You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@geode.apache.org by "ASF subversion and git services (Jira)" <ji...@apache.org> on 2021/10/27 00:09:00 UTC
[jira] [Commented] (GEODE-9740) Use DATA:READ permission for read
only redis operations
[ https://issues.apache.org/jira/browse/GEODE-9740?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17434623#comment-17434623 ]
ASF subversion and git services commented on GEODE-9740:
--------------------------------------------------------
Commit 0b939461f718d4fd8d304434fa229ab013c5a06e in geode's branch refs/heads/develop from Darrel Schneider
[ https://gitbox.apache.org/repos/asf?p=geode.git;h=0b93946 ]
GEODE-9740: enhance redis security permissions (#7029)
Before this commit all geode-for-redis commands required DATA:WRITE.
Now only this commands marked as WRITE commands and the PUBLISH command require DATA:WRITE.
All others now require DATA:READ.
> Use DATA:READ permission for read only redis operations
> -------------------------------------------------------
>
> Key: GEODE-9740
> URL: https://issues.apache.org/jira/browse/GEODE-9740
> Project: Geode
> Issue Type: Improvement
> Components: redis
> Reporter: Dan Smith
> Assignee: Darrel Schneider
> Priority: Major
> Labels: pull-request-available
> Fix For: 1.15.0
>
>
> We currently require the resource permission DATA:WRITE:GEODE_FOR_REDIS for all redis operations.
> We would like read only redis operations to only require DATA:READ:GEODE_FOR_REDIS permission. This more closely matches the gemfire operation permission model and allows for creating a user that has only read access to redis.
> Acceptance Criteria: Redis command with the WRITE flag and the PUBLISH command will require DATA:WRITE. All other commands will require DATA:READ.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)