-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
v3.0.0: Site roles, program authz, user authz #57
Conversation
DIG-1520: Site admin is a role defined in Opa, not in jwt
DIG-1518: Rego policies now based on ProgramAuthorizations
Interpolate default usernames from .env file instead of hardcoding
DIG-1546: Opa unit tests
DIG-1502: Opa implements user-specific authorizations
DIG-898: allow service_token to view user_key
Thanks for this! Couple of questions:
|
Documentation for the ingest workflow was added in CanDIG/candigv2-ingest#93. When ingesting a Program Authorization for the first time, Opa needs the user to be someone with permission to ingest any program for the site. At the moment, the only site role for that is Admin, but in future, we could add a site-curator role that would be allowed to do this as well. If the Program Authorization has not been ingested before data is ingested, the only user that would be allowed to ingest data for that program is the site admin. If the site admin adds the Program Authorization first, any listed program curator in the Program Authorization would then have the authz to ingest data. Integration tests were added in CanDIG/CanDIGv2#550, which was the sister PR to #52 and CanDIG/candigv2-ingest#80. |
v3.0.0: Site roles, program authz, user authz