[Security] Deprecated ROLE_PREVIOUS_ADMIN #35858
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
ROLE_PREVIOUS_ADMIN
is added to the token roles if the session is an impersonation. Since #31189 we have theIS_IMPERSONATOR
attribute which can be used for the same reason. I propose to deprecate theROLE_PREVIOUS_ADMIN
:AbstractToken
)ROLE_PREVIOUS_ADMIN
withIS_IMPERSONATOR
:find ./ -type f -exec sed -i 's/ROLE_PREVIOUS_ADMIN/IS_IMPERSONATOR/g' {} +
I'm a bit unsure on how to deprecate this role, but I think having it in
RoleVoter
is probably the safest (isGranted()
and variants +AccessDecisionManager#decide()
all use this voter to check if the token has this role).