diff --git a/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/CommonConfigurationKeysPublic.java b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/CommonConfigurationKeysPublic.java index 832870e5702..aa18bfbb6f1 100644 --- a/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/CommonConfigurationKeysPublic.java +++ b/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/CommonConfigurationKeysPublic.java @@ -731,7 +731,9 @@ public class CommonConfigurationKeysPublic { public static final String HADOOP_SECURITY_SENSITIVE_CONFIG_KEYS = "hadoop.security.sensitive-config-keys"; public static final String HADOOP_SECURITY_SENSITIVE_CONFIG_KEYS_DEFAULT = + "secret$" + "," + "password$" + "," + + "ssl.keystore.pass$" + "," + "fs.s3.*[Ss]ecret.?[Kk]ey" + "," + "fs.azure\\.account.key.*" + "," + "dfs.webhdfs.oauth2.[a-z]+.token" + "," + diff --git a/hadoop-common-project/hadoop-common/src/main/resources/core-default.xml b/hadoop-common-project/hadoop-common/src/main/resources/core-default.xml index 12133b39052..b8d49043753 100644 --- a/hadoop-common-project/hadoop-common/src/main/resources/core-default.xml +++ b/hadoop-common-project/hadoop-common/src/main/resources/core-default.xml @@ -432,7 +432,7 @@ hadoop.security.sensitive-config-keys - password$,fs.s3.*[Ss]ecret.?[Kk]ey,fs.azure.account.key.*,dfs.webhdfs.oauth2.[a-z]+.token,hadoop.security.sensitive-config-keys + secret$,password$,ssl.keystore.pass$,fs.s3.*[Ss]ecret.?[Kk]ey,fs.azure.account.key.*,dfs.webhdfs.oauth2.[a-z]+.token,hadoop.security.sensitive-config-keys A comma-separated list of regular expressions to match against configuration keys that should be redacted where appropriate, for example, when logging modified properties during a reconfiguration, diff --git a/hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/conf/TestConfigRedactor.java b/hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/conf/TestConfigRedactor.java index 81f8f717956..eedb9b2b7cd 100644 --- a/hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/conf/TestConfigRedactor.java +++ b/hadoop-common-project/hadoop-common/src/test/java/org/apache/hadoop/conf/TestConfigRedactor.java @@ -47,6 +47,7 @@ public class TestConfigRedactor { "dfs.webhdfs.oauth2.refresh.token", "ssl.server.keystore.keypassword", "ssl.server.keystore.password", + "httpfs.ssl.keystore.pass", "hadoop.security.sensitive-config-keys" ); for (String key : sensitiveKeys) { @@ -60,6 +61,7 @@ public class TestConfigRedactor { "fs.defaultFS", "dfs.replication", "ssl.server.keystore.location", + "httpfs.config.dir", "hadoop.security.credstore.java-keystore-provider.password-file" ); for (String key : normalKeys) { diff --git a/hadoop-hdfs-project/hadoop-hdfs-httpfs/src/main/java/org/apache/hadoop/lib/server/Server.java b/hadoop-hdfs-project/hadoop-hdfs-httpfs/src/main/java/org/apache/hadoop/lib/server/Server.java index 1a0f9ff44e1..82be0276893 100644 --- a/hadoop-hdfs-project/hadoop-hdfs-httpfs/src/main/java/org/apache/hadoop/lib/server/Server.java +++ b/hadoop-hdfs-project/hadoop-hdfs-httpfs/src/main/java/org/apache/hadoop/lib/server/Server.java @@ -19,6 +19,7 @@ package org.apache.hadoop.lib.server; import org.apache.hadoop.classification.InterfaceAudience; +import org.apache.hadoop.conf.ConfigRedactor; import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.lib.util.Check; import org.apache.hadoop.lib.util.ConfigurationUtils; @@ -482,15 +483,13 @@ public class Server { } ConfigurationUtils.injectDefaults(defaultConf, config); - + ConfigRedactor redactor = new ConfigRedactor(config); for (String name : System.getProperties().stringPropertyNames()) { String value = System.getProperty(name); if (name.startsWith(getPrefix() + ".")) { config.set(name, value); - if (name.endsWith(".password") || name.endsWith(".secret")) { - value = "*MASKED*"; - } - log.info("System property sets {}: {}", name, value); + String redacted = redactor.redact(name, value); + log.info("System property sets {}: {}", name, redacted); } } @@ -499,10 +498,8 @@ public class Server { for (Map.Entry entry : config) { String name = entry.getKey(); String value = config.get(entry.getKey()); - if (name.endsWith(".password") || name.endsWith(".secret")) { - value = "*MASKED*"; - } - log.debug(" {}: {}", entry.getKey(), value); + String redacted = redactor.redact(name, value); + log.debug(" {}: {}", entry.getKey(), redacted); } log.debug("------------------------------------------------------"); }