Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove support for locking down admin operations #1194

Merged
merged 5 commits into from
Jan 22, 2021

Conversation

sergeybykov
Copy link
Member

What changed?
Removed permissions checks from adminHandler and config values that support them.

Why?
Now that authorization of calls is fully supported, we don't need this duplicate functionality that covers a small subset of cases.

How did you test it?
Unit tests. Integration tests.

Potential risks
In case authorization of calls is not enabled and properly configured, this will expose admin operations that previously could have been blocked via the config settings that are being removed here.

Copy link
Member

@alexshtin alexshtin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should write about this in release notes. Like, "If you had admin handler protection enabled in dynamic config you need to properly setup authentication using ....".

@sergeybykov sergeybykov marked this pull request as ready for review January 19, 2021 16:33
@sergeybykov sergeybykov merged commit 95c1b5b into temporalio:master Jan 22, 2021
@sergeybykov sergeybykov deleted the pr/admin-config branch January 22, 2021 21:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants