Skip to content
This repository has been archived by the owner on May 12, 2021. It is now read-only.

Redact private key from startup output #934

Merged
merged 2 commits into from Feb 6, 2019
Merged

Conversation

christianbundy
Copy link
Contributor

Previously we did this output before adding the keys to the config,
but recently there were changes made that required the keys to be added
to the config before the config was finished. This meant that the config
being output contained private keys, which seems like a major security
hazard for debugging.

This commit changes the code so that we make a copy of the full config,
set redactedConfig.keys.private = null, and then output the redacted
configuration safely without any secrets exposed.


Resolves #933

Previously we did this output *before* adding the keys to the config,
but recently there were changes made that required the keys to be added
to the config before the config was finished. This meant that the config
being output contained private keys, which seems like a major security
hazard for debugging.

This commit changes the code so that we make a copy of the full config,
set `redactedConfig.keys.private = null`, and then output the redacted
configuration safely without any secrets exposed.
@christianbundy
Copy link
Contributor Author

I'm going to quick-merge this because:

  1. it's trivial
  2. it's critical
  3. I'd feel real bad if someone leaked their key because of me

@christianbundy christianbundy merged commit 9750bc4 into master Feb 6, 2019
@Powersource
Copy link
Contributor

Just noticed this was fixed, thanks! 🎉

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants