-
Notifications
You must be signed in to change notification settings - Fork 93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow commands to be run in "sudo" mode #577
Comments
@zionts is it essentially that any of the supergraph/graph/subgraph commands can be run with sudo? If that's indeed the case, we may also consider adding a |
@lrlna Just to clarify — because I'm not certain it's crisply captured above — this is not about sending a (Tangentially, I think we have tried to keep those |
I just ran into this again this week when trying to help out a customer and also when trying to make changes to acephei for demo reasons. I can work around this by "stealing" a key, but I do think it'd be nice for the changelog to have the correct actor in the history when support intervenes. |
Description
Currently, internal Apollo employees (e.g. support staff, sales, engineers), can access users' accounts by activating "sudo mode" on API keys with express permissions. This is done by passing
apollo-sudo: true
as a header pair to the GraphQL API. This request is to allow sudo mode to be enabled on any command by passing an environment variableAPOLLO_SUDO=true
or a hidden flag--sudo
. This option should not be documented for external use, as only Apollo employees have this sudo-user privilege.This tool will be valuable for engineers in debugging problems that users run into without having to impersonate that user with their API key.
The text was updated successfully, but these errors were encountered: