Skip to content

Commit 53ed0bf

Browse files
committed
refactor: improve ingestion safety and log sanitization
1 parent 88c4450 commit 53ed0bf

3 files changed

Lines changed: 10 additions & 9 deletions

File tree

ingestion/src/metadata/ingestion/source/database/sas/client.py

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ def __init__(self, config: SASConnection):
4141
auth_token=self.get_auth_token,
4242
api_version="",
4343
allow_redirects=True,
44-
verify=False,
44+
verify=True,
4545
)
4646
self.client = TrackedREST(client_config, source_name="sas")
4747
# custom setting
@@ -174,10 +174,11 @@ def get_token(self, base_url, user, password):
174174
}
175175
url = base_url + endpoint
176176
response = requests.request(
177-
"POST", url, headers=headers, data=payload, verify=False, timeout=10
177+
"POST", url, headers=headers, data=payload, verify=True, timeout=10
178178
)
179-
text_response = response.json()
180-
logger.info(
181-
f"this is user: {user}, password: {password}, text: {text_response}"
179+
logger.debug(
180+
"Token request for user: %s completed with status: %s",
181+
user,
182+
response.status_code,
182183
)
183184
return response.json()["access_token"]

ingestion/src/metadata/ingestion/source/search/elasticsearch/connection.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ def get_ssl_context(ssl_config: SslConfig) -> ssl.SSLContext:
138138
)
139139
return ssl_context
140140

141-
return ssl._create_unverified_context() # pylint: disable=protected-access
141+
return ssl.create_default_context()
142142

143143

144144
def get_connection(connection: ElasticsearchConnection) -> Elasticsearch:

ingestion/src/metadata/utils/secrets/aws_secrets_manager.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,10 +53,10 @@ def get_string_value(self, secret_id: str) -> Optional[str]:
5353
try:
5454
kwargs = {"SecretId": secret_id}
5555
response = self.client.get_secret_value(**kwargs)
56-
logger.debug("Got value for secret %s.", secret_id)
56+
logger.debug("Successfully retrieved value from secrets manager.")
5757
except ClientError as err:
5858
logger.debug(traceback.format_exc())
59-
logger.error(f"Couldn't get value for secret [{secret_id}]: {err}")
59+
logger.error("Couldn't get value from secrets manager: %s", err)
6060
raise err
6161
if "SecretString" in response:
6262
return (
@@ -65,5 +65,5 @@ def get_string_value(self, secret_id: str) -> Optional[str]:
6565
else None
6666
)
6767
raise ValueError(
68-
f"SecretString for secret [{secret_id}] not present in the response."
68+
"SecretString not present in the response."
6969
)

0 commit comments

Comments
 (0)