🍲 Auth::Sanitizer
if ci_badges.map(&:color).detect { it != "green"} ☝️ let me know, as I may have missed the discord notification.
if ci_badges.map(&:color).all? { it == "green"} 👇️ send money so I can do more of this. FLOSS maintenance is now my full-time job.
👣 How will this project approach the September 2025 hostile takeover of RubyGems? 🚑️
I've summarized my thoughts in [this blog post](https://dev.to/galtzo/hostile-takeover-of-rubygems-my-thoughts-5hlo).🌻 Synopsis
auth-sanitizer provides small, dependency-light helpers for keeping OAuth and authentication secrets out of object
inspection and log output.
The gem is intentionally narrow in scope. It does not change HTTP requests, token objects, persistence, or application configuration for you. Instead, it gives host gems and applications two reusable redaction surfaces:
Auth::Sanitizer::FilteredAttributesredacts selected instance variables from#inspect.Auth::Sanitizer::SanitizedLoggerwraps an existing logger and redacts sensitive values from string log messages.
Out of the box, logger sanitization filters the key names most commonly found in OAuth and OpenID Connect debug output:
Auth::Sanitizer.default_filtered_keys
# => [
# "access_token",
# "refresh_token",
# "id_token",
# "client_secret",
# "assertion",
# "code_verifier",
# "token",
# ]
Redacted values are replaced with "[FILTERED]" by default. The replacement label can be changed globally by installing
a provider, or per logger by passing label: to Auth::Sanitizer::SanitizedLogger.new.
The library snapshots filter configuration when a redacting object is initialized. That keeps already-created objects and logger wrappers stable even if a host application changes its configuration later.
💡 Info you can shake a stick at
| Tokens to Remember | |
|---|---|
| Works with JRuby | |
| Works with Truffle Ruby | |
| Works with MRI Ruby 4 | |
| Works with MRI Ruby 3 | |
| Works with MRI Ruby 2 | |
| Support & Community | |
| Source | |
| Documentation | |
| Compliance | |
| Style | |
| Maintainer 🎖️ | |
... 💖 |
Compatibility
Compatible with MRI Ruby 2.2.0+, and concordant releases of JRuby, and TruffleRuby.
| 🚚 Amazing test matrix was brought to you by | 🔎 appraisal2 🔎 and the color 💚 green 💚 |
|---|---|
| 👟 Check it out! | ✨ github.com/appraisal-rb/appraisal2 ✨ |
Federated DVCS
Find this repo on federated forges (Coming soon!)
| Federated [DVCS][💎d-in-dvcs] Repository | Status | Issues | PRs | Wiki | CI | Discussions | |-------------------------------------------------|-----------------------------------------------------------------------|---------------------------|--------------------------|---------------------------|--------------------------|------------------------------| | 🧪 [ruby-oauth/auth-sanitizer on GitLab][📜src-gl] | The Truth | [💚][🤝gl-issues] | [💚][🤝gl-pulls] | [💚][📜gl-wiki] | 🐭 Tiny Matrix | ➖ | | 🧊 [ruby-oauth/auth-sanitizer on CodeBerg][📜src-cb] | An Ethical Mirror ([Donate][🤝cb-donate]) | [💚][🤝cb-issues] | [💚][🤝cb-pulls] | ➖ | ⭕️ No Matrix | ➖ | | 🐙 [ruby-oauth/auth-sanitizer on GitHub][📜src-gh] | Another Mirror | [💚][🤝gh-issues] | [💚][🤝gh-pulls] | [💚][📜gh-wiki] | 💯 Full Matrix | [💚][gh-discussions] | | 🎮️ [Discord Server][✉️discord-invite] | [![Live Chat on Discord][✉️discord-invite-img-ftb]][✉️discord-invite] | [Let's][✉️discord-invite] | [talk][✉️discord-invite] | [about][✉️discord-invite] | [this][✉️discord-invite] | [library!][✉️discord-invite] |Enterprise Support 
Available as part of the Tidelift Subscription.
Need enterprise-level guarantees?
The maintainers of this and thousands of other packages are working with Tidelift to deliver commercial support and maintenance for the open source packages you use to build your applications. Save time, reduce risk, and improve code health, while paying the maintainers of the exact packages you use. [![Get help from me on Tidelift][🏙️entsup-tidelift-img]][🏙️entsup-tidelift] - 💡Subscribe for support guarantees covering _all_ your FLOSS dependencies - 💡Tidelift is part of [Sonar][🏙️entsup-tidelift-sonar] - 💡Tidelift pays maintainers to maintain the software you depend on!📊`@`Pointy Haired Boss: An [enterprise support][🏙️entsup-tidelift] subscription is "[never gonna let you down][🧮kloc]", and *supports* open source maintainers Alternatively: - [![Live Chat on Discord][✉️discord-invite-img-ftb]][✉️discord-invite] - [![Get help from me on Upwork][👨🏼🏫expsup-upwork-img]][👨🏼🏫expsup-upwork] - [![Get help from me on Codementor][👨🏼🏫expsup-codementor-img]][👨🏼🏫expsup-codementor]
✨ Installation
Install the gem and add to the application's Gemfile by executing:
bundle add auth-sanitizer
If bundler is not being used to manage dependencies, install the gem by executing:
gem install auth-sanitizer
🔒 Secure Installation
For Medium or High Security Installations
This gem is cryptographically signed and has verifiable [SHA-256 and SHA-512][💎SHA_checksums] checksums by [stone_checksums][💎stone_checksums]. Be sure the gem you install hasn’t been tampered with by following the instructions below. Add my public key (if you haven’t already; key expires 2045-04-29) as a trusted certificate: ```console gem cert --add <(curl -Ls https://raw.github.com/galtzo-floss/certs/main/pboling.pem) ``` You only need to do that once. Then proceed to install with: ```console gem install auth-sanitizer -P HighSecurity ``` The `HighSecurity` trust profile will verify signed gems, and not allow the installation of unsigned dependencies. If you want to up your security game full-time: ```console bundle config set --global trust-policy MediumSecurity ``` `MediumSecurity` instead of `HighSecurity` is necessary if not all the gems you use are signed. NOTE: Be prepared to track down certs for signed gems and add them the same way you added mine.⚙️ Configuration
Most applications can use the defaults. Configuration is available when a host gem or application wants to align redaction with its own logging conventions.
Filtered Label
The default replacement label is:
Auth::Sanitizer.filtered_label
# => "[FILTERED]"
To use a different label globally, install a callable provider:
Auth::Sanitizer.filtered_label_provider = -> { "[REDACTED]" }
The provider is called when a FilteredAttributes object or SanitizedLogger wrapper is initialized. Existing
instances keep the label they captured at initialization time:
Auth::Sanitizer.filtered_label_provider = -> { "[FILTERED]" }
logger = Auth::Sanitizer::SanitizedLogger.new(Logger.new($stdout))
Auth::Sanitizer.filtered_label_provider = -> { "[REDACTED]" }
# `logger` still uses "[FILTERED]"; new wrappers use "[REDACTED]".
This makes it safe for libraries to delegate the label to host configuration:
Auth::Sanitizer.filtered_label_provider = -> { MyGem.config.filtered_label }
Logger Keys
Auth::Sanitizer::SanitizedLogger defaults to Auth::Sanitizer.default_filtered_keys. Pass filtered_keys: when your
application logs additional sensitive fields:
logger = Auth::Sanitizer::SanitizedLogger.new(
Logger.new($stdout),
filtered_keys: Auth::Sanitizer.default_filtered_keys + %w[
api_key
private_key
session_secret
],
)
You can also replace the list entirely:
logger = Auth::Sanitizer::SanitizedLogger.new(
Logger.new($stdout),
filtered_keys: %w[my_secret],
label: "[GONE]",
)
Logger key matching is case-insensitive for supported string formats. The keys are used to redact:
- JSON-style pairs, such as
"access_token": "abc123"and'client_secret': 'abc123' - query-string and form-encoded pairs, such as
access_token=abc123&scope=read Authorization:header values, regardless offiltered_keys
Only string payloads are sanitized. Non-string log payloads are delegated unchanged to the wrapped logger.
Inspect Attributes
Classes opt in to inspect redaction by including Auth::Sanitizer::FilteredAttributes and declaring the attribute names
that should be hidden:
class OAuthCredential
include Auth::Sanitizer::FilteredAttributes
attr_reader :access_token, :expires_at
filtered_attributes :access_token
def initialize(access_token, expires_at)
@access_token = access_token
@expires_at = expires_at
end
end
Declared names are matched against instance variable names. For example, filtered_attributes :access_token redacts
@access_token in #inspect.
Calling filtered_attributes again replaces the class-level list:
OAuthCredential.filtered_attributes(:access_token, :refresh_token)
OAuthCredential.filtered_attribute_names
# => [:access_token, :refresh_token]
Passing no attributes clears the class-level list for subsequently initialized objects:
OAuthCredential.filtered_attributes
OAuthCredential.filtered_attribute_names
# => []
As with logger wrappers, the per-object filter is captured during initialization. Objects that already exist keep their original inspect behavior.
🔧 Basic Usage
Require the gem:
require "auth/sanitizer"
Redact #inspect
Use Auth::Sanitizer::FilteredAttributes for objects that may appear in exception messages, console sessions, or debug
output through #inspect:
class TokenResponse
include Auth::Sanitizer::FilteredAttributes
attr_reader :access_token, :refresh_token, :scope
filtered_attributes :access_token, :refresh_token
def initialize(access_token:, refresh_token:, scope:)
@access_token = access_token
@refresh_token = refresh_token
@scope = scope
end
end
response = TokenResponse.new(
access_token: "access-token-value",
refresh_token: "refresh-token-value",
scope: "profile email",
)
response.inspect
# => #<TokenResponse:123456 @access_token=[FILTERED], @refresh_token=[FILTERED], @scope="profile email">
Only the configured attributes are redacted. Other instance variables remain visible so inspected objects are still useful while debugging.
Redact Logger Output
Wrap an existing logger with Auth::Sanitizer::SanitizedLogger:
require "logger"
require "auth/sanitizer"
logger = Auth::Sanitizer::SanitizedLogger.new(Logger.new($stdout))
logger.debug("access_token=abc123&scope=profile")
# Logs: access_token=[FILTERED]&scope=profile
logger.debug('{"client_secret": "super-secret", "grant_type": "client_credentials"}')
# Logs: {"client_secret": "[FILTERED]", "grant_type": "client_credentials"}
logger.debug("Authorization: Bearer abc123")
# Logs: Authorization: "[FILTERED]"
The wrapper implements the common Ruby logger methods and sanitizes string values passed through them:
logger.add(Logger::DEBUG, "refresh_token=abc123", "oauth")
logger << "id_token=abc123"
logger.debug { "code_verifier=abc123" }
logger.info("token=abc123")
logger.warn("client_secret=abc123")
logger.error("assertion=abc123")
logger.fatal("Authorization: Bearer abc123")
logger.unknown("access_token=abc123")
The wrapper also delegates common logger configuration to the wrapped logger when supported:
logger.level = Logger::WARN
logger.progname = "my-app"
logger.formatter = proc { |_severity, _time, _progname, | "#{}\n" }
logger.close
Methods not implemented by the wrapper are delegated to the underlying logger when that logger responds to them.
Custom Logger Keys
Use filtered_keys: for application-specific secrets:
logger = Auth::Sanitizer::SanitizedLogger.new(
Logger.new($stdout),
filtered_keys: %w[access_token api_key signing_secret],
label: "[SECRET]",
)
logger.debug("api_key=12345&access_token=abc123")
# Logs: api_key=[SECRET]&access_token=[SECRET]
filtered_keys: applies to JSON-style, query-string, and form-encoded key/value pairs. Authorization: headers are
always redacted by SanitizedLogger, even if Authorization is not listed as a filtered key.
Important Limits
auth-sanitizer is a logging and inspection helper, not a complete secret-management system.
- It redacts supported string patterns before delegating to a logger.
- It does not mutate source hashes, token objects, HTTP requests, or HTTP responses.
- It does not recursively sanitize arbitrary Ruby objects passed to a logger as non-string payloads.
- It cannot protect secrets that are logged through a different logger, printed directly, or interpolated into an unsupported format.
For best results, wrap the logger as close as possible to the code that emits authentication debug output, and avoid logging raw token structures unless they pass through the sanitizer first.
🦷 FLOSS Funding
While ruby-oauth tools are free software and will always be, the project would benefit immensely from some funding. Raising a monthly budget of... "dollars" would make the project more sustainable.
We welcome both individual and corporate sponsors! We also offer a wide array of funding channels to account for your preferences (although currently Open Collective is our preferred funding platform).
If you're working in a company that's making significant use of ruby-oauth tools we'd appreciate it if you suggest to your company to become a ruby-oauth sponsor.
You can support the development of ruby-oauth tools via GitHub Sponsors, Liberapay, PayPal, Open Collective and Tidelift.
| 📍 NOTE |
|---|
| If doing a sponsorship in the form of donation is problematic for your company from an accounting standpoint, we'd recommend the use of Tidelift, where you can get a support-like subscription instead. |
Open Collective for Individuals
Support us with a monthly donation and help us continue our activities. [Become a backer]
NOTE: kettle-readme-backers updates this list every day, automatically.
No backers yet. Be the first!
Open Collective for Organizations
Become a sponsor and get your logo on our README on GitHub with a link to your site. [Become a sponsor]
NOTE: kettle-readme-backers updates this list every day, automatically.
No sponsors yet. Be the first!
Another way to support open-source
I’m driven by a passion to foster a thriving open-source community – a space where people can tackle complex problems, no matter how small. Revitalizing libraries that have fallen into disrepair, and building new libraries focused on solving real-world challenges, are my passions. I was recently affected by layoffs, and the tech jobs market is unwelcoming. I’m reaching out here because your support would significantly aid my efforts to provide for my family, and my farm (11 🐔 chickens, 2 🐶 dogs, 3 🐰 rabbits, 8 🐈 cats).
If you work at a company that uses my work, please encourage them to support me as a corporate sponsor. My work on gems you use might show up in bundle fund.
I’m developing a new library, floss_funding, designed to empower open-source developers like myself to get paid for the work we do, in a sustainable way. Please give it a look.
Floss-Funding.dev: 👉️ No network calls. 👉️ No tracking. 👉️ No oversight. 👉️ Minimal crypto hashing. 💡 Easily disabled nags
🔐 Security
See SECURITY.md.
🤝 Contributing
If you need some ideas of where to help, you could work on adding more code coverage, or if it is already 💯 (see below) check reek, issues, or PRs, or use the gem and think about how it could be better.
We so if you make changes, remember to update it.
See CONTRIBUTING.md for more detailed instructions.
🚀 Release Instructions
See CONTRIBUTING.md.
Code Coverage
🪇 Code of Conduct
Everyone interacting with this project's codebases, issue trackers,
chat rooms and mailing lists agrees to follow the .
🌈 Contributors
Made with contributors-img.
Also see GitLab Contributors: https://gitlab.com/ruby-oauth/auth-sanitizer/-/graphs/main
📌 Versioning
This Library adheres to .
Violations of this scheme should be reported as bugs.
Specifically, if a minor or patch version is released that breaks backward compatibility,
a new version should be immediately released that restores compatibility.
Breaking changes to the public API will only be introduced with new major versions.
dropping support for a platform is both obviously and objectively a breaking change
—Jordan Harband (@ljharb, maintainer of SemVer) in SemVer issue 716
I understand that policy doesn't work universally ("exceptions to every rule!"), but it is the policy here. As such, in many cases it is good to specify a dependency on this library using the Pessimistic Version Constraint with two digits of precision.
For example:
spec.add_dependency("auth-sanitizer", "~> 0.0")
📌 Is "Platform Support" part of the public API? More details inside.
SemVer should, IMO, but doesn't explicitly, say that dropping support for specific Platforms is a *breaking change* to an API, and for that reason the bike shedding is endless. To get a better understanding of how SemVer is intended to work over a project's lifetime, read this article from the creator of SemVer: - ["Major Version Numbers are Not Sacred"][📌major-versions-not-sacred]See CHANGELOG.md for a list of releases.
📄 License
The gem is available as open source under the terms of
the MIT .
© Copyright
See LICENSE.md for the official copyright notice.
🤑 A request for help
Maintainers have teeth and need to pay their dentists. After getting laid off in an RIF in March, and encountering difficulty finding a new one, I began spending most of my time building open source tools. I'm hoping to be able to pay for my kids' health insurance this month, so if you value the work I am doing, I need your support. Please consider sponsoring me or the project.
To join the community or get help 👇️ Join the Discord.
To say "thanks!" ☝️ Join the Discord or 👇️ send money.
Please give the project a star ⭐ ♥.
Thanks for RTFM. ☺️