You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@pulsar.apache.org by GitBox <gi...@apache.org> on 2020/11/10 14:37:26 UTC

[GitHub] [pulsar] racorn commented on issue #8109: Pulsar client output the auth info may reveal sensitive information

racorn commented on issue #8109:
URL: https://github.com/apache/pulsar/issues/8109#issuecomment-724742159


   Unfortunately, this breaks configuration of authentication parameters with a property map supported by
   
   `PulsarClient.builder().loadConf(configMap)`
   
   like TLS client certificate authentication (where this is no sensitive information, just filenames).
   
   It breaks because the way `ConfigurationDataUtils.loadData` is implemented, where the configuration data is serialized to a string before it is deserialized back to a desired type (and loose the fields annotated with JsonIgnore).
   
   


----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
users@infra.apache.org