Skip to content

Conversation

@abhijeets25012-tech
Copy link

What does this PR do?

This PR updates the Airflow CLI connection commands to hide connection values by default and redact sensitive fields such as passwords, tokens, and secrets.

Why is this needed?

Exposing connection values via the CLI can leak sensitive information. This change aligns with Airflow’s security best practices and prevents accidental disclosure of secrets.

What was changed?

  • Connection values are hidden by default in the CLI
  • Sensitive fields are consistently redacted
  • Updated implementation to satisfy CodeQL security checks

How was this tested?

  • Verified CLI behavior locally
  • Ensured sensitive fields are masked in all default outputs

Related to #59842

@potiuk
Copy link
Member

potiuk commented Jan 1, 2026

This looks good but the airflow submodule should be removed -> it causes CI failure. Not sure why you had airflow submodule and added it ?

@abhijeets25012-tech
Copy link
Author

Thanks for catching this 👍
I’ve removed the accidental airflow submodule and pushed the fix.
CI should be clean now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

2 participants