fix(api): redact SSO request logs#2148
Conversation
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: defaults Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (5)
📝 WalkthroughWalkthroughThis PR centralizes SSO logging by introducing a ChangesSSO Log Redaction Refactoring
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes Possibly related PRs
Poem
🚥 Pre-merge checks | ✅ 4 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (4 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Tip 💬 Introducing Slack Agent: The best way for teams to turn conversations into code.Slack Agent is built on CodeRabbit's deep understanding of your code, so your team can collaborate across the entire SDLC without losing context.
Built for teams:
One agent for your entire SDLC. Right inside Slack. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Merging this PR will not alter performance
Comparing Footnotes
|
|
|
Closing as AI-generated spam. Part of a 50+ PR wave of duplicate |



Summary (AI generated)
Motivation (AI generated)
Routine SSO logs should not retain raw user, organization, domain, provider, IP, or error-body details when metadata is enough for debugging.
Business Impact (AI generated)
This reduces log-retention risk for enterprise SSO flows without changing API responses, authorization decisions, or customer-facing behavior.
Test Plan (AI generated)
npm exec --yes --package=bun -- bunx vitest run tests/sso-log-redaction.unit.test.tsnpm exec --yes --package=bun -- bun lint:backendnpm exec --yes --package=bun -- bun typecheckRelated to #1667
Generated with AI
Summary by CodeRabbit
Refactor
Tests