diff --git a/api/src/main/java/io/kafbat/ui/service/KafkaConfigSanitizer.java b/api/src/main/java/io/kafbat/ui/service/KafkaConfigSanitizer.java index 6cbf44e44..68b205c56 100644 --- a/api/src/main/java/io/kafbat/ui/service/KafkaConfigSanitizer.java +++ b/api/src/main/java/io/kafbat/ui/service/KafkaConfigSanitizer.java @@ -29,7 +29,7 @@ class KafkaConfigSanitizer { .addAll(kafkaConfigKeysToSanitize()) .add( "basic.auth.user.info", /* For Schema Registry credentials */ - "password", "secret", "token", "key", ".*credentials.*", /* General credential patterns */ + "password", "secret", "token", "key", ".*credentials.*", "passphrase", /* General credential patterns */ "aws.access.*", "aws.secret.*", "aws.session.*", /* AWS-related credential patterns */ "connection.uri" /* mongo credential patterns */ ) diff --git a/api/src/test/java/io/kafbat/ui/service/KafkaConfigSanitizerTest.java b/api/src/test/java/io/kafbat/ui/service/KafkaConfigSanitizerTest.java index 34f293220..51642a152 100644 --- a/api/src/test/java/io/kafbat/ui/service/KafkaConfigSanitizerTest.java +++ b/api/src/test/java/io/kafbat/ui/service/KafkaConfigSanitizerTest.java @@ -27,6 +27,7 @@ void obfuscateCredentials() { assertThat(sanitizer.sanitize("main.consumer.sasl.jaas.config", "secret")).isEqualTo("******"); assertThat(sanitizer.sanitize("database.password", "secret")).isEqualTo("******"); assertThat(sanitizer.sanitize("basic.auth.user.info", "secret")).isEqualTo("******"); + assertThat(sanitizer.sanitize("private.key.passphrase", "secret")).isEqualTo("******"); //AWS var sanitizing assertThat(sanitizer.sanitize("aws.access.key.id", "secret")).isEqualTo("******");