The point regarding log files is a valid one but if the parsing of the request target fails, the access log will contain null rather than the request target.
Generally, we do allow potentially security sensitive information to appear in the logs if debug logging is enabled. I'll look to see what we can do in that case.
The point regarding log files is a valid one but if the parsing of the request target fails, the access log will contain null rather than the request target.
Generally, we do allow potentially security sensitive information to appear in the logs if debug logging is enabled. I'll look to see what we can do in that case.