-
Notifications
You must be signed in to change notification settings - Fork 41.1k
Mask password in URI properties if present #8293
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi, any estimates on when will this get resolved? I am in a similar situation. |
As indicated by the lack of milestone assigned to the issue, we don't have any plans to implement this at the moment. |
We discussed this today and it seems like trying to apply a general rule to mask placeholders that are sensitive will not always work. Even if we track the placeholders used, the final value that's in the We're going to reduce the scope of this issue to mask the password for a property that has a type |
Closing in favor of #17939. |
Per #8282 (comment) opening this enhancement request to consider if anything can be done to improve masking in the
/configprops
endpoint.As mentioned in the linked issue, some properties will contain a portion (such as a password in a URI like
spring.data.mongodb.uri
) that is sensitive even though the entire property is not sensitive. Placeholders named such that they will be sanitized keys (i.e.mongo.password
) may be used here, but as @wilkinsona mentioned, the fact placeholders were used is lost.With a configuration like
It would be nice if the
mongo.password
value were not exposed in/configprops
(throughspring.data.mongodb.uri
's resolved value).The text was updated successfully, but these errors were encountered: