[
https://issues.apache.org/jira/browse/DELTASPIKE-382?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13684642#comment-13684642
]
Romain Manni-Bucau commented on DELTASPIKE-382:
-----------------------------------------------
@Gerhard: the point is: we can't by default let pwd be logged. It is simple
enough to be done by default today (ConfigurableDS will surely rely on it
pretty quickly). We can't encourage no security so we need to handle it. I
agree it should be only "good practices" but we can't only hope it as library
providers. Jenkins mask pwd plugin is generic only on jenkins, if you have the
same for any app (maybe a custom JUL handler?) it would work, without it this
jira needs to be solved.
> mask out passwords and other credentials
> ----------------------------------------
>
> Key: DELTASPIKE-382
> URL: https://issues.apache.org/jira/browse/DELTASPIKE-382
> Project: DeltaSpike
> Issue Type: New Feature
> Components: Configuration
> Affects Versions: 0.4
> Reporter: Mark Struberg
> Assignee: Mark Struberg
> Fix For: 0.5
>
>
> Our configuration mechanism currently logs all the configured values.
> This makes it hard to use it for passwords and stuff.
> I suggest we introduce some specific prefix property to configure configs
> which contain sensitive information.
> For the key 'some.random.password' this could look like:
> deltaspike_config.mask.some.random.password=true
> In the log we would in this case just output the information whether and
> where we did find some value, but not print the details for all configs which
> start with all of the configured masks.
> I'm not yet sure though how to configure this best. Suggestions appreciated!
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira