-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ORV2-2673 Rename Role to claim, auth group to role in vehicles and API alignment #1552
Conversation
...src/modules/company-user-management/pending-idir-users/profiles/pending-idir-user.profile.ts
Outdated
Show resolved
Hide resolved
vehicles/src/modules/permit-application-payment/permit/permit.controller.ts
Show resolved
Hide resolved
vehicles/src/modules/permit-application-payment/permit/permit.controller.ts
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved Be changes
Quality Gate failed for 'onroutebc_policy'Failed conditions |
Quality Gate failed for 'onroutebc dops'Failed conditions |
Quality Gate passed for 'onroutebc_scheduler'Issues Measures |
Quality Gate failed for 'onroutebc vehicles'Failed conditions |
Quality Gate failed for 'onroutebc frontend'Failed conditions |
Description
roles
toclaims
userAuthGroup
touserRole
.Note that this is only a correction of the terminologies as we have so far been calling claims like
READ-DOCUMENT
as roles and user's roles likeSYSADMIN
,COMPANY_ADMIN
as auth groups. This led to a lot of confusion around how to specify the permissions and conveying information to various stakeholders.Some core terminology changes regarding permissions:
This is because,
PPC_CLERK
,SYS_ADMIN
etc. amongIDIR
andCOMPANY_ADMIN
,PERMIT_APPLICANT
amongBCeID
are all roles a user can take on. They should have been called roles to begin with.READ-DOCUMENT, READ-PERMIT, WRITE-PERMIT
etc. are all claims useful in a claim based authorization model. However, in our system, we never talk about these claims to business and for the most part, they aren't even aware of the development around this. They only care about the user's role likePPC_CLERK
. These should have been called claims to begin with.But because we misnamed claims as roles, we had to call the actual roles as
userAuthGroups
, we were stuck in a perennial confusion cycle of how to consolidate authorization and kept mixing up terminology and hence our permission implementation became a lot of custom calculation when in reality we needed a simple role based authorization scheme.Hence the need for a correction.
Key Caveat:
USER_AUTH_GROUP
, the DB and the reference to the DB column remains untouched since it involves breaking too many things and honestly not worth the effort at this stage. In future, it may be changed, however.Type of change
Please delete options that are not relevant.
How Has This Been Tested?
Please describe the tests that you ran to verify your changes. Provide instructions so we can reproduce. Please also list any relevant details for your test configuration
Checklist
Further comments
Thanks for the PR!
Deployments, as required, will be available below:
Please create PRs in draft mode. Mark as ready to enable:
After merge, new images are promoted to:
Thanks for the PR!
Deployments, as required, will be available below:
Please create PRs in draft mode. Mark as ready to enable:
After merge, new images are promoted to: