Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Load credentials from secrets for Kinesis connectors #10822

Merged
merged 1 commit into from
Jun 8, 2021

Conversation

fantapsody
Copy link
Contributor

Motivation

Support loading awsCredentialPluginParam from secrets for kinesis connectors to avoid leaking of sensitive information with best efforts.

Modifications

Load kinesis configs with IOConfigUtils.loadWithSecrets().

Verifying this change

This change is already covered by existing tests and this PR also adds tests to confirm both loading credentials from plaintext config object and secrets work as expected.

@tuteng tuteng added component/connect type/enhancement The enhancements for the existing features or docs. e.g. reduce memory usage of the delayed messages area/security labels Jun 4, 2021
@tuteng tuteng added this to the 2.9.0 milestone Jun 4, 2021
@Anonymitaet
Copy link
Member

@fantapsody thanks for your contribution. For this PR, do we need to update docs?

@codelipenghui codelipenghui merged commit cb79032 into apache:master Jun 8, 2021
yangl pushed a commit to yangl/pulsar that referenced this pull request Jun 23, 2021
### Motivation

Support loading `awsCredentialPluginParam` from secrets for kinesis connectors to avoid leaking of sensitive information with best efforts.

### Modifications

Load kinesis configs with `IOConfigUtils.loadWithSecrets()`.

### Verifying this change

This change is already covered by existing tests and this PR also adds tests to confirm both loading credentials from plaintext config object and secrets work as expected.
@codelipenghui codelipenghui added the cherry-picked/branch-2.8 Archived: 2.8 is end of life label Jun 25, 2021
codelipenghui pushed a commit that referenced this pull request Jun 25, 2021
### Motivation

Support loading `awsCredentialPluginParam` from secrets for kinesis connectors to avoid leaking of sensitive information with best efforts.

### Modifications

Load kinesis configs with `IOConfigUtils.loadWithSecrets()`.

### Verifying this change

This change is already covered by existing tests and this PR also adds tests to confirm both loading credentials from plaintext config object and secrets work as expected.


(cherry picked from commit cb79032)
bharanic-dev pushed a commit to bharanic-dev/pulsar that referenced this pull request Mar 18, 2022
### Motivation

Support loading `awsCredentialPluginParam` from secrets for kinesis connectors to avoid leaking of sensitive information with best efforts.

### Modifications

Load kinesis configs with `IOConfigUtils.loadWithSecrets()`.

### Verifying this change

This change is already covered by existing tests and this PR also adds tests to confirm both loading credentials from plaintext config object and secrets work as expected.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/connector area/security cherry-picked/branch-2.8 Archived: 2.8 is end of life release/2.8.1 type/enhancement The enhancements for the existing features or docs. e.g. reduce memory usage of the delayed messages
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

8 participants