abstractdog commented on code in PR #3019:
URL: https://github.com/apache/hive/pull/3019#discussion_r899907375


##########
common/src/java/org/apache/hadoop/hive/conf/HiveConf.java:
##########
@@ -5455,6 +5455,22 @@ public static enum ConfVars {
         + ",hive.zookeeper.ssl.truststore.location"
         + ",hive.zookeeper.ssl.truststore.password",
         "Comma separated list of configuration options which should not be 
read by normal user like passwords"),
+    HIVE_CONF_PROPAGATE_EXEC_ENGINES("hive.conf.propagate.exec.engines",
+        "fs.s3.awsAccessKeyId"

Review Comment:
   yes, if configs are dumped in logs then it's a security risk, but currently, 
we have no other way to support 'less secure' option
   ('more secure' uses hadoop credential provider)
   I don't have strong opinions about this one, so I'm closing the jira as 
invalid, until we're not facing customer pressure to support it
   



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to