From 17e6340f931c4d6690877f9536721f78e0fb2610 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Adam=20Medzi=C5=84ski?= Date: Mon, 16 Jul 2018 12:50:46 +0200 Subject: [PATCH] Fix VaaS credentials leakage (#120) Fix VaaS credentials leakage in executor logs by logging only the request path (credentials are in query string). --- hook/vaas/client.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/hook/vaas/client.go b/hook/vaas/client.go index 9453e66b..f0a8483d 100644 --- a/hook/vaas/client.go +++ b/hook/vaas/client.go @@ -240,7 +240,7 @@ func (c *defaultClient) do(request *http.Request) (*http.Response, error) { message = string(rawResponse) } return response, fmt.Errorf("VaaS API error at %s (HTTP %d): %s", - request.URL, response.StatusCode, message) + request.URL.Path, response.StatusCode, message) } return response, nil