Skip to content

fix(snapshots): Remove Sentry auth token from objectstore client#3286

Merged
lcian merged 3 commits intomasterfrom
lcian/fix-auth-token-leak-objectstore
Apr 30, 2026
Merged

fix(snapshots): Remove Sentry auth token from objectstore client#3286
lcian merged 3 commits intomasterfrom
lcian/fix-auth-token-leak-objectstore

Conversation

@lcian
Copy link
Copy Markdown
Member

@lcian lcian commented Apr 30, 2026

Attaching the Sentry auth token to Objectstore requests is no longer needed after getsentry/sentry#114288, as authentication will be performed by Objectstore through its auth mechanism and its own header, which we already pass.

Part of FS-344

lcian and others added 3 commits April 30, 2026 10:30
The objectstore client was injecting the user's Sentry auth token as a
default Authorization header on all requests. Since the objectstore URL
comes from the server API response and can point to external storage
hosts (S3, GCS, etc.), this leaked the Sentry token to third-party
services. The objectstore already authenticates via its own auth_token
field (x-os-auth header), making the Sentry token unnecessary.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
The auth() method on AuthenticatedApi no longer has any callers after
removing the token leak. CI builds with -Dwarnings, which promotes
the dead_code warning to a compilation error.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@lcian lcian marked this pull request as ready for review April 30, 2026 08:38
@lcian lcian requested review from a team and szokeasaurusrex as code owners April 30, 2026 08:38
@linear-code
Copy link
Copy Markdown

linear-code Bot commented Apr 30, 2026

@lcian lcian merged commit b383d38 into master Apr 30, 2026
26 checks passed
@lcian lcian deleted the lcian/fix-auth-token-leak-objectstore branch April 30, 2026 12:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants