-
-
Notifications
You must be signed in to change notification settings - Fork 897
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make hydra documentation respect access control #2719
Comments
The documentation should be available even for operations that require authentication. There is nothing wrong with that. "Security by obscurity" is bad. |
Then that's a bug in the admin. |
I agree. I first created an issue in the admin repository. I ended up overriding the documentation parser. |
Maybe it can be done in userland? |
Just decorate documentation normalizer. |
It's a very frequent request. It would be nice to have it in core (with a flag to enable or disable this feature). |
Basically it means executing the security expression in the documentation normalizers. |
I really need this and I’d need some directions to push a PR quickly. @dunglas what modifications and configuration options would you like to see? |
I suggest to inject the Security Expression executor in If the security expression can be executed (it doesn't depend of the current object but only use The same logic must be adapted for the OpenAPI |
I am working on it, i wanted to decorate DocumentationNormalizer but all functions are private ! |
Is there any news on this topic? |
My api has public and private entries.
But the hydra and swagger documentations expose all of them.
As a result, a connected user that has access to only parts of the api will see the whole documentation which is not a good thing for security.
More importantly, the admin is broken in that case because it tries to fetch every resource in the hydra documentation.
The text was updated successfully, but these errors were encountered: