-
Notifications
You must be signed in to change notification settings - Fork 39
Multi-App Workflows #76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: joshvanl <[email protected]>
|
+1 for this proposal... ...as long as security boundaries are not broken. If they are broken, then a viable permission model is accompanied to allow a developer to specify which external Apps are allowed to call management operations on the Host Workflow Application*, which defaults to secure-by-design / zero trust) Host Workflow Application is the application where the Workflow is registered. |
|
My only note here would be that if the specified app ID cannot be found, or the type cannot be found on the app ID or just generally something happens that is unexpected (e.g. security boundary violation), it'd be nice to have some context in the error returned by the runtime to the SDK so it can be handled and addressed programmatically and clearly instead of requiring an Easter egg hunt by the developer after the fact to figure out why it broke (e.g. today it just returns a 500 for either of the first two scenarios) - recent request for this on Discord. |
|
+1 binding although Ik based on the PRs I currently have open that the protos might differ slightly but overall the logic is sound. Protos can be updated afterwards 👍🏻 |
|
@cicoyle curious how your implementation so far (and implementations to come) will challenge/change the existing security boundaries as I have outlined in my feedback above :) |
|
+1 binding |
1 similar comment
|
+1 binding |
|
It saddens me to see this proposal merged without receiving any feedback to what I believe are valid questions around how this impacts the existing workflows security model. |
Forgot to update here @olitomlinson. We took this into consideration, the implementation supporting this proposal keeps the existing security posture as-is: apps that participate in a workflow cannot use the management API to alter the workflow. Only the app that registered it can do that |
|
I forgot to remind about this security consideration here @cicoyle - has this being catered for in the implementation? Potential areas of concern - Discoverability of Activities across App-boundaries
|
No description provided.