-
-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow option to set Default ACL #7068
Comments
Thanks for suggesting. I think this would be a useful addition to Parse Server. It would also fall in line with our strategy to improve Parse Server's security guidance.
I agree that this assumption will increasingly become true in the context of how security is approached by large cloud service providers. Some thoughts:
|
I might need some assistance on the regex definition stuff. My regex skills are to be desired.
This could also apply to default CLPs for Parse Server, perhaps we assume Would you be open to adding that if an object has no ACL set, interpret that as public R/W false? I think the only challenge with this is for users getting started and playing with a development server, if they write some code such as:
And then later, Alternatively, we could add to the documentation for Parse Objects a bold message that states "Objects can be publicly accessed by anyone, unless ACLs and/or CLPs are restrictive. Consider how your data can be publicly accessed before deploying to production". |
You can take a look at the Idempotency regex logic that parses for class names. It's basically the same logic needed here.
Yes, we can think about that, maybe leave that for a separate PR to keep this one simple. But it's something to keep in mind when designing this PR.
We can discuss that but at first glance it seems to be a fundamental change that could require complex migration efforts for developers, and within Parse Server itself. It basically means to migrate existing data, which is something that requires a very convincing cost/benefit ratio to be considered.
Security awareness is something we want to established for new developers of Parse Server. The guides and example codes would need to be adapted to reflect that. For a simple playground environment, the developer can always set the default object ACL public read/write which would cause a security check log entry as a reminder to disable it later on. |
That is a good point. So, if I understand correctly, the PR shouldn't modify any existing find logic, just purely save logic? And if no ACL is set on the object, set the acl in accordance with config.defaultACL (defaults to private)? |
The label |
Is your feature request related to a problem? Please describe.
Considering the evolution of data security and privacy, new developers might assume that Parse Object ACL defaults to private, or requested user R/W only.
I think it could be beneficial to have some server config such as:
and / or
I think that when a developer new to parse looks at a Parse Object and sees no ACL set, it might be assumed that no one can access the object, when the inverse is true.
A solution could also be ACL options to cloud validator.
Discussed in community forum
The text was updated successfully, but these errors were encountered: