You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When introspecting the MySQL database, the configuration.json file generated exposes the JDBC URL string, which contains sensitive information like root password of MySQL server "jdbcUrl" : "jdbc:mysql://<host>:<port>/<database>?useSSL=false&user=<root_user>&password=<root_password>"
Whereas in postgres connectors these values are taken from the env var
The text was updated successfully, but these errors were encountered:
GavinRay97
changed the title
JDBC URL is exposed in configuration.json file generated
[FR] JDBC URL is exposed in configuration.json file generated
Nov 18, 2024
When introspecting the MySQL database, the configuration.json file generated exposes the JDBC URL string, which contains sensitive information like root password of MySQL server
"jdbcUrl" : "jdbc:mysql://<host>:<port>/<database>?useSSL=false&user=<root_user>&password=<root_password>"
Whereas in postgres connectors these values are taken from the env var
The text was updated successfully, but these errors were encountered: