Skip to content

Commit efb67da

Browse files
Incorporate Feedback
1 parent 14369af commit efb67da

File tree

2 files changed

+14
-10
lines changed

2 files changed

+14
-10
lines changed

docs/production-deployment/self-hosted-guide/temporal-nexus.mdx

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To enable Nexus in your deployment:
5858
httpAddress: $PUBLIC_URL:7243
5959
```
6060
61-
2. Enable Nexus through dynamic config, set the public callback URL, and set the allowed callback addresses.
61+
2a. Prior to version 1.30.X, you must enable Nexus through dynamic config, set the public callback URL, and set the allowed callback addresses.
6262
6363
```yaml
6464
system.enableNexus:
@@ -69,14 +69,18 @@ To enable Nexus in your deployment:
6969
# membership. The URL is a Go template that interpolates the `NamepaceName` and `NamespaceID` variables.
7070
- value: https://$PUBLIC_URL:7243/namespaces/{{.NamespaceName}}/nexus/callback
7171
component.callbacks.allowedAddresses:
72-
# This list is a security mechanism for limiting which callback URLs are accepted by the server.
73-
# Attackers may leverage the callback mechanism to force the server to call arbitrary URLs.
74-
# Using * (wildcard pattern) and insecure is only recommended for development purposes
75-
# For Production Use cases, it is best practice to restric the hosts (by setting appropriate regex)
76-
# and to not allow Insecure (if your use case can support secure)
72+
# Limits which callback URLs are accepted by the server.
73+
# Wildcard patterns (*) and insecure (HTTP) callbacks are intended for development only.
74+
# For production, restrict allowed hosts and set AllowInsecure to false
75+
# whenever HTTPS/TLS is supported. Allowing HTTP increases MITM and data exposure risk.
7776
- value:
78-
- Pattern: "*" # Update this to restrict allowed callers for example: "^https://$EXAMPLE_URL\\.example\\.com(:1234)?/.*$"
79-
AllowInsecure: true # Change this false, if your hosts can make calls using TLS
77+
- Pattern: "*" # Update to restrict allowed callers, e.g. "https://$EXAMPLE_URL\\.example\\.com(:1234)?/.*$"
78+
AllowInsecure: true # In production, set to false when HTTPS/TLS is supported.
79+
```
80+
81+
2b. Since version 1.30.X, Nexus is enabled by default, the only configuration needed is to use the SystemCallbackURL.
82+
```yaml
83+
component.nexusoperations.useSystemCallbackURL: true
8084
```
8185
8286
## Build and use Nexus Services

docs/references/dynamic-configuration.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -246,8 +246,8 @@ Settings related to the management of Nexus
246246

247247
| Dynamic configuration key | Type | Description | Default value |
248248
| ------------------------------------------------------ | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------- |
249-
| `system.enableNexus` | Boolean | Enables Nexus Features | `true` (since 1.27) |
249+
| `system.enableNexus` | Boolean | Enables Nexus Features | `true` (since 1.27) |
250250
| `component.nexusoperations.callback.endpoint.template` | String | Defines the URL template used to construct Nexus callback endpoints that Nexus uses to deliver asynchronous completion results. | `https://$PUBLIC_URL:7243/namespaces/{{.NamespaceName}}/nexus/callback` |
251251
| `component.callbacks.allowedAddresses` | Object | Defines the security allow-list of callback URL patterns that the server will accept; used to restrict what callback endpoints can be invoked. | (See below sub-properties) |
252-
| `component.callbacks.allowedAddresses.Pattern` | String | Defines which callback URLs are permitted to be called by the server. (the patterns is a wildcard) | `*` |
252+
| `component.callbacks.allowedAddresses.Pattern` | String | Defines which callback URLs are permitted to be called by the server. (the patterns is a wildcard) | `*` |
253253
| `component.callbacks.allowedAddresses.AllowInsecure` | Boolean | Enables whether insecure (non-TLS/HTTP) URLs matching the pattern are permitted; should be false in production when HTTPS is supported. | `true` |

0 commit comments

Comments
 (0)