diff options
author | Joram Wilander <jwawilander@gmail.com> | 2016-05-03 14:45:36 -0400 |
---|---|---|
committer | Christopher Speller <crspeller@gmail.com> | 2016-05-03 14:45:36 -0400 |
commit | b18cf58c8f607bed64d821fcc856e251a391df6a (patch) | |
tree | 7315a3f82a9de07fd3dd5ca0b83ddb912f87d5aa /utils/config.go | |
parent | 87989b8afd4666a72940389db716b6500d0a9ec3 (diff) | |
download | chat-b18cf58c8f607bed64d821fcc856e251a391df6a.tar.gz chat-b18cf58c8f607bed64d821fcc856e251a391df6a.tar.bz2 chat-b18cf58c8f607bed64d821fcc856e251a391df6a.zip |
Sanitize sensitive data of out config file for the system console (#2849)
Diffstat (limited to 'utils/config.go')
-rw-r--r-- | utils/config.go | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/utils/config.go b/utils/config.go index 9e2776f75..14d6589a2 100644 --- a/utils/config.go +++ b/utils/config.go @@ -283,3 +283,41 @@ func ValidateLdapFilter(cfg *model.Config) *model.AppError { } return nil } + +func Desanitize(cfg *model.Config) { + if *cfg.LdapSettings.BindPassword == model.FAKE_SETTING { + *cfg.LdapSettings.BindPassword = *Cfg.LdapSettings.BindPassword + } + + if cfg.FileSettings.PublicLinkSalt == model.FAKE_SETTING { + cfg.FileSettings.PublicLinkSalt = Cfg.FileSettings.PublicLinkSalt + } + if cfg.FileSettings.AmazonS3SecretAccessKey == model.FAKE_SETTING { + cfg.FileSettings.AmazonS3SecretAccessKey = Cfg.FileSettings.AmazonS3SecretAccessKey + } + + if cfg.EmailSettings.InviteSalt == model.FAKE_SETTING { + cfg.EmailSettings.InviteSalt = Cfg.EmailSettings.InviteSalt + } + if cfg.EmailSettings.PasswordResetSalt == model.FAKE_SETTING { + cfg.EmailSettings.PasswordResetSalt = Cfg.EmailSettings.PasswordResetSalt + } + if cfg.EmailSettings.SMTPPassword == model.FAKE_SETTING { + cfg.EmailSettings.SMTPPassword = Cfg.EmailSettings.SMTPPassword + } + + if cfg.GitLabSettings.Secret == model.FAKE_SETTING { + cfg.GitLabSettings.Secret = Cfg.GitLabSettings.Secret + } + + if cfg.SqlSettings.DataSource == model.FAKE_SETTING { + cfg.SqlSettings.DataSource = Cfg.SqlSettings.DataSource + } + if cfg.SqlSettings.AtRestEncryptKey == model.FAKE_SETTING { + cfg.SqlSettings.AtRestEncryptKey = Cfg.SqlSettings.AtRestEncryptKey + } + + for i := range cfg.SqlSettings.DataSourceReplicas { + cfg.SqlSettings.DataSourceReplicas[i] = Cfg.SqlSettings.DataSourceReplicas[i] + } +} |