|
@@ -9,9 +9,17 @@ import org.springframework.boot.actuate.endpoint.Sanitizer;
|
|
|
|
|
|
class KafkaConfigSanitizerTest {
|
|
class KafkaConfigSanitizerTest {
|
|
|
|
|
|
|
|
+ @Test
|
|
|
|
+ void doNothingIfEnabledPropertySetToFalse() {
|
|
|
|
+ final Sanitizer sanitizer = new KafkaConfigSanitizer(false, Collections.emptyList());
|
|
|
|
+ assertThat(sanitizer.sanitize("password", "secret")).isEqualTo("secret");
|
|
|
|
+ assertThat(sanitizer.sanitize("sasl.jaas.config", "secret")).isEqualTo("secret");
|
|
|
|
+ assertThat(sanitizer.sanitize("database.password", "secret")).isEqualTo("secret");
|
|
|
|
+ }
|
|
|
|
+
|
|
@Test
|
|
@Test
|
|
void obfuscateCredentials() {
|
|
void obfuscateCredentials() {
|
|
- final Sanitizer sanitizer = new KafkaConfigSanitizer(Collections.emptyList());
|
|
|
|
|
|
+ final Sanitizer sanitizer = new KafkaConfigSanitizer(true, Collections.emptyList());
|
|
assertThat(sanitizer.sanitize("sasl.jaas.config", "secret")).isEqualTo("******");
|
|
assertThat(sanitizer.sanitize("sasl.jaas.config", "secret")).isEqualTo("******");
|
|
assertThat(sanitizer.sanitize("consumer.sasl.jaas.config", "secret")).isEqualTo("******");
|
|
assertThat(sanitizer.sanitize("consumer.sasl.jaas.config", "secret")).isEqualTo("******");
|
|
assertThat(sanitizer.sanitize("producer.sasl.jaas.config", "secret")).isEqualTo("******");
|
|
assertThat(sanitizer.sanitize("producer.sasl.jaas.config", "secret")).isEqualTo("******");
|
|
@@ -22,7 +30,7 @@ class KafkaConfigSanitizerTest {
|
|
|
|
|
|
@Test
|
|
@Test
|
|
void notObfuscateNormalConfigs() {
|
|
void notObfuscateNormalConfigs() {
|
|
- final Sanitizer sanitizer = new KafkaConfigSanitizer(Collections.emptyList());
|
|
|
|
|
|
+ final Sanitizer sanitizer = new KafkaConfigSanitizer(true, Collections.emptyList());
|
|
assertThat(sanitizer.sanitize("security.protocol", "SASL_SSL")).isEqualTo("SASL_SSL");
|
|
assertThat(sanitizer.sanitize("security.protocol", "SASL_SSL")).isEqualTo("SASL_SSL");
|
|
final String[] bootstrapServer = new String[] {"test1:9092", "test2:9092"};
|
|
final String[] bootstrapServer = new String[] {"test1:9092", "test2:9092"};
|
|
assertThat(sanitizer.sanitize("bootstrap.servers", bootstrapServer)).isEqualTo(bootstrapServer);
|
|
assertThat(sanitizer.sanitize("bootstrap.servers", bootstrapServer)).isEqualTo(bootstrapServer);
|
|
@@ -30,7 +38,7 @@ class KafkaConfigSanitizerTest {
|
|
|
|
|
|
@Test
|
|
@Test
|
|
void obfuscateCredentialsWithDefinedPatterns() {
|
|
void obfuscateCredentialsWithDefinedPatterns() {
|
|
- final Sanitizer sanitizer = new KafkaConfigSanitizer(Arrays.asList("kafka.ui", ".*test.*"));
|
|
|
|
|
|
+ final Sanitizer sanitizer = new KafkaConfigSanitizer(true, Arrays.asList("kafka.ui", ".*test.*"));
|
|
assertThat(sanitizer.sanitize("consumer.kafka.ui", "secret")).isEqualTo("******");
|
|
assertThat(sanitizer.sanitize("consumer.kafka.ui", "secret")).isEqualTo("******");
|
|
assertThat(sanitizer.sanitize("this.is.test.credentials", "secret")).isEqualTo("******");
|
|
assertThat(sanitizer.sanitize("this.is.test.credentials", "secret")).isEqualTo("******");
|
|
assertThat(sanitizer.sanitize("this.is.not.credential", "not.credential"))
|
|
assertThat(sanitizer.sanitize("this.is.not.credential", "not.credential"))
|