Allows you to specify sensitive parameters which will be replaced from the request log by looking in the query string of the request and all subhashes of the params hash to filter. If a block is given, each key and value of the params hash and all subhashes is passed to it, the value or key can be replaced using String#replace or similar method.
Examples:
env["action_dispatch.parameter_filter"] = [:password] => replaces the value to all keys matching /password/ with "[FILTERED]" env["action_dispatch.parameter_filter"] = [:foo, "bar"] => replaces the value to all keys matching /foo|bar/ with "[FILTERED]" env["action_dispatch.parameter_filter"] = lambda do |k,v| v.reverse! if k =~ /secret/ end => reverses the value to all keys matching /secret/
Methods
- E
- F
- P
Constants
KV_RE | = | '[^&;=]+' |
PAIR_RE | = | %r{(#{KV_RE})=(#{KV_RE})} |
Instance Public methods
filtered_env()
Link
Return a hash of request.env with all sensitive data replaced.
filtered_parameters()
Link
Return a hash of parameters with all sensitive data replaced.
filtered_path()
Link
Reconstructed a path with all sensitive GET parameters replaced.
Instance Protected methods
env_filter()
Link
filtered_query_string()
Link
parameter_filter()
Link