Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Aggregate policy by pulling it for parent resources and merging #1024

Closed
david-crespo opened this issue Jun 30, 2022 · 0 comments · Fixed by #1113
Closed

Aggregate policy by pulling it for parent resources and merging #1024

david-crespo opened this issue Jun 30, 2022 · 0 comments · Fixed by #1113
Assignees

Comments

@david-crespo
Copy link
Collaborator

david-crespo commented Jun 30, 2022

Workaround for oxidecomputer/omicron#1326 that lets us feel out what an API-level solution would buy us.

Example

For project Access & IAM page, instead of only pulling <...>/projects/:projectId/policy and showing that, we also pull the policy for the org and the silo, and combine them somehow. This is a bit of design challenge because we want to indicate where a given permission came from, and if a given user has entries at multiple levels we need to show that somehow too. This complexity hints at why all this might be better as API logic — the API can use the same logic it uses to actually resolve the permissions when it decides how to aggregate them into a synthetic policy.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant