Skip to content

Commit 371be00

Browse files
authored
BE: Extend config sanitizer patterns (kafbat#1036)
1 parent 5f17a42 commit 371be00

File tree

2 files changed

+2
-1
lines changed

2 files changed

+2
-1
lines changed

api/src/main/java/io/kafbat/ui/service/KafkaConfigSanitizer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ class KafkaConfigSanitizer {
2929
.addAll(kafkaConfigKeysToSanitize())
3030
.add(
3131
"basic.auth.user.info", /* For Schema Registry credentials */
32-
"password", "secret", "token", "key", ".*credentials.*", /* General credential patterns */
32+
"password", "secret", "token", "key", ".*credentials.*", "passphrase", /* General credential patterns */
3333
"aws.access.*", "aws.secret.*", "aws.session.*", /* AWS-related credential patterns */
3434
"connection.uri" /* mongo credential patterns */
3535
)

api/src/test/java/io/kafbat/ui/service/KafkaConfigSanitizerTest.java

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ void obfuscateCredentials() {
2727
assertThat(sanitizer.sanitize("main.consumer.sasl.jaas.config", "secret")).isEqualTo("******");
2828
assertThat(sanitizer.sanitize("database.password", "secret")).isEqualTo("******");
2929
assertThat(sanitizer.sanitize("basic.auth.user.info", "secret")).isEqualTo("******");
30+
assertThat(sanitizer.sanitize("private.key.passphrase", "secret")).isEqualTo("******");
3031

3132
//AWS var sanitizing
3233
assertThat(sanitizer.sanitize("aws.access.key.id", "secret")).isEqualTo("******");

0 commit comments

Comments
 (0)