mirror of
https://github.com/anonaddy/anonaddy.git
synced 2026-04-25 22:25:55 +03:00
[GH-ISSUE #346] [Feature Request] Edit API Premissions / Access #286
Labels
No labels
bug
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/anonaddy#286
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Zaptosis on GitHub (Oct 11, 2022).
Original GitHub issue: https://github.com/anonaddy/anonaddy/issues/346
It would be great if one could allow a family member or trusted friend to use a custom domain, however adding authorized users or shared domains would be a pretty large & complex feature to add.
Instead a temporary workaround that would be much easier to implement would would be setting API keys access scopes, which would also have the benefit of increasing security rather than just having fully unrestricted API keys floating around while also enabling other use cases outside of this.
Such API options could be:
To avoid further cluttering the UI just a simple "edit" button could be added for the API key next to the delete button. It also wouldn't significantly increase costs as both lite & pro users would still be limited by their maximum bandwidth allocation & maximum recipient allocation.
This is an easy low-cost way to massively expand the functionality of AnonAddy & increase its competitiveness in the space.
@willbrowningme commented on GitHub (Oct 19, 2022):
Thanks for the suggestion, Laravel Sanctum does make it easy to assign abilities (scopes) to tokens - https://laravel.com/docs/9.x/sanctum#token-abilities
I would likely keep the scopes as
create, read, update, deletefor each resource (e.g. aliases, recipients, domains).My only concern is error handling for things like the browser extension and mobile apps if someone uses a token with incorrect abilities/scopes.
When I get time I'll see if I can implement this.