Vadym Zhytkevych created KAFKA-18371:
----------------------------------------
Summary: TopicBasedRemoteLogMetadataManagerConfig exposes
sensitive configuration data in logs
Key: KAFKA-18371
URL: https://issues.apache.org/jira/browse/KAFKA-18371
Project: Kafka
Issue Type: Bug
Components: core
Affects Versions: 3.1.0
Reporter: Vadym Zhytkevych
{code:java}
[2024-12-20 14:52:56,805] INFO Successfully configured topic-based RLMM with
config:
TopicBasedRemoteLogMetadataManagerConfig{clientIdPrefix='__remote_log_metadata_client_6',
metadataTopicPartitionsCount=50, consumeWaitMs=120000,
metadataTopicRetentionMs=-1, metadataTopicReplicationFactor=3,
initializationRetryMaxTimeoutMs=120000, initializationRetryIntervalMs=100,
commonProps={request.timeout.ms=10000, ssl.client.auth=none,
ssl.keystore.location=/etc/kafka/ssl/keystore.p12,
bootstrap.servers:9094=server1, security.protocol=SASL_SSL, password=CLEARTEXT,
ssl.truststore.location=/etc/pki/java/cacerts, ssl.keystore.password=CLEARTEXT,
sasl.mechanism=SCRAM-SHA-512, ssl.key.password=CLEARTEXT,
sasl.jaas.config=org.apache.kafka.common.security.scram.ScramLoginModule
required username="username" password="CLEARTEXT";,
ssl.truststore.password=CLEARTEXT, …{code}
Issue is related to using toString() method of
TopicBasedRemoteLogMetadataManagerConfig, that prints maps of consumerProps and
producerProps withou masking.
Current workaround: logger for class TopicBasedRemoteLogMetadataManagerConfig
can be disabled to not expose sensitive data.
Expected behavior: sensitive configuration data masked automatically in logs.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)