mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 16:25:55 +03:00
[GH-ISSUE #735] [BUG] Treat database_url as secret #266
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#266
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @janpieper on GitHub (Nov 15, 2023).
Original GitHub issue: https://github.com/lldap/lldap/issues/735
Describe the bug
When enabling the verbose-mode (
LLDAP_VERBOSE=true), you get the configuration pasted to the log, but this contains thedatabase_urlin plaintext, although it might contain the database credentials 🤔 The verbose-mode should not be enabled in production, but maybe it might make sense to handle thedatabase_urlas secret too, like forjwt_secretandldap_user_pass.To Reproduce
Start LLDAP all required ENV-variables and these:
Expected behavior
I would've expected the
database_urlto be handled as secret 🤔Logs
Currently I get this:
Additional context
LLDAP-Version:
lldap/lldap:2023-11-05-alpine@nitnelave commented on GitHub (Nov 16, 2023):
Hmm, I'm a bit conflicted on that one: I agree that the password should be secret. However, it's usually important to know which database you're talking to.
I wonder if I can just parse it as a URL, would it be equivalent? Then I can consider the various parts and mask the password.
@janpieper commented on GitHub (Nov 16, 2023):
Masking only the password would also be a possible way to go 👍
@janpieper commented on GitHub (Jan 24, 2024):
🥳