summaryrefslogtreecommitdiff
path: root/src/acl.c
diff options
context:
space:
mode:
authorantirez <antirez@gmail.com>2020-04-23 11:56:36 +0200
committerantirez <antirez@gmail.com>2020-04-23 11:56:39 +0200
commit96ebfc3b361b7c45f87e86cf1d4025e62da062e6 (patch)
tree86cde04142957bd37764e3a5cc903f829d9242a1 /src/acl.c
parent9ae8254e20c151bb153519a868933cbd13d4c164 (diff)
downloadredis-96ebfc3b361b7c45f87e86cf1d4025e62da062e6.tar.gz
ACL: re-enable command execution of disabled users.
After all I changed idea again: enabled/disabled should have a more clear meaning, and it only means: you can't authenticate with such user with new connections, however old connections continue to work as expected.
Diffstat (limited to 'src/acl.c')
-rw-r--r--src/acl.c4
1 files changed, 0 insertions, 4 deletions
diff --git a/src/acl.c b/src/acl.c
index bf5dd18f1..3194feb5b 100644
--- a/src/acl.c
+++ b/src/acl.c
@@ -1055,10 +1055,6 @@ int ACLCheckCommandPerm(client *c, int *keyidxptr) {
/* If there is no associated user, the connection can run anything. */
if (u == NULL) return ACL_OK;
- /* If the user is disabled we don't allow the execution of any
- * command. */
- if (!(u->flags & USER_FLAG_ENABLED)) return ACL_DENIED_CMD;
-
/* Check if the user can execute this command. */
if (!(u->flags & USER_FLAG_ALLCOMMANDS) &&
c->cmd->proc != authCommand)