Skip to content

[Bug] Printing of secrets to console when creating a delta lake sink #24142

Open
@szindel

Description

@szindel

Search before asking

  • I searched in the issues and found nothing similar.

Read release policy

  • I understand that unsupported versions don't get bug fixes. I will attempt to reproduce the issue on a supported version of Pulsar client and Pulsar broker.

Version

Ran on the apachepulsar/pulsar:3.0.10 docker.

  • OS: Ubuntu 22.04.5
  • Java: 17.0.14
  • Pulsar version: 3.0.10
  • Deployment: standalone and cluster
  • Connector: pulsar-io-lakehouse-3.0.7.5-cloud.nar

Minimal reproduce step

  1. Startup any pulsar cluster
  2. configure a sink (for example delta lake sink) with a SimpleAWSCredentialProvider
  3. create the sink
  4. output shows the entire config: including secrets

What did you expect to see?

Either to not have the secrets being printed to the console/stdout or have it anonymised with ******
Or, an way to pass environment variables to the kubernetes runtime in the sink create statement (via sink-config), so the EnvironmentCredentialProvider can be used for kubernetes runtimes.

What did you see instead?

The entire config of the sink with secrets printed to the console: quite undesirable.

Anything else?

It would be ideal to have a way of setting environment variables in the kubernetes runtime (not secrets, but just simple env vars). Being able to pass these via the config.

Are you willing to submit a PR?

  • I'm willing to submit a PR!

Metadata

Metadata

Assignees

No one assigned

    Labels

    type/bugThe PR fixed a bug or issue reported a bug

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions