github-advanced-security[bot] commented on code in PR #51076:
URL: https://github.com/apache/airflow/pull/51076#discussion_r2107141862
##########
airflow-core/src/airflow/dag_processing/manager.py:
##########
@@ -1141,14 +1142,42 @@
stat.import_errors = 1
else:
# record DAGs and import errors to database
- update_dag_parsing_results_in_db(
- bundle_name=bundle_name,
- bundle_version=bundle_version,
- dags=parsing_result.serialized_dags,
- import_errors=parsing_result.import_errors or {},
- warnings=set(parsing_result.warnings or []),
- session=session,
- )
+ logging.info(f"Updating DAGs and import errors to database for bundle
{bundle_name} "
+ f"and version {bundle_version}")
+
+ # check a flag to see whether to call api or directly update db
+ if conf.getboolean("dag_processor", "use_api_for_updating_dags",
fallback=False):
+ server_url = conf.get("core", "execution_api_server_url")
+ if not server_url:
+ raise AirflowConfigException("execution_api_server_url is not
set")
+
+ logging.info("Trying to make an API call to %s to update DAGs",
server_url)
Review Comment:
## Clear-text logging of sensitive information
This expression logs [sensitive data (secret)](1) as clear text.
This expression logs [sensitive data (secret)](2) as clear text.
[Show more
details](https://github.com/apache/airflow/security/code-scanning/479)
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: [email protected]
For queries about this service, please contact Infrastructure at:
[email protected]