jpmcmu opened a new pull request #3416: [ZEPPELIN-1070]: Inject Credentials in 
any Interpreter-Code
URL: https://github.com/apache/zeppelin/pull/3416
 
 
   ### What is this PR for?
   
   This PR is a re-submission of the original ZEPPELIN-1070 PR. The original PR 
seems to be abandoned and I am currently creating custom builds of Zeppelin 
with the ZEPPELIN-1070 PR included so I am interested in getting the PR merged. 
I am submitting two PRs one for 0.8X branch and one that includes fixes for 
merge conflicts to the master branch.
   
   Original PR Description:
   
   > This PR enables a generic syntax for inserting credentials. A username can 
be inserted by $[user.entry] where "entry" is the name of the credential. A 
password can be inserted by $[password.entry].
   > To avoid output of the password all occurences of the password-String in 
the Interpreter-output will be replaced by "###". This should not be a really 
secure feature (since the runner of the notebook knows the password anyway), 
but it should avoid accidential exposure of the used passwords by any sort of 
interpreter 
   
   ### What type of PR is it?
   Feature
   
   ### Todos
   * [ ] - Documentation
   
   ### What is the Jira issue?
   https://issues.apache.org/jira/browse/ZEPPELIN-1070
   
   ### How should this be tested?
   Unit tests included in PR
   
   ### Screenshots (if appropriate)
   
   ### Questions:
   * Does the licenses files need update? **No**
   * Is there breaking changes for older versions? **Only in very unlikely 
circumstances. IE: code that matched {user.VALID_CREDENTIAL_ENTITY} or 
{password.VALID_CREDENTIAL_ENTITY}.**
   * Does this needs documentation? **Yes**
   
   

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

Reply via email to