You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@lucene.apache.org by "Mano Kovacs (JIRA)" <ji...@apache.org> on 2017/03/09 14:58:38 UTC
[jira] [Updated] (SOLR-10076) Hiding keystore and truststore
passwords from /admin/info/* outputs
[ https://issues.apache.org/jira/browse/SOLR-10076?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Mano Kovacs updated SOLR-10076:
-------------------------------
Attachment: SOLR-10076.patch
[~markrmiller@gmail.com], thank you for the review and comments!
- I added test for case-sensitive property name, it in fact was not properly working.
- I changed the redaction text to the one that Greg added. Actually this patch is the generalization of his original intent.
- I made the system property redaction configurable with default true. 6.x backport only need to vary by the default value of that configuration to have it turned off.
> Hiding keystore and truststore passwords from /admin/info/* outputs
> -------------------------------------------------------------------
>
> Key: SOLR-10076
> URL: https://issues.apache.org/jira/browse/SOLR-10076
> Project: Solr
> Issue Type: Improvement
> Security Level: Public(Default Security Level. Issues are Public)
> Reporter: Mano Kovacs
> Assignee: Mark Miller
> Attachments: SOLR-10076.patch, SOLR-10076.patch
>
>
> Passing keystore and truststore password is done by system properties, via cmd line parameter.
> As result, {{/admin/info/properties}} and {{/admin/info/system}} will print out the received password.
> Proposing solution to automatically redact value of any system property before output, containing the word {{password}}, and replacing its value with {{******}}.
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@lucene.apache.org
For additional commands, e-mail: dev-help@lucene.apache.org