Skip to content

Commit ed400e9

Browse files
authored
{Logging} Do not leak credentials in exception handling/stack traces (#32337)
1 parent 37b322f commit ed400e9

File tree

18 files changed

+18
-18
lines changed

18 files changed

+18
-18
lines changed

sdk/eventhub/azure-eventhub-checkpointstoreblob-aio/azure/eventhub/extensions/checkpointstoreblobaio/_vendor/storage/blob/_shared/base_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -230,7 +230,7 @@ def _create_pipeline(self, credential, **kwargs):
230230
elif isinstance(credential, AzureSasCredential):
231231
self._credential_policy = AzureSasCredentialPolicy(credential)
232232
elif credential is not None:
233-
raise TypeError("Unsupported credential: {}".format(credential))
233+
raise TypeError("Unsupported credential: {}".format(type(credential)))
234234

235235
config = kwargs.get("_configuration") or create_configuration(**kwargs)
236236
if kwargs.get("_pipeline"):

sdk/eventhub/azure-eventhub-checkpointstoreblob-aio/azure/eventhub/extensions/checkpointstoreblobaio/_vendor/storage/blob/_shared/base_client_async.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ def _create_pipeline(self, credential, **kwargs):
7676
elif isinstance(credential, AzureSasCredential):
7777
self._credential_policy = AzureSasCredentialPolicy(credential)
7878
elif credential is not None:
79-
raise TypeError("Unsupported credential: {}".format(credential))
79+
raise TypeError("Unsupported credential: {}".format(type(credential)))
8080
config = kwargs.get('_configuration') or create_configuration(**kwargs)
8181
if kwargs.get('_pipeline'):
8282
return config, kwargs['_pipeline']

sdk/eventhub/azure-eventhub-checkpointstoreblob/azure/eventhub/extensions/checkpointstoreblob/_vendor/storage/blob/_shared/base_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -230,7 +230,7 @@ def _create_pipeline(self, credential, **kwargs):
230230
elif isinstance(credential, AzureSasCredential):
231231
self._credential_policy = AzureSasCredentialPolicy(credential)
232232
elif credential is not None:
233-
raise TypeError("Unsupported credential: {}".format(credential))
233+
raise TypeError("Unsupported credential: {}".format(type(credential)))
234234

235235
config = kwargs.get("_configuration") or create_configuration(**kwargs)
236236
if kwargs.get("_pipeline"):

sdk/eventhub/azure-eventhub-checkpointstoreblob/azure/eventhub/extensions/checkpointstoreblob/_vendor/storage/blob/_shared/base_client_async.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ def _create_pipeline(self, credential, **kwargs):
7676
elif isinstance(credential, AzureSasCredential):
7777
self._credential_policy = AzureSasCredentialPolicy(credential)
7878
elif credential is not None:
79-
raise TypeError("Unsupported credential: {}".format(credential))
79+
raise TypeError("Unsupported credential: {}".format(type(credential)))
8080
config = kwargs.get('_configuration') or create_configuration(**kwargs)
8181
if kwargs.get('_pipeline'):
8282
return config, kwargs['_pipeline']

sdk/eventhub/azure-eventhub-checkpointstoretable/azure/eventhub/extensions/checkpointstoretable/_vendor/data/tables/_base_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -254,7 +254,7 @@ def _configure_credential(self, credential):
254254
elif isinstance(credential, AzureNamedKeyCredential):
255255
self._credential_policy = SharedKeyCredentialPolicy(credential) # type: ignore
256256
elif credential is not None:
257-
raise TypeError("Unsupported credential: {}".format(credential))
257+
raise TypeError("Unsupported credential: {}".format(type(credential)))
258258

259259
def _batch_send(self, *reqs, **kwargs):
260260
# type: (List[HttpRequest], Any) -> List[Mapping[str, Any]]

sdk/eventhub/azure-eventhub-checkpointstoretable/azure/eventhub/extensions/checkpointstoretable/_vendor/data/tables/aio/_base_client_async.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ def _configure_credential(self, credential):
8383
elif isinstance(credential, AzureNamedKeyCredential):
8484
self._credential_policy = SharedKeyCredentialPolicy(credential) # type: ignore
8585
elif credential is not None:
86-
raise TypeError("Unsupported credential: {}".format(credential))
86+
raise TypeError("Unsupported credential: {}".format(type(credential)))
8787

8888
def _configure_policies(self, **kwargs):
8989
return [

sdk/iothub/azure-iot-deviceprovisioning/azure/iot/deviceprovisioning/_patch.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ def _create_pipeline(
165165
endpoint=base_url, key=key, policy_name=name
166166
)
167167
elif credential is not None:
168-
raise TypeError(f"Unsupported credential: {credential}")
168+
raise TypeError(f"Unsupported credential: {type(credential)}")
169169

170170
policies = [
171171
user_agent_policy,

sdk/iothub/azure-iot-deviceprovisioning/azure/iot/deviceprovisioning/aio/_patch.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,7 @@ def _create_pipeline(
169169
endpoint=base_url, key=key, policy_name=name
170170
)
171171
elif credential is not None:
172-
raise TypeError(f"Unsupported credential: {credential}")
172+
raise TypeError(f"Unsupported credential: {type(credential)}")
173173

174174
transport = kwargs.get("transport", None)
175175
if not transport:

sdk/storage/azure-storage-blob/azure/storage/blob/_shared/base_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -227,7 +227,7 @@ def _create_pipeline(self, credential, **kwargs):
227227
elif isinstance(credential, AzureSasCredential):
228228
self._credential_policy = AzureSasCredentialPolicy(credential)
229229
elif credential is not None:
230-
raise TypeError(f"Unsupported credential: {credential}")
230+
raise TypeError(f"Unsupported credential: {type(credential)}")
231231

232232
config = kwargs.get("_configuration") or create_configuration(**kwargs)
233233
if kwargs.get("_pipeline"):

sdk/storage/azure-storage-blob/azure/storage/blob/_shared/base_client_async.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ def _create_pipeline(self, credential, **kwargs):
7575
elif isinstance(credential, AzureSasCredential):
7676
self._credential_policy = AzureSasCredentialPolicy(credential)
7777
elif credential is not None:
78-
raise TypeError(f"Unsupported credential: {credential}")
78+
raise TypeError(f"Unsupported credential: {type(credential)}")
7979
config = kwargs.get('_configuration') or create_configuration(**kwargs)
8080
if kwargs.get('_pipeline'):
8181
return config, kwargs['_pipeline']

sdk/storage/azure-storage-file-datalake/azure/storage/filedatalake/_shared/base_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -227,7 +227,7 @@ def _create_pipeline(self, credential, **kwargs):
227227
elif isinstance(credential, AzureSasCredential):
228228
self._credential_policy = AzureSasCredentialPolicy(credential)
229229
elif credential is not None:
230-
raise TypeError(f"Unsupported credential: {credential}")
230+
raise TypeError(f"Unsupported credential: {type(credential)}")
231231

232232
config = kwargs.get("_configuration") or create_configuration(**kwargs)
233233
if kwargs.get("_pipeline"):

sdk/storage/azure-storage-file-datalake/azure/storage/filedatalake/_shared/base_client_async.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ def _create_pipeline(self, credential, **kwargs):
7676
elif isinstance(credential, AzureSasCredential):
7777
self._credential_policy = AzureSasCredentialPolicy(credential)
7878
elif credential is not None:
79-
raise TypeError(f"Unsupported credential: {credential}")
79+
raise TypeError(f"Unsupported credential: {type(credential)}")
8080
config = kwargs.get('_configuration') or create_configuration(**kwargs)
8181
if kwargs.get('_pipeline'):
8282
return config, kwargs['_pipeline']

sdk/storage/azure-storage-file-share/azure/storage/fileshare/_shared/base_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -227,7 +227,7 @@ def _create_pipeline(self, credential, **kwargs):
227227
elif isinstance(credential, AzureSasCredential):
228228
self._credential_policy = AzureSasCredentialPolicy(credential)
229229
elif credential is not None:
230-
raise TypeError(f"Unsupported credential: {credential}")
230+
raise TypeError(f"Unsupported credential: {type(credential)}")
231231

232232
config = kwargs.get("_configuration") or create_configuration(**kwargs)
233233
if kwargs.get("_pipeline"):

sdk/storage/azure-storage-file-share/azure/storage/fileshare/_shared/base_client_async.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ def _create_pipeline(self, credential, **kwargs):
7676
elif isinstance(credential, AzureSasCredential):
7777
self._credential_policy = AzureSasCredentialPolicy(credential)
7878
elif credential is not None:
79-
raise TypeError(f"Unsupported credential: {credential}")
79+
raise TypeError(f"Unsupported credential: {type(credential)}")
8080
config = kwargs.get('_configuration') or create_configuration(**kwargs)
8181
if kwargs.get('_pipeline'):
8282
return config, kwargs['_pipeline']

sdk/storage/azure-storage-queue/azure/storage/queue/_shared/base_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -227,7 +227,7 @@ def _create_pipeline(self, credential, **kwargs):
227227
elif isinstance(credential, AzureSasCredential):
228228
self._credential_policy = AzureSasCredentialPolicy(credential)
229229
elif credential is not None:
230-
raise TypeError(f"Unsupported credential: {credential}")
230+
raise TypeError(f"Unsupported credential: {type(credential)}")
231231

232232
config = kwargs.get("_configuration") or create_configuration(**kwargs)
233233
if kwargs.get("_pipeline"):

sdk/storage/azure-storage-queue/azure/storage/queue/_shared/base_client_async.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ def _create_pipeline(self, credential, **kwargs):
7676
elif isinstance(credential, AzureSasCredential):
7777
self._credential_policy = AzureSasCredentialPolicy(credential)
7878
elif credential is not None:
79-
raise TypeError(f"Unsupported credential: {credential}")
79+
raise TypeError(f"Unsupported credential: {type(credential)}")
8080
config = kwargs.get('_configuration') or create_configuration(**kwargs)
8181
if kwargs.get('_pipeline'):
8282
return config, kwargs['_pipeline']

sdk/tables/azure-data-tables/azure/data/tables/_authentication.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,5 +260,5 @@ def _configure_credential(
260260
if isinstance(credential, AzureNamedKeyCredential):
261261
return SharedKeyCredentialPolicy(credential)
262262
if credential is not None:
263-
raise TypeError(f"Unsupported credential: {credential}")
263+
raise TypeError(f"Unsupported credential: {type(credential)}")
264264
return None

sdk/tables/azure-data-tables/azure/data/tables/aio/_authentication_async.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,5 +111,5 @@ def _configure_credential(
111111
if isinstance(credential, AzureNamedKeyCredential):
112112
return SharedKeyCredentialPolicy(credential)
113113
if credential is not None:
114-
raise TypeError(f"Unsupported credential: {credential}")
114+
raise TypeError(f"Unsupported credential: {type(credential)}")
115115
return None

0 commit comments

Comments
 (0)