Thanks for your reply. 

We can try this on the CLI, but what about the Web UI?
Thanks,
Jerry

---Original---
From: "Gabor Somogyi"<gabor.g.somo...@gmail.com&gt;
Date: Tue, Jan 18, 2022 17:38 PM
To: "狗嗖"<1074768...@qq.com&gt;;
Cc: "user"<user@flink.apache.org&gt;;
Subject: Re: Question about plain password in flink-conf.yaml


export SSL_PASSWORD=secretflink run 
-yDsecurity.ssl.rest.*-password=$SSL_PASSWORD ... app.jar


Such way the code which starts the workload can store the passwords in a 
centrally protected area.
This still can be hacked but at least not stored in plain text file.


BR,
G




On Tue, Jan 18, 2022 at 10:18 AM 狗嗖 <1074768...@qq.com&gt; wrote:

Hello,
security.ssl.rest.*-password and s3.secret.key are parameters in flink-conf.xml 
that can only be set with plain text, which may lead to password leak. Can 
anyone provide some other extended capabilities that allow developers to 
configure cipher text and specify classes and methods to decrypt it? Like all 
user needs to do is provide an encrypted password, a class file or JAR package 
that helps decryption, and place them in flink classpath.
Thanks,
Jerry

Reply via email to