Skip to content

Conversation

@ashb
Copy link
Member

@ashb ashb commented Jul 31, 2025

For logs, using *** is fine, but as part of the changes introduced in #53943
we decided it might be nice to use an even-less-frequently-appearing thing
than *** so we can detect modified secrets.

This gives us the ability to do that at the redaction layer


^ Add meaningful description above
Read the Pull Request Guidelines for more information.
In case of fundamental code changes, an Airflow Improvement Proposal (AIP) is needed.
In case of a new dependency, check compliance with the ASF 3rd Party License Policy.
In case of backwards incompatible changes please leave a note in a newsfragment file, named {pr_number}.significant.rst or {issue_number}.significant.rst, in airflow-core/newsfragments.

@ashb
Copy link
Member Author

ashb commented Jul 31, 2025

@pierrejeambrun As discussed.

Copy link
Member

@pierrejeambrun pierrejeambrun left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cool. Are you taking care of the follow up PR to enable it for the API ?

@ashb
Copy link
Member Author

ashb commented Jul 31, 2025

Cool. Are you taking care of the follow up PR to enable it for the API ?

🤷🏻 Hadn't thought that far ahead :D

@ashb ashb force-pushed the changable-redact-replacment-chars branch 2 times, most recently from 0e382d6 to bb5cc0f Compare July 31, 2025 14:46
Copy link
Contributor

@amoghrajesh amoghrajesh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One comment, rest looks good.

@ashb ashb force-pushed the changable-redact-replacment-chars branch from bb5cc0f to 8ee0ebb Compare July 31, 2025 15:26
@ashb ashb requested a review from mobuchowski as a code owner July 31, 2025 16:28
@ashb
Copy link
Member Author

ashb commented Jul 31, 2025

Sorry for the meta-programming sins I have committed here.

@pierrejeambrun
Copy link
Member

Sorry for the meta-programming sins I have committed here.

Compat code looks good. Not sure we have any other option at the moment.

ashb added 2 commits August 1, 2025 17:25
For logs, using `***` is fine, but as part of the changes introduced in apache#53943
we decided it might be nice to use an even-less-frequently-appearing thing
than `***` so we can detect modified secrets.

This gives us the ability to do that at the redaction layer
@ashb ashb force-pushed the changable-redact-replacment-chars branch from 66ebf1b to e2e6aa3 Compare August 1, 2025 16:25
@ashb ashb merged commit db8e628 into apache:main Aug 4, 2025
103 checks passed
@ashb ashb deleted the changable-redact-replacment-chars branch August 4, 2025 18:52
ferruzzi pushed a commit to aws-mwaa/upstream-to-airflow that referenced this pull request Aug 7, 2025
…pache#53977)

* Allow secrets redact function to have different redaction than `***`

For logs, using `***` is fine, but as part of the changes introduced in apache#53943
we decided it might be nice to use an even-less-frequently-appearing thing
than `***` so we can detect modified secrets.

This gives us the ability to do that at the redaction layer

* Deal with OpenLineage subclassing SecretsMasker class
fweilun pushed a commit to fweilun/airflow that referenced this pull request Aug 11, 2025
…pache#53977)

* Allow secrets redact function to have different redaction than `***`

For logs, using `***` is fine, but as part of the changes introduced in apache#53943
we decided it might be nice to use an even-less-frequently-appearing thing
than `***` so we can detect modified secrets.

This gives us the ability to do that at the redaction layer

* Deal with OpenLineage subclassing SecretsMasker class
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants