-
Notifications
You must be signed in to change notification settings - Fork 16.4k
Add the section describing the security model of DAG Author capabilities #36022
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add the section describing the security model of DAG Author capabilities #36022
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm working on moving the new priority weight strategy to a plugin, I will update this part once I finish my PR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Perfect :) . I was just asking in the original PR #35210
cc4f7b0 to
59e38a7
Compare
pankajkoti
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is very helpful!
dafefdf to
e231047
Compare
This change codifies and explains assumptions and decisions made by Airflow maintainers with regards to capabilities of DAG Authors. While DAG authors are pretty powerful and capable actors in Airflow, they cannot do everything and Deployment Managers haw ways to restrict their potential capabilities, especially in the context of influencing other tasks and common components such as Scheduler, Webserver and Triggerer. This PR adds a chapter explaining those assumptions and decisions and tell the Deployment Managers what responsibilities they have with that regardsm and what mechanismes they currently have available to limit capabilities of DAG Authors.
Co-authored-by: Pankaj Koti <pankajkoti699@gmail.com>
Co-authored-by: Pankaj Koti <pankajkoti699@gmail.com>
c2aa0ba to
f11afb8
Compare
|
I will merge it as is now, and we can update it later @hussein-awala :) |
…ies (#36022) * Add the section describing the security model of DAG Author capabilities This change codifies and explains assumptions and decisions made by Airflow maintainers with regards to capabilities of DAG Authors. While DAG authors are pretty powerful and capable actors in Airflow, they cannot do everything and Deployment Managers haw ways to restrict their potential capabilities, especially in the context of influencing other tasks and common components such as Scheduler, Webserver and Triggerer. This PR adds a chapter explaining those assumptions and decisions and tell the Deployment Managers what responsibilities they have with that regardsm and what mechanismes they currently have available to limit capabilities of DAG Authors. * Update docs/apache-airflow/security/security_model.rst Co-authored-by: Pankaj Koti <pankajkoti699@gmail.com> * Update docs/apache-airflow/security/security_model.rst Co-authored-by: Pankaj Koti <pankajkoti699@gmail.com> --------- Co-authored-by: Pankaj Koti <pankajkoti699@gmail.com> (cherry picked from commit 395ac46)
This change codifies and explains assumptions and decisions made by Airflow maintainers with regards to capabilities of DAG Authors.
While DAG authors are pretty powerful and capable actors in Airflow, they cannot do everything and Deployment Managers have ways to restrict their potential capabilities, especially in the context of influencing other tasks and common components such as Scheduler, Webserver and Triggerer.
This PR adds a chapter explaining those assumptions and decisions and tell the Deployment Managers what responsibilities they have with that regards and what mechanisms they currently have available to limit capabilities of DAG Authors.
^ Add meaningful description above
Read the Pull Request Guidelines for more information.
In case of fundamental code changes, an Airflow Improvement Proposal (AIP) is needed.
In case of a new dependency, check compliance with the ASF 3rd Party License Policy.
In case of backwards incompatible changes please leave a note in a newsfragment file, named
{pr_number}.significant.rstor{issue_number}.significant.rst, in newsfragments.