Skip to content

Redact sensitive values in error descriptions#197

Open
fhwvtqdc2q-svg wants to merge 1 commit into
apple:mainfrom
fhwvtqdc2q-svg:codex/redact-sensitive-runtime-error-values
Open

Redact sensitive values in error descriptions#197
fhwvtqdc2q-svg wants to merge 1 commit into
apple:mainfrom
fhwvtqdc2q-svg:codex/redact-sensitive-runtime-error-values

Conversation

@fhwvtqdc2q-svg
Copy link
Copy Markdown

Summary

  • redact sensitive HTTP header values when formatting runtime error descriptions
  • redact common sensitive query parameters from request paths in formatted error descriptions
  • add regression coverage for ClientError and ServerError descriptions

Why

ClientError and ServerError include request/response metadata in their printable descriptions. Those descriptions can be logged by applications, and currently include raw header values such as Authorization, Cookie, and Set-Cookie, as well as query-string tokens. Redacting those values keeps the diagnostics useful while reducing accidental credential leakage.

Testing

Not run locally because this environment is Windows and does not have Swift/Xcode installed. A macOS GitHub Actions validation run will be triggered on the fork branch.

@fhwvtqdc2q-svg
Copy link
Copy Markdown
Author

Validation note: because this Windows environment cannot run Swift/Xcode locally, I validated the same code on a fork-only validation branch using macOS GitHub Actions. The validation branch adds only a workflow file on top of this PR's code. Run: https://github.com/fhwvtqdc2q-svg/swift-openapi-runtime/actions/runs/25954832217

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants