You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Help developers prevent unintentionally changing production systems
Non-Goals
Does not rely upon RBAC or ACL of the connected clusters
Background
As a developer, I have access to production systems, but I'm not sure which operations within the extension might change those production systems, and want the extension to help protect me from unintentionally modifying production systems.
Proposal
Allow developers to mark a connection to allow read-only operations. Then extension would hide/disable all write or modifying operations on resources (clusters, topics, schemas, etc.) accessible with that connection.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Goals
Non-Goals
Background
As a developer, I have access to production systems, but I'm not sure which operations within the extension might change those production systems, and want the extension to help protect me from unintentionally modifying production systems.
Proposal
Allow developers to mark a connection to allow read-only operations. Then extension would hide/disable all write or modifying operations on resources (clusters, topics, schemas, etc.) accessible with that connection.
Beta Was this translation helpful? Give feedback.
All reactions