mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-12-26 17:34:11 -05:00
64133126cd
This PR updates golangci-lint to the latest version 1.31.0. The upgrade introduced a new check for which I've fixed or disabled most cases. Signed-off-by: kolaente <k@knt.li>
48 lines
1.4 KiB
Go
48 lines
1.4 KiB
Go
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
// Use of this source code is governed by a MIT-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package util
|
|
|
|
import (
|
|
"net/url"
|
|
"strings"
|
|
)
|
|
|
|
// urlSafeError wraps an error whose message may contain a sensitive URL
|
|
type urlSafeError struct {
|
|
err error
|
|
unsanitizedURL string
|
|
}
|
|
|
|
func (err urlSafeError) Error() string {
|
|
return SanitizeMessage(err.err.Error(), err.unsanitizedURL)
|
|
}
|
|
|
|
// URLSanitizedError returns the sanitized version an error whose message may
|
|
// contain a sensitive URL
|
|
func URLSanitizedError(err error, unsanitizedURL string) error {
|
|
return urlSafeError{err: err, unsanitizedURL: unsanitizedURL}
|
|
}
|
|
|
|
// SanitizeMessage sanitizes a message which may contains a sensitive URL
|
|
func SanitizeMessage(message, unsanitizedURL string) string {
|
|
sanitizedURL := SanitizeURLCredentials(unsanitizedURL, true)
|
|
return strings.ReplaceAll(message, unsanitizedURL, sanitizedURL)
|
|
}
|
|
|
|
// SanitizeURLCredentials sanitizes a url, either removing user credentials
|
|
// or replacing them with a placeholder.
|
|
func SanitizeURLCredentials(unsanitizedURL string, usePlaceholder bool) string {
|
|
u, err := url.Parse(unsanitizedURL)
|
|
if err != nil {
|
|
// don't log the error, since it might contain unsanitized URL.
|
|
return "(unparsable url)"
|
|
}
|
|
if u.User != nil && usePlaceholder {
|
|
u.User = url.User("<credentials>")
|
|
} else {
|
|
u.User = nil
|
|
}
|
|
return u.String()
|
|
}
|