Galtzo FLOSS Logo by Aboling0, CC BY-SA 4.0 ruby-lang Logo, Yukihiro Matsumoto, Ruby Visual Identity Team, CC BY-SA 2.5 oauth2 Logo by Chris Messina, CC BY-SA 3.0

🍲 Auth::Sanitizer

Version GitHub tag (latest SemVer) License: MIT Downloads Rank CodeCov Test Coverage Coveralls Test Coverage QLTY Test Coverage QLTY Maintainability CI Heads CI Runtime Dependencies @ HEAD CI Current CI Truffle Ruby CI JRuby Deps Locked Deps Unlocked CI Test Coverage CI Style CodeQL Apache SkyWalking Eyes License Compatibility Check

if ci_badges.map(&:color).detect { it != "green"} ☝️ let me know, as I may have missed the discord notification.


if ci_badges.map(&:color).all? { it == "green"} 👇️ send money so I can do more of this. FLOSS maintenance is now my full-time job.

OpenCollective Backers OpenCollective Sponsors Sponsor Me on Github Liberapay Goal Progress Donate on PayPal Buy me a coffee Donate on Polar Donate at ko-fi.com

👣 How will this project approach the September 2025 hostile takeover of RubyGems? 🚑️ I've summarized my thoughts in [this blog post](https://dev.to/galtzo/hostile-takeover-of-rubygems-my-thoughts-5hlo).

🌻 Synopsis

auth-sanitizer provides small, dependency-light helpers for keeping OAuth and authentication secrets out of object inspection and log output.

The gem is intentionally narrow in scope. It does not change HTTP requests, token objects, persistence, or application configuration for you. Instead, it gives host gems and applications two reusable redaction surfaces:

  • Auth::Sanitizer::FilteredAttributes redacts selected instance variables from #inspect.
  • Auth::Sanitizer::SanitizedLogger wraps an existing logger and redacts sensitive values from string log messages.

Out of the box, logger sanitization filters the key names most commonly found in OAuth and OpenID Connect debug output:

Auth::Sanitizer.default_filtered_keys
# => [
#      "access_token",
#      "refresh_token",
#      "id_token",
#      "client_secret",
#      "assertion",
#      "code_verifier",
#      "token",
#    ]

Redacted values are replaced with "[FILTERED]" by default. The replacement label can be changed globally by installing a provider, or per logger by passing label: to Auth::Sanitizer::SanitizedLogger.new.

The library snapshots filter configuration when a redacting object is initialized. That keeps already-created objects and logger wrappers stable even if a host application changes its configuration later.

💡 Info you can shake a stick at

Tokens to Remember Gem name Gem namespace
Works with JRuby JRuby 9.3 Compat
JRuby 9.4 Compat JRuby current Compat JRuby HEAD Compat
Works with Truffle Ruby Truffle Ruby 22.3 Compat Truffle Ruby 23.0 Compat Truffle Ruby 23.1 Compat
Truffle Ruby 24.2 Compat Truffle Ruby 25.0 Compat Truffle Ruby current Compat
Works with MRI Ruby 4 Ruby 4.0 Compat Ruby current Compat Ruby HEAD Compat
Works with MRI Ruby 3 Ruby 3.0 Compat Ruby 3.1 Compat Ruby 3.2 Compat Ruby 3.3 Compat Ruby 3.4 Compat
Works with MRI Ruby 2 Ruby 2.2 Compat
Ruby 2.3 Compat Ruby 2.4 Compat Ruby 2.5 Compat Ruby 2.6 Compat Ruby 2.7 Compat
Support & Community Join Me on Daily.dev's RubyFriends Live Chat on Discord Get help from me on Upwork Get help from me on Codementor
Source Source on GitLab.com Source on CodeBerg.org Source on Github.com The best SHA: dQw4w9WgXcQ!
Documentation Current release on RubyDoc.info YARD on Galtzo.com Maintainer Blog GitLab Wiki GitHub Wiki
Compliance License: MIT Compatible with Apache Software Projects: Verified by SkyWalking Eyes 📄ilo-declaration-img Security Policy Contributor Covenant 2.1 SemVer 2.0.0
Style Enforced Code Style Linter Keep-A-Changelog 1.0.0 Gitmoji Commits Compatibility appraised by: appraisal2
Maintainer 🎖️ Follow Me on LinkedIn Follow Me on Ruby.Social Follow Me on Bluesky Contact Maintainer My technical writing
... 💖 Find Me on WellFound: Find Me on CrunchBase My LinkTree More About Me 🧊 🐙 🛖 🧪

Compatibility

Compatible with MRI Ruby 2.2.0+, and concordant releases of JRuby, and TruffleRuby.

🚚 Amazing test matrix was brought to you by 🔎 appraisal2 🔎 and the color 💚 green 💚
👟 Check it out! github.com/appraisal-rb/appraisal2

Federated DVCS

Find this repo on federated forges (Coming soon!) | Federated [DVCS][💎d-in-dvcs] Repository | Status | Issues | PRs | Wiki | CI | Discussions | |-------------------------------------------------|-----------------------------------------------------------------------|---------------------------|--------------------------|---------------------------|--------------------------|------------------------------| | 🧪 [ruby-oauth/auth-sanitizer on GitLab][📜src-gl] | The Truth | [💚][🤝gl-issues] | [💚][🤝gl-pulls] | [💚][📜gl-wiki] | 🐭 Tiny Matrix | ➖ | | 🧊 [ruby-oauth/auth-sanitizer on CodeBerg][📜src-cb] | An Ethical Mirror ([Donate][🤝cb-donate]) | [💚][🤝cb-issues] | [💚][🤝cb-pulls] | ➖ | ⭕️ No Matrix | ➖ | | 🐙 [ruby-oauth/auth-sanitizer on GitHub][📜src-gh] | Another Mirror | [💚][🤝gh-issues] | [💚][🤝gh-pulls] | [💚][📜gh-wiki] | 💯 Full Matrix | [💚][gh-discussions] | | 🎮️ [Discord Server][✉️discord-invite] | [![Live Chat on Discord][✉️discord-invite-img-ftb]][✉️discord-invite] | [Let's][✉️discord-invite] | [talk][✉️discord-invite] | [about][✉️discord-invite] | [this][✉️discord-invite] | [library!][✉️discord-invite] |

Enterprise Support Tidelift

Available as part of the Tidelift Subscription.

Need enterprise-level guarantees? The maintainers of this and thousands of other packages are working with Tidelift to deliver commercial support and maintenance for the open source packages you use to build your applications. Save time, reduce risk, and improve code health, while paying the maintainers of the exact packages you use. [![Get help from me on Tidelift][🏙️entsup-tidelift-img]][🏙️entsup-tidelift] - 💡Subscribe for support guarantees covering _all_ your FLOSS dependencies - 💡Tidelift is part of [Sonar][🏙️entsup-tidelift-sonar] - 💡Tidelift pays maintainers to maintain the software you depend on!
📊`@`Pointy Haired Boss: An [enterprise support][🏙️entsup-tidelift] subscription is "[never gonna let you down][🧮kloc]", and *supports* open source maintainers Alternatively: - [![Live Chat on Discord][✉️discord-invite-img-ftb]][✉️discord-invite] - [![Get help from me on Upwork][👨🏼‍🏫expsup-upwork-img]][👨🏼‍🏫expsup-upwork] - [![Get help from me on Codementor][👨🏼‍🏫expsup-codementor-img]][👨🏼‍🏫expsup-codementor]

✨ Installation

Install the gem and add to the application's Gemfile by executing:

bundle add auth-sanitizer

If bundler is not being used to manage dependencies, install the gem by executing:

gem install auth-sanitizer

🔒 Secure Installation

For Medium or High Security Installations This gem is cryptographically signed and has verifiable [SHA-256 and SHA-512][💎SHA_checksums] checksums by [stone_checksums][💎stone_checksums]. Be sure the gem you install hasn’t been tampered with by following the instructions below. Add my public key (if you haven’t already; key expires 2045-04-29) as a trusted certificate: ```console gem cert --add <(curl -Ls https://raw.github.com/galtzo-floss/certs/main/pboling.pem) ``` You only need to do that once. Then proceed to install with: ```console gem install auth-sanitizer -P HighSecurity ``` The `HighSecurity` trust profile will verify signed gems, and not allow the installation of unsigned dependencies. If you want to up your security game full-time: ```console bundle config set --global trust-policy MediumSecurity ``` `MediumSecurity` instead of `HighSecurity` is necessary if not all the gems you use are signed. NOTE: Be prepared to track down certs for signed gems and add them the same way you added mine.

⚙️ Configuration

Most applications can use the defaults. Configuration is available when a host gem or application wants to align redaction with its own logging conventions.

Filtered Label

The default replacement label is:

Auth::Sanitizer.filtered_label
# => "[FILTERED]"

To use a different label globally, install a callable provider:

Auth::Sanitizer.filtered_label_provider = -> { "[REDACTED]" }

The provider is called when a FilteredAttributes object or SanitizedLogger wrapper is initialized. Existing instances keep the label they captured at initialization time:

Auth::Sanitizer.filtered_label_provider = -> { "[FILTERED]" }
logger = Auth::Sanitizer::SanitizedLogger.new(Logger.new($stdout))

Auth::Sanitizer.filtered_label_provider = -> { "[REDACTED]" }

# `logger` still uses "[FILTERED]"; new wrappers use "[REDACTED]".

This makes it safe for libraries to delegate the label to host configuration:

Auth::Sanitizer.filtered_label_provider = -> { MyGem.config.filtered_label }

Logger Keys

Auth::Sanitizer::SanitizedLogger defaults to Auth::Sanitizer.default_filtered_keys. Pass filtered_keys: when your application logs additional sensitive fields:

logger = Auth::Sanitizer::SanitizedLogger.new(
  Logger.new($stdout),
  filtered_keys: Auth::Sanitizer.default_filtered_keys + %w[
    api_key
    private_key
    session_secret
  ],
)

You can also replace the list entirely:

logger = Auth::Sanitizer::SanitizedLogger.new(
  Logger.new($stdout),
  filtered_keys: %w[my_secret],
  label: "[GONE]",
)

Logger key matching is case-insensitive for supported string formats. The keys are used to redact:

  • JSON-style pairs, such as "access_token": "abc123" and 'client_secret': 'abc123'
  • query-string and form-encoded pairs, such as access_token=abc123&scope=read
  • Authorization: header values, regardless of filtered_keys

Only string payloads are sanitized. Non-string log payloads are delegated unchanged to the wrapped logger.

Inspect Attributes

Classes opt in to inspect redaction by including Auth::Sanitizer::FilteredAttributes and declaring the attribute names that should be hidden:

class OAuthCredential
  include Auth::Sanitizer::FilteredAttributes

  attr_reader :access_token, :expires_at

  filtered_attributes :access_token

  def initialize(access_token, expires_at)
    @access_token = access_token
    @expires_at = expires_at
  end
end

Declared names are matched against instance variable names. For example, filtered_attributes :access_token redacts @access_token in #inspect.

Calling filtered_attributes again replaces the class-level list:

OAuthCredential.filtered_attributes(:access_token, :refresh_token)
OAuthCredential.filtered_attribute_names
# => [:access_token, :refresh_token]

Passing no attributes clears the class-level list for subsequently initialized objects:

OAuthCredential.filtered_attributes
OAuthCredential.filtered_attribute_names
# => []

As with logger wrappers, the per-object filter is captured during initialization. Objects that already exist keep their original inspect behavior.

🔧 Basic Usage

Require the gem:

require "auth/sanitizer"

Redact #inspect

Use Auth::Sanitizer::FilteredAttributes for objects that may appear in exception messages, console sessions, or debug output through #inspect:

class TokenResponse
  include Auth::Sanitizer::FilteredAttributes

  attr_reader :access_token, :refresh_token, :scope

  filtered_attributes :access_token, :refresh_token

  def initialize(access_token:, refresh_token:, scope:)
    @access_token = access_token
    @refresh_token = refresh_token
    @scope = scope
  end
end

response = TokenResponse.new(
  access_token: "access-token-value",
  refresh_token: "refresh-token-value",
  scope: "profile email",
)

response.inspect
# => #<TokenResponse:123456 @access_token=[FILTERED], @refresh_token=[FILTERED], @scope="profile email">

Only the configured attributes are redacted. Other instance variables remain visible so inspected objects are still useful while debugging.

Redact Logger Output

Wrap an existing logger with Auth::Sanitizer::SanitizedLogger:

require "logger"
require "auth/sanitizer"

logger = Auth::Sanitizer::SanitizedLogger.new(Logger.new($stdout))

logger.debug("access_token=abc123&scope=profile")
# Logs: access_token=[FILTERED]&scope=profile

logger.debug('{"client_secret": "super-secret", "grant_type": "client_credentials"}')
# Logs: {"client_secret": "[FILTERED]", "grant_type": "client_credentials"}

logger.debug("Authorization: Bearer abc123")
# Logs: Authorization: "[FILTERED]"

The wrapper implements the common Ruby logger methods and sanitizes string values passed through them:

logger.add(Logger::DEBUG, "refresh_token=abc123", "oauth")
logger << "id_token=abc123"

logger.debug { "code_verifier=abc123" }
logger.info("token=abc123")
logger.warn("client_secret=abc123")
logger.error("assertion=abc123")
logger.fatal("Authorization: Bearer abc123")
logger.unknown("access_token=abc123")

The wrapper also delegates common logger configuration to the wrapped logger when supported:

logger.level = Logger::WARN
logger.progname = "my-app"
logger.formatter = proc { |_severity, _time, _progname, message| "#{message}\n" }
logger.close

Methods not implemented by the wrapper are delegated to the underlying logger when that logger responds to them.

Custom Logger Keys

Use filtered_keys: for application-specific secrets:

logger = Auth::Sanitizer::SanitizedLogger.new(
  Logger.new($stdout),
  filtered_keys: %w[access_token api_key signing_secret],
  label: "[SECRET]",
)

logger.debug("api_key=12345&access_token=abc123")
# Logs: api_key=[SECRET]&access_token=[SECRET]

filtered_keys: applies to JSON-style, query-string, and form-encoded key/value pairs. Authorization: headers are always redacted by SanitizedLogger, even if Authorization is not listed as a filtered key.

Important Limits

auth-sanitizer is a logging and inspection helper, not a complete secret-management system.

  • It redacts supported string patterns before delegating to a logger.
  • It does not mutate source hashes, token objects, HTTP requests, or HTTP responses.
  • It does not recursively sanitize arbitrary Ruby objects passed to a logger as non-string payloads.
  • It cannot protect secrets that are logged through a different logger, printed directly, or interpolated into an unsupported format.

For best results, wrap the logger as close as possible to the code that emits authentication debug output, and avoid logging raw token structures unless they pass through the sanitizer first.

🦷 FLOSS Funding

While ruby-oauth tools are free software and will always be, the project would benefit immensely from some funding. Raising a monthly budget of... "dollars" would make the project more sustainable.

We welcome both individual and corporate sponsors! We also offer a wide array of funding channels to account for your preferences (although currently Open Collective is our preferred funding platform).

If you're working in a company that's making significant use of ruby-oauth tools we'd appreciate it if you suggest to your company to become a ruby-oauth sponsor.

You can support the development of ruby-oauth tools via GitHub Sponsors, Liberapay, PayPal, Open Collective and Tidelift.

📍 NOTE
If doing a sponsorship in the form of donation is problematic for your company
from an accounting standpoint, we'd recommend the use of Tidelift,
where you can get a support-like subscription instead.

Open Collective for Individuals

Support us with a monthly donation and help us continue our activities. [Become a backer]

NOTE: kettle-readme-backers updates this list every day, automatically.

No backers yet. Be the first!

Open Collective for Organizations

Become a sponsor and get your logo on our README on GitHub with a link to your site. [Become a sponsor]

NOTE: kettle-readme-backers updates this list every day, automatically.

No sponsors yet. Be the first!

Another way to support open-source

I’m driven by a passion to foster a thriving open-source community – a space where people can tackle complex problems, no matter how small. Revitalizing libraries that have fallen into disrepair, and building new libraries focused on solving real-world challenges, are my passions. I was recently affected by layoffs, and the tech jobs market is unwelcoming. I’m reaching out here because your support would significantly aid my efforts to provide for my family, and my farm (11 🐔 chickens, 2 🐶 dogs, 3 🐰 rabbits, 8 🐈‍ cats).

If you work at a company that uses my work, please encourage them to support me as a corporate sponsor. My work on gems you use might show up in bundle fund.

I’m developing a new library, floss_funding, designed to empower open-source developers like myself to get paid for the work we do, in a sustainable way. Please give it a look.

Floss-Funding.dev: 👉️ No network calls. 👉️ No tracking. 👉️ No oversight. 👉️ Minimal crypto hashing. 💡 Easily disabled nags

OpenCollective Backers OpenCollective Sponsors Sponsor Me on Github Liberapay Goal Progress Donate on PayPal Buy me a coffee Donate on Polar Donate to my FLOSS efforts at ko-fi.com Donate to my FLOSS efforts using Patreon

🔐 Security

See SECURITY.md.

🤝 Contributing

If you need some ideas of where to help, you could work on adding more code coverage, or if it is already 💯 (see below) check reek, issues, or PRs, or use the gem and think about how it could be better.

We Keep A Changelog so if you make changes, remember to update it.

See CONTRIBUTING.md for more detailed instructions.

🚀 Release Instructions

See CONTRIBUTING.md.

Code Coverage

Coverage Graph

Coveralls Test Coverage

QLTY Test Coverage

🪇 Code of Conduct

Everyone interacting with this project's codebases, issue trackers, chat rooms and mailing lists agrees to follow the Contributor Covenant 2.1.

🌈 Contributors

Contributors

Made with contributors-img.

Also see GitLab Contributors: https://gitlab.com/ruby-oauth/auth-sanitizer/-/graphs/main

⭐️ Star History Star History Chart

📌 Versioning

This Library adheres to Semantic Versioning 2.0.0. Violations of this scheme should be reported as bugs. Specifically, if a minor or patch version is released that breaks backward compatibility, a new version should be immediately released that restores compatibility. Breaking changes to the public API will only be introduced with new major versions.

dropping support for a platform is both obviously and objectively a breaking change
—Jordan Harband (@ljharb, maintainer of SemVer) in SemVer issue 716

I understand that policy doesn't work universally ("exceptions to every rule!"), but it is the policy here. As such, in many cases it is good to specify a dependency on this library using the Pessimistic Version Constraint with two digits of precision.

For example:

spec.add_dependency("auth-sanitizer", "~> 0.0")
📌 Is "Platform Support" part of the public API? More details inside. SemVer should, IMO, but doesn't explicitly, say that dropping support for specific Platforms is a *breaking change* to an API, and for that reason the bike shedding is endless. To get a better understanding of how SemVer is intended to work over a project's lifetime, read this article from the creator of SemVer: - ["Major Version Numbers are Not Sacred"][📌major-versions-not-sacred]

See CHANGELOG.md for a list of releases.

📄 License

The gem is available as open source under the terms of the MIT License: MIT.

See LICENSE.md for the official copyright notice.

🤑 A request for help

Maintainers have teeth and need to pay their dentists. After getting laid off in an RIF in March, and encountering difficulty finding a new one, I began spending most of my time building open source tools. I'm hoping to be able to pay for my kids' health insurance this month, so if you value the work I am doing, I need your support. Please consider sponsoring me or the project.

To join the community or get help 👇️ Join the Discord.

Live Chat on Discord

To say "thanks!" ☝️ Join the Discord or 👇️ send money.

Sponsor ruby-oauth/auth-sanitizer on Open Source Collective 💌 Sponsor me on GitHub Sponsors 💌 Sponsor me on Liberapay 💌 Donate on PayPal

Please give the project a star ⭐ ♥.

Thanks for RTFM. ☺️