-
Notifications
You must be signed in to change notification settings - Fork 4
[FC-0099] refactor: get permissions' scopes instead of role #123
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Thanks for the pull request, @mariajgrimaldi! This repository is currently maintained by Once you've gone through the following steps feel free to tag them in a comment and let them know that your changes are ready for engineering review. 🔘 Get product approvalIf you haven't already, check this list to see if your contribution needs to go through the product review process.
🔘 Provide contextTo help your reviewers and other members of the community understand the purpose and larger context of your changes, feel free to add as much of the following information to the PR description as you can:
🔘 Get a green buildIf one or more checks are failing, continue working on your changes until this is no longer the case and your build turns green. DetailsWhere can I find more information?If you'd like to get more details on all aspects of the review process for open source pull requests (OSPRs), check out the following resources: When can I expect my changes to be merged?Our goal is to get community contributions seen and reviewed as efficiently as possible. However, the amount of time that it takes to review and merge a PR can vary significantly based on factors such as:
💡 As a result it may take up to several weeks or months to complete a review and merge your PR. |
openedx_authz/api/data.py
Outdated
| >>> perm1 in [perm2] # Uses __eq__ | ||
| True | ||
| """ | ||
| if not isinstance(other, PermissionData): |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this should raise an exception, can you think of a reason someone might legitimately pass in another type of object here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe it's enough with the typing.
openedx_authz/api/data.py
Outdated
| Example: | ||
| >>> perm1 = PermissionData(action=ActionData(external_key='view'), effect='allow') | ||
| >>> perm2 = PermissionData(action=ActionData(external_key='view'), effect='deny') | ||
| >>> perm1 == perm2 # True - same action TODO: should we also consider the effect? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I may be missing something in the use case, but I think we should consider the effect. If the permissions have opposite effects I don't think we can say they're equal.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You're right. If I'm getting the "view_library" scopes, I'm (at least implicitly) getting granted permissions, but not explicitly revoked. I'll also consider the effect here, I'll also add a note to the method with this specific case :)
834dbbe to
4302871
Compare
bmtcril
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good!
rodmgwgu
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, thanks
aa5374b to
f9f2b64
Compare
Description
openedx/openedx-platform#37564
Merge checklist:
Check off if complete or not applicable: