bzp2010 commented on code in PR #12276:
URL: https://github.com/apache/apisix/pull/12276#discussion_r2122773422


##########
apisix/cli/ngx_tpl.lua:
##########
@@ -646,6 +646,21 @@ http {
                 apisix.http_admin()
             }
         }
+
+        {% if enable_admin_ui then %}
+        location = /ui {
+            return 301 /ui/;
+        }
+        location ^~ /ui/ {

Review Comment:
   There are no security concerns about unauthorized access as you understand 
it.
   
   Even if that ui endpoint is exposed on the Internet, the user still needs to 
be able to access the Admin API (/apisix/admin/xx) and have the proper 
credentials. And this part will undoubtedly be IP-restricted depending on the 
configuration.
   Separate access to the UI makes no sense; that thing will be built in CI and 
will not contain any data about the user's environment. Without credentials and 
permissions, that UI will always just report errors and not display any data.
   
   However, I recognize that this does carry some risk, mainly from the fact 
that if the endpoint is unintentionally exposed, it may cause bandwidth 
consumption on the server, but not face any potential data leakage or illegal 
operations.
   
   For that reason, I'll be introducing the IP restrictions that are currently 
in place on the Admin API to the new endpoint at the same time to alleviate 
that concern.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@apisix.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to