[
https://issues.apache.org/jira/browse/FLINK-21307?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17279900#comment-17279900
]
Eron Wright edited comment on FLINK-21307 at 2/5/21, 6:54 PM:
--------------------------------------------------------------
Is it a reasonable expectation that enforcing a security manager for user code
would significantly improve the protection afforded to job-level secrets? For
example, imagine a connector has configuration property containing a
credential; in a session cluster, one job could theoretically access the
configuration properties of another job. Imposing a security manager seems
like a good step towards preventing that.
Also, any special considerations for plugins?
was (Author: eronwright):
Is it a reasonable expectation that enforcing a security manager for user code
would significantly improve the protection afforded to job-level secrets? For
example, imagine a connector has configuration property containing a
credential; in a session cluster, one job could theoretically access the
configuration properties of another job. Imposing a security manager seems
like a good step towards preventing that.
> Revisit activation model of FlinkSecurityManager
> ------------------------------------------------
>
> Key: FLINK-21307
> URL: https://issues.apache.org/jira/browse/FLINK-21307
> Project: Flink
> Issue Type: Bug
> Components: Runtime / Task
> Affects Versions: 1.13.0
> Reporter: Robert Metzger
> Priority: Critical
> Fix For: 1.13.0
>
>
> In FLINK-15156, we introduced a feature that allows users to log or
> completely disable calls to System.exit(). This feature is enabled for
> certain threads / code sections intended to execute user-code.
> The activation of the security manager (for monitoring user calls to
> System.exit() is currently not well-defined, and only implemented on a
> best-effort basis.
> This ticket is to revisit the activation.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)