-
Notifications
You must be signed in to change notification settings - Fork 3.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replace RBAC internals with lib from django-ansible-base #14735
Closed
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
github-actions
bot
added
component:api
component:docs
dependencies
Pull requests that update a dependency file
labels
Dec 20, 2023
AlanCoding
force-pushed
the
django_permissions
branch
from
January 2, 2024 13:51
0b0582d
to
79517b6
Compare
github-actions
bot
added
the
component:awx_collection
issues related to the collection for controlling AWX
label
Jan 3, 2024
AlanCoding
force-pushed
the
django_permissions
branch
2 times, most recently
from
January 24, 2024 20:45
933198b
to
34bebdd
Compare
AlanCoding
force-pushed
the
django_permissions
branch
2 times, most recently
from
February 6, 2024 03:17
af224bc
to
d370a3d
Compare
AlanCoding
changed the title
[PoC] Replace RBAC internals with lib from django-ansible-base
Replace RBAC internals with lib from django-ansible-base
Feb 7, 2024
AlanCoding
force-pushed
the
django_permissions
branch
from
February 7, 2024 15:01
0dbe9ad
to
f3d40fc
Compare
6 tasks
Develop ability to list permissions for existing roles Create a model registry for RBAC-tracked models Write the data migration logic for creating the preloaded role definitions Write migration to migrate old Role into ObjectRole model This loops over the old Role model, knowing it is unique on object and role_field Most of the logic is concerned with identifying the needed permissions, and then corresponding role definition As needed, object roles are created and users then teams are assigned Write re-computation of cache logic for teams and then for object role permissions Migrate new RBAC internals to ansible_base Migrate tests to ansible_base Implement solution for visible_roles Expose URLs for DAB RBAC
AlanCoding
force-pushed
the
django_permissions
branch
from
February 20, 2024 14:25
6f7967b
to
0bb39c4
Compare
Moved to feature branch |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
component:api
component:awx_collection
issues related to the collection for controlling AWX
component:docs
dependencies
Pull requests that update a dependency file
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
SUMMARY
This makes use of ansible/django-ansible-base#45
The main points of that RBAC system are to:
update_role
gives update permission and read permission.The last points here will not be exposed through the API until new endpoints are added. That is what I will work on next, but first I want to get tests cleaned up with the ORM layer integration, which is why this is being oped up initially.
ISSUE TYPE
COMPONENT NAME
ADDITIONAL INFORMATION
Initially this is being done in a backward compatible way with the current roles API. I want to formally document the few backward incompatible things.