Commit 8343ef2
authored
fix(sas): drop logger.info call leaking user password (#27786)
`SASClient.get_token` logged the cleartext password (and username + token
response body) at INFO level on every auth call. The line appears to be
debug spam left in by mistake.
Verified leak path (static + runtime):
- `__init__` calls `get_token(serverHost, username, password.get_secret_value())`
- `password.get_secret_value()` returns the raw user password (Pydantic
SecretStr unwrap)
- `get_token` interpolates that into an f-string at INFO
- Triggered every time a SAS connector is instantiated
- `ingestion_logger()` has no redaction filter, so the cleartext reaches
whatever sink (stdout, file, airflow logs, CloudWatch, etc.) is configured1 parent e9c87c6 commit 8343ef2
1 file changed
Lines changed: 0 additions & 2 deletions
Lines changed: 0 additions & 2 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
168 | 168 | | |
169 | 169 | | |
170 | 170 | | |
171 | | - | |
172 | | - | |
173 | 171 | | |
0 commit comments