ferruzzi commented on PR #29142:
URL: https://github.com/apache/airflow/pull/29142#issuecomment-1402759146

   > > Nice catch! IMHO, if we are decoding by default then masking sounds like 
the right answer to me. I'm not really up to date on best practices when using 
SecureString though, so I'm happy to defer if someone feels otherwise.
   > 
   > Well there is not easy answer as well as best practices. We do not know 
what users might store into SSM Parameter Store and how they intend to use it.
   > 
   > If it credentials the answer straightforward, yes we should, like here:
   > 
   > 
https://github.com/apache/airflow/blob/3b25168c413a8434f8f65efb09aaf949cf7adc3b/airflow/providers/amazon/aws/hooks/base_aws.py#L662-L666
   > 
   > IMHO, In general if you create secure string you do not want to some one 
who does not have access to KMS keys see value. But we could mask all or 
nothing, that mean 
`postgresql+psycopg2://airflow:insecurepassword@postgres/airflow` in logs 
transform to `***`
   
   It would be ideal if only the password got masked, but I think if a user is 
setting the parameter as a secure string, it would be better to assume more 
security than less.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@airflow.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to