-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove custom access control #5147
Conversation
🦋 Changeset detectedLatest commit: a0fcdc3 The changes in this PR will be included in the next version bump. This PR includes changesets to release 13 packages
Not sure what this means? Click here to learn what changesets are. Click here if you're a maintainer who wants to add another changeset to this PR |
This pull request is being automatically deployed with Vercel (learn more). 🔍 Inspect: https://vercel.com/keystonejs/keystone-next-docs/9sZE3iNLsYU2UHPhKLJcHfyQhtC6 |
This pull request is automatically built and testable in CodeSandbox. To see build info of the built libraries, click here or the icon next to each commit SHA. Latest deployment of this branch, based on commit a0fcdc3:
|
Do we not need this with |
Since the user is writing the resolver directly in |
That access was easy and inline with the other access control config. Anyways, I guess the internal list api (if not using sudo context) would still restrict access using access control, right? |
See #5025
Now that #5145 (remove keystone.extendGraphQLSchema) is complete, we no longer need to custom access control parsers and checkers.