-
Notifications
You must be signed in to change notification settings - Fork 881
Add permissions for links and pages #884
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thanks. One solutionThe backend could support an endpoint that allows users to query if they can do some action. This does not leak any information. The Eg: { // Total WIP structure. Just a very basic example
"show_settings": {"resource_type":"admin_settings", action:"read"},
"audit_logs": {"resource_type":"audit_log", action:"read"}
} |
Hey team! Please add your planning poker estimate with ZenHub @code-asher @presleyp @vapurrmaid |
Estimated at Can fill in more context later/synchronously. Will need to take a look at other tickets and match up the dependencies. Once we understand the design of perms and the approach the FE will take, we will need to implement that. Once we're here, this will become a 2, max 3, pointer. But I don't want this to be lumped in with the broad architecture of permissions. |
It's a little strange to me for this to be a |
@Emyrk @vapurrmaid @presleyp do we need a synchronous conversation to sort this one out? |
@tjcran yes |
About this one, what pages should we verify? I can only see for now the user's page being affected. Am I missing something? |
I don't know if there's a ticket for this already in the RBAC epic, but I wanted to make sure we don't forget to guard the Admin menu, its links, and the pages it links to appropriately once we have RBAC in place.
I'm leaving details unfinished because I don't know if I should do this in my Users epic or an RBAC person should do it in their epic, and I know it's blocked but not by which exact ticket. @misskniss @vapurrmaid
The text was updated successfully, but these errors were encountered: