-
-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Audit API for parameters that can heavily de-optimize requests #1070
Comments
This was referenced Jan 26, 2023
Mr0grog
added a commit
that referenced
this issue
Jan 27, 2023
It turns out we were lazy about a lot of permissions in the API since we had a small set of users and nobody with `view` permissions didn't also have `annotate`. Now that we are enabling public access, that's a problem! This makes sure we're checking appropriate permissions in all the API controllers and actions. Found as part of auditing API access and options in #1070.
Mr0grog
added a commit
that referenced
this issue
Jan 27, 2023
It turns out we were lazy about a lot of permissions in the API since we had a small set of users and nobody with `view` permissions didn't also have `annotate`. Now that we are enabling public access, that's a problem! This makes sure we're checking appropriate permissions in all the API controllers and actions. This also does a little work to differentiate requests with no credentials and invalid credentials, which is important now that we are enabling public view access (no credentials is OK, invalid credentials is obviously an error, but needs an API-style response rather than the default authentication error handling). Devise doesn't provide anything that differentiates those, so we have to drop down to check some Warden data. Found as part of auditing API access and options in #1070.
Mr0grog
added a commit
that referenced
this issue
Feb 3, 2023
Some parameters for the various `/versions` collections cause expensive queries, so they are disallowed for public, non-logged-in usage. Solves part of #1070.
Mr0grog
added a commit
that referenced
this issue
Feb 7, 2023
Some query parameters cause expensive queries, so they are now disallowed for public, non-logged-in usage. If you try to use them without being logged in, you’ll get a 403 response with a message about what parameters for that controller require logging in. If we need to extend this to other places, we can use the new `BlockedParamsConcern` on a controller. Fixes #1070.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
We want the API to be publicly readable, and there are a lot of parameters or options that can cause it to have unacceptable performance (e.g. causing full table scans on large tables, causing N+1 queries) if publicly accessible. We need to audit all the controllers and models and either:
The text was updated successfully, but these errors were encountered: