This is an automated email from the ASF dual-hosted git repository.

potiuk pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/airflow.git


The following commit(s) were added to refs/heads/main by this push:
     new c471c31111 Clarifying PLUGINS_FOLDER permissions by DAG authors 
(#43022)
c471c31111 is described below

commit c471c31111958f0a4dde775f559d5c606f3149a8
Author: Amogh Desai <amoghrajesh1...@gmail.com>
AuthorDate: Tue Oct 15 15:10:52 2024 +0530

    Clarifying PLUGINS_FOLDER permissions by DAG authors (#43022)
---
 docs/apache-airflow/security/security_model.rst | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/docs/apache-airflow/security/security_model.rst 
b/docs/apache-airflow/security/security_model.rst
index 0181710bda..ebe1b35c54 100644
--- a/docs/apache-airflow/security/security_model.rst
+++ b/docs/apache-airflow/security/security_model.rst
@@ -212,12 +212,15 @@ DAG author to choose the code that will be executed in 
the scheduler or webserve
 should not be arbitrary code that DAG author can add in DAG folder. All those 
functionalities are
 only available via ``plugins`` and ``providers`` mechanisms where the code 
that is executed can only be
 provided by installed packages (or in case of plugins it can also be added to 
PLUGINS folder where DAG
-authors should not have write access to). PLUGINS FOLDER is a legacy mechanism 
coming from Airflow 1.10
+authors should not have write access to). PLUGINS_FOLDER is a legacy mechanism 
coming from Airflow 1.10
 - but we recommend using entrypoint mechanism that allows the Deployment 
Manager to - effectively -
 choose and register the code that will be executed in those contexts. DAG 
Author has no access to
 install or modify packages installed in Webserver and Scheduler, and this is 
the way to prevent
 the DAG Author to execute arbitrary code in those processes.
 
+Additionally, if you decide to utilize and configure the PLUGINS_FOLDER, it is 
essential for the Deployment
+Manager to ensure that the DAG author does not have write access to this 
folder.
+
 The Deployment Manager might decide to introduce additional control mechanisms 
to prevent DAG authors from
 executing arbitrary code. This is all fully in hands of the Deployment Manager 
and it is discussed in the
 following chapter.

Reply via email to