-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature requests] action protection #3629
Comments
@style95 could you provide a proposal or more details on the use case? |
@csantanapr Many VM services provide option to enable VM protection. So I naively thought that if user can enable protection against actions, user can protect important(used in production) actions from accidental deletion. |
@style95 can you elaborate your problem? Today we only generate one master api key. This key is use to create, update and delete. Today the solution is that you have a namespaces for each environment and that the master key for production is not shared, saved in a vault and scripts deploying to production never delete and always create/update Long term there might be better ACLs thru IAM/oauth identity, but what you are requesting is much simpler? Like marking an entity (trigger, rule, package, or rule) remove the “write” equivalent to “chmod -w” ? Meaning can still read/GET and execute/POST but can’t be deleted right? Maybe a new annotation can serve as a mid term solution that indicates to the controller that the entity is marked that can’t be deleted. Does this reflect your problem, need and desire solution? |
@csantanapr Yes mostly you are correct. Let me clarify issues more. I originally thought use-case in UI, but same thing can happen via CLI as well. Under the situation that api key is already configured, user can easily delete their own actions. Regarding your lock related concern, I think we can provide a level of protection; only protect from deletion and protect from update and deletion and so on. HDYT? Regarding implementation, I was also thinking of annotations based approach. |
Hum there is no point of protecting from delete only and not update the action can accidentally be updated with wrong version of code or just a broken action. |
I also feel like a developer should have full control over the action. Maybe a warning like
Another idea is to work with a wskdeploy manifest and only make updates from it ? |
There is a general issue in that referenced entities are not tracked at all today - applies to rules, packages, sequences, and compositions. We don't track dependencies today. The way I propose approaching this is two fold: 1. addressing referenced entities (#1047) and 2. fine grained permission on entities (like unix permissions) so that an action could be locked to Annotations are a reasonable way of addressing |
It would be great if we can have feature to protect actions from accidental deletion.
It can happen at anytime and the impact is critical when action is being used in production.
Most of VM services have similar feature.
The text was updated successfully, but these errors were encountered: