[ 
https://issues.apache.org/jira/browse/HADOOP-15351?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16418725#comment-16418725
 ] 

Steve Loughran commented on HADOOP-15351:
-----------------------------------------

I think this is potentially an overreaction. Asking for password fields except 
through getPassword(), bad. Asking for password fields through it, good. 
Placing passwords in a config, often defensible.

I'm thinking here of cloud storage secrets which are often set dynamically in 
code, such as ain a spark.set("spark.hadoop.fs.s3a.secret.key", 
"mysecretkey":), and so in a transient configuration for the duration of that 
job. We are only just weaning people off puting the login secrets in the URI 
itself, so to say "no, now you have to use a JCEKS file and somehow propagate 
that round the cluster" is going to fail achieve the desired outcome.

> Deprecate all existing password fields in hadoop configuration
> --------------------------------------------------------------
>
>                 Key: HADOOP-15351
>                 URL: https://issues.apache.org/jira/browse/HADOOP-15351
>             Project: Hadoop Common
>          Issue Type: Improvement
>            Reporter: Wei-Chiu Chuang
>            Priority: Major
>
> In HADOOP-15325 [~shv] suggests we should mark all password fields in 
> configuration file deprecated.
> Raise this Jira to track this work in HADOOP side.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to