Skip to content

Commit 5024cc3

Browse files
danieljharveyhasura-bot
authored andcommitted
Use Condition internally for permissions (#1954)
<!-- The PR description should answer 2 important questions: --> ### What Part of implementing [authorization rules](#10237). This pull request introduces the internals to allow type permissions to be defined with allow / deny fields and `Condition`s that match on session variables and literal values. We resolve into the new auth types and use them internally for all execution. We keep the old ones as they are used by `graphql` and `jsonapi` schema generation. There is no way to create clever permissions yet, these will follow. V3_GIT_ORIGIN_REV_ID: 6212eb1cf1d94b13e24f42c6ede60ce5a1b02e58
1 parent ff08e4d commit 5024cc3

File tree

109 files changed

+4240
-1168
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

109 files changed

+4240
-1168
lines changed

v3/Cargo.lock

Lines changed: 20 additions & 72 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[package]
2+
name = "authorization-rules"
3+
version.workspace = true
4+
edition.workspace = true
5+
license.workspace = true
6+
7+
[dependencies]
8+
metadata-resolve = { path = "../../metadata-resolve" }
9+
hasura-authn-core = { path = "../hasura-authn-core" }
10+
open-dds = { path = "../../open-dds" }
11+
12+
derive_more = { workspace = true }
13+
indexmap = { workspace = true }
14+
serde_json = { workspace = true }
15+
thiserror = { workspace = true }
16+
17+
[lints]
18+
workspace = true

0 commit comments

Comments
 (0)