-
Notifications
You must be signed in to change notification settings - Fork 119
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(rbac)!: improve validation from source #1643
base: main
Are you sure you want to change the base?
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
9449822
to
c493707
Compare
c493707
to
c3a750b
Compare
c3a750b
to
85fca0b
Compare
85fca0b
to
c2de512
Compare
We had an issue with main branch and it was fixed in the latest main:
Can you make rebase one more time? |
plugins/rbac-backend/src/file-permissions/csv-file-watcher.test.ts
Outdated
Show resolved
Hide resolved
181cada
to
6346c61
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request looks good to me and even LGTM, but something wrong with build.
83f4653
to
01844e1
Compare
BREAKING CHANGE: This will lead to more strict validation on the source of permission policies and roles based on the where the first role is defined. Improves the validation of the different sources of permission policies and roles. Aims to make policy definition more consistent. Now checks if a permission policy or role with new member matches the originating role's source and prevents any action if the sources do not match. Exception includes the event of adding new permission policies to the RBAC Admin role defined by the configuration file. Sources include 'REST, 'CSV', 'Configuration', and 'legacy'. Before updating, ensure that you have attempted to migrate all permission policies and roles to a single source. This can be done by checking source information through the REST API and by querying the database. Make updates through one of the available avenues: REST API, CSV file, and the database. To view the originating source for a particular role, query the role-metadata table or use the GET roles endpoint.
01844e1
to
537a493
Compare
Quality Gate passedIssues Measures |
Description
Improves the validation of the different sources of permission policies and roles. Aims to make policy definition more consistent.
Now checks if a permission policy or role with new member matches the originating role's source and prevents any action if the sources do not match. Exception includes the event of adding new permission policies to the RBAC Admin role defined by the configuration file. Sources include 'REST, 'CSV', 'Configuration', and 'legacy'.
Fixes