73+
74+
(event,) = events
75+
76+
frames = event["exception"]["values"][0]["stacktrace"]["frames"]
77+
(frame,) = frames
78+
assert frame["vars"]["password"] == "[Filtered]"
79+
assert frame["vars"]["api_key"] == "[Filtered]"
80+
assert frame["vars"]["safe"] == "'keepthis'"
81+
82+
meta = event["_meta"]["exception"]["values"]["0"]["stacktrace"]["frames"]["0"][
83+
"vars"
84+
]
85+
assert meta == {
86+
"password": {"": {"rem": [["!config", "s"]]}},
87+
"api_key": {"": {"rem": [["!config", "s"]]}},
88+
}
89+
90+
91+
def test_breadcrumb_extra_scrubbing(sentry_init, capture_events):
92+
sentry_init()
93+
events = capture_events()
94+
95+
logger.info("bread", extra=dict(foo=42, password="secret"))
96+
logger.critical("whoops", extra=dict(bar=69, auth="secret"))
97+
98+
(event,) = events
99+
100+
assert event["extra"]["bar"] == 69
101+
assert event["extra"]["auth"] == "[Filtered]"
102+
103+
assert event["breadcrumbs"]["values"][0]["data"] == {
104+
"foo": 42,
105+
"password": "[Filtered]",
106+
}
107+
108+
assert event["_meta"] == {
109+
"extra": {"auth": {"": {"rem": [["!config", "s"]]}}},
110+
"breadcrumbs": {
111+
"values": {"0": {"data": {"password": {"": {"rem": [["!config", "s"]]}}}}}
112+
},
113+
}
114+
115+
116+
def test_span_data_scrubbing(sentry_init, capture_events):
117+
sentry_init(traces_sample_rate=1.0)
118+
events = capture_events()
119+
120+
with start_transaction(name="hi"):
121+
with start_span(op="foo", description="bar") as span:
122+
span.set_data("password", "secret")
123+
span.set_data("datafoo", "databar")
124+
125+
(event,) = events
126+
assert event["spans"][0]["data"] == {"password": "[Filtered]", "datafoo": "databar"}
127+
assert event["_meta"] == {
128+
"spans": {"0": {"data": {"password": {"": {"rem": [["!config", "s"]]}}}}}
129+
}
130+
131+
132+
def test_custom_denylist(sentry_init, capture_events):
133+
sentry_init(event_scrubber=EventScrubber(denylist=["my_sensitive_var"]))
134+
events = capture_events()
135+
136+
try:
137+
my_sensitive_var = "secret" # noqa
138+
safe = "keepthis" # noqa
139+
1 / 0
140+
except ZeroDivisionError:
141+
capture_exception()
142+
143+
(event,) = events
144+
145+
frames = event["exception"]["values"][0]["stacktrace"]["frames"]
146+
(frame,) = frames
147+
assert frame["vars"]["my_sensitive_var"] == "[Filtered]"
148+
assert frame["vars"]["safe"] == "'keepthis'"
149+
150+
meta = event["_meta"]["exception"]["values"]["0"]["stacktrace"]["frames"]["0"][
151+
"vars"
152+
]
153+
assert meta == {
154+
"my_sensitive_var": {"": {"rem": [["!config", "s"]]}},
155+
}

0 commit comments

Comments
 (0)