This is an automated email from the ASF dual-hosted git repository.
potiuk pushed a commit to branch v2-10-test
in repository https://gitbox.apache.org/repos/asf/airflow.git
The following commit(s) were added to refs/heads/v2-10-test by this push:
new 2cd40ca30b1 [v2-10-test] docs: clarify which fields are masked in the
UI (#45417) (#45418)
2cd40ca30b1 is described below
commit 2cd40ca30b1ae568e10bd3dfbfe9a77e2eba3aa5
Author: github-actions[bot]
<41898282+github-actions[bot]@users.noreply.github.com>
AuthorDate: Mon Jan 6 10:58:37 2025 +0100
[v2-10-test] docs: clarify which fields are masked in the UI (#45417)
(#45418)
The word 'contains' was used slightly confusingly here: it was meant to mean
'the name field contains any of these strings', but you could also read it
as
'the name itself contains any of these strings'. This removes any
ambiguity.
(cherry picked from commit f03b1d4d996cf2b3f62c21f8c6a38aa53ba1e3be)
Co-authored-by: Arnout Engelen <[email protected]>
---
docs/apache-airflow/security/secrets/mask-sensitive-values.rst | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/docs/apache-airflow/security/secrets/mask-sensitive-values.rst
b/docs/apache-airflow/security/secrets/mask-sensitive-values.rst
index 1c3974a3ff8..a66900f3dcd 100644
--- a/docs/apache-airflow/security/secrets/mask-sensitive-values.rst
+++ b/docs/apache-airflow/security/secrets/mask-sensitive-values.rst
@@ -39,9 +39,9 @@ When masking is enabled, Airflow will always mask the
password field of every Co
task.
It will also mask the value of a Variable, rendered template dictionaries,
XCom dictionaries or the
-field of a Connection's extra JSON blob if the name contains
-any words in ('access_token', 'api_key', 'apikey', 'authorization',
'passphrase', 'passwd',
-'password', 'private_key', 'secret', 'token'). This list can also be extended:
+field of a Connection's extra JSON blob if the name is in the list of
known-sensitive fields (i.e. 'access_token',
+'api_key', 'apikey', 'authorization', 'passphrase', 'passwd', 'password',
'private_key', 'secret' or 'token').
+This list can also be extended:
.. code-block:: ini