blob: e661865801a1f91680b6f8edabcce5967be0e6ea (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
|
package helper
import (
"errors"
"os"
"regexp"
"strings"
)
// ContainsPathTraversal checks if the path contains any traversal
func ContainsPathTraversal(path string) bool {
// Disallow directory traversal for security
separator := string(os.PathSeparator)
return strings.HasPrefix(path, ".."+separator) ||
strings.Contains(path, separator+".."+separator) ||
strings.HasSuffix(path, separator+"..")
}
// Pattern taken from Regular Expressions Cookbook, slightly modified though
// |Scheme |User |Named/IPv4 host|IPv6+ host
var hostPattern = regexp.MustCompile(`(?i)([a-z][a-z0-9+\-.]*://)([a-z0-9\-._~%!$&'()*+,;=:]+@)([a-z0-9\-._~%]+|\[[a-z0-9\-._~%!$&'()*+,;=:]+\])`)
// SanitizeString will clean password and tokens from URLs, and replace them
// with [FILTERED].
func SanitizeString(str string) string {
return hostPattern.ReplaceAllString(str, "$1[FILTERED]@$3$4")
}
// SanitizeError does the same thing as SanitizeString but for error types
func SanitizeError(err error) error {
return errors.New(SanitizeString(err.Error()))
}
|