Server IP : 66.29.132.122 / Your IP : 3.145.112.217 Web Server : LiteSpeed System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64 User : admazpex ( 531) PHP Version : 7.2.34 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/opt/cloudlinux/venv/lib64/python3.11/site-packages/clsentry/ |
Upload File : |
#!/opt/cloudlinux/venv/bin/python3 -bb # coding=utf-8 # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2019 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # http://cloudlinux.com/docs/LICENSE.TXT """Module for all sentry processors related code""" from raven.processors import SanitizePasswordsProcessor class UserlandSanitize(SanitizePasswordsProcessor): """ Beside from default SanitizePasswordsProcessor algorithm, also search key-values in query-like strings. Also sanitize some additional fields. """ FIELDS = frozenset([ 'password', 'secret', 'passwd', 'authorization', 'api_key', 'apikey', 'sentry_dsn', 'access_token', 'email', 'token', 'pass', ]) def sanitize(self, item, value): new_value = super().sanitize(item, value) if new_value == value and isinstance(value, str) and '=' in value: new_value = self._sanitize_keyvals(value, '&') return new_value