[ https://issues.apache.org/jira/browse/JCLOUDS-1562?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17277057#comment-17277057 ]
roded commented on JCLOUDS-1562: -------------------------------- Should there be an annotation in `org.jclouds.rest.annotations` which marks an endpoint as containing sensitive information? > AuthorizationApi.authorizeClientSecret errors can expose sensitive > credentials via exceptions > --------------------------------------------------------------------------------------------- > > Key: JCLOUDS-1562 > URL: https://issues.apache.org/jira/browse/JCLOUDS-1562 > Project: jclouds > Issue Type: Bug > Affects Versions: 2.2.0 > Reporter: roded > Priority: Major > > When an exception occurs during the AuthorizationApi.authorizeClientSecret > call, the resulting exception contains both the client ID and the client > secret. These should be considered to contain sensitive information which > should not be printable to the log. > The exception looks something like this: > {code:java} > Caused by: org.jclouds.http.HttpResponseException: request: POST > https://login.microsoftonline.com/<tenent-id>/oauth2/token HTTP/1.1 > [grant_type=client_credentials&client_id=<client-id>1&client_secret=<client-secret>&resource=<resource-url>] > failed with response: HTTP/1.1 401 Unauthorized > at > org.jclouds.azureoauth2.storage.handlers.ParseAzureStorageErrorFromXmlContent.handleError(ParseAzureStorageErrorFromXmlContent.java:59) > ... 42 more > {code} > I'm currently running this using a fork of JClouds which includes a local > azureoauth2 module. However, I believe the same will result for any users of > the apis.oauth module. -- This message was sent by Atlassian Jira (v8.3.4#803005)