Kaidi Zhao created LIVY-833:
-------------------------------

             Summary: Livy allows users to see password in config files 
(spark.ssl.keyPassword,spark.ssl.keyStorePassword,spark.ssl.trustStorePassword, 
etc)
                 Key: LIVY-833
                 URL: https://issues.apache.org/jira/browse/LIVY-833
             Project: Livy
          Issue Type: Bug
          Components: Server
    Affects Versions: 0.7.0
            Reporter: Kaidi Zhao


It looks like a regular user (client) of Livy, can use commands like: 

spark.sparkContext.getConf().getAll()

The command will retry all spark configurations including those passwords (such 
as spark.ssl.trustStorePassword, spark.ssl.keyPassword). 

I would suggest to block / mask these password. 

PS, Spark's UI fixed this issue in this 
https://issues.apache.org/jira/browse/SPARK-16796



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to