-
Notifications
You must be signed in to change notification settings - Fork 595
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support redact SHOW CREATE on demand #14115
Comments
How is this related with #7034? |
Pls ignore that. Previously I thought changes on persisted catalog was required, but it turns out to be wrong. |
Hi, @zwang28 any progress? |
#14760 adds a helper function to redact a SQL string. It's under review. With regards to its call site. I intended to:
|
go for risingwavelabs/rfcs#86 |
As SECRETS will be premium feature (https://docs.risingwave.com/docs/dev/manage-secrets/), can we reopen this? |
I think we are not going to support this and you can use the premium edition. |
Sad to read. At this point, it's not my decision to use the premium edition or not. Furthermore, I think it's just bad practice to put sensitive information in logs, even for unpaid open-source software, as it prevents people from evaluating it in a productive environment. Sorry if this sounds demanding coming from someone who uses your software for free. I really like your product and appreciate your efforts. |
@stefannegele Thanks for your feedback. Let me look into it. |
Is your feature request related to a problem? Please describe.
Sensitive properties of source/sink, e.g.
s3.credentials.secret
andschema.registry.password
, should be redacted first before included in text that may be shared, e.g. show create source/sink/table, diagnostic report.#12673
Describe the solution you'd like
No response
Describe alternatives you've considered
No response
Additional context
The text was updated successfully, but these errors were encountered: