Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 3.15.2 #418

Merged
merged 8 commits into from
Dec 7, 2021
Merged

Release 3.15.2 #418

merged 8 commits into from
Dec 7, 2021

Conversation

nr-swilloughby
Copy link
Contributor

3.15.2

Added

  • Strings logged via the Go Agent's built-in logger will have strings of the form license_key=hex-string changed to license_key=[redacted] before they are output, regardless of severity level, where hex-string means a sequence of upper- or lower-case hexadecimal digits and dots ('.'). This incorporates PR #415.

Support Statement

New Relic recommends that you upgrade the agent regularly to ensure that you’re getting the latest features and performance benefits. Additionally, older releases will no longer be supported when they reach end-of-life.

@nr-swilloughby nr-swilloughby self-assigned this Dec 3, 2021
@nr-swilloughby nr-swilloughby added this to Awaiting User Input in Go Engineering Board via automation Dec 3, 2021
// scrub license keys from any portion of the log message
re := regexp.MustCompile(`license_key=[a-fA-F0-9.]+`)
sanitized := re.ReplaceAllLiteralString(string(js), "license_key=[redacted]")
f.l.Print(sanitized)
} else {
f.l.Printf("unable to marshal log entry: %v", err)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would it be helpful to have a check outside as well on the off-chance that our key is printed

@nr-swilloughby nr-swilloughby merged commit 4b46fc5 into master Dec 7, 2021
Go Engineering Board automation moved this from Awaiting User Input to Done Dec 7, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

Successfully merging this pull request may close these issues.

None yet

2 participants