poulpi
01/06/2023, 4:41 PMpoulpi
01/06/2023, 4:42 PMmgagliardo
01/06/2023, 6:15 PMsession
?Prchowdh
01/06/2023, 6:50 PMkubectl apply -k cockroachdb-tls-ingress/.
And getting the following error :
error: accumulating resources: accumulation err='accumulating resources from 'ingress': '/home/prchowdh/ecommerce/spicedb-operator/examples/cockroachdb-tls-ingress/ingress' must resolve to a file': recursed accumulation of path '/home/prchowdh/ecommerce/spicedb-operator/examples/cockroachdb-tls-ingress/ingress': loading KV pairs: file sources: [tls.crt tls.key]: evalsymlink failure on '/home/prchowdh/ecommerce/spicedb-operator/examples/cockroachdb-tls-ingress/ingress/tls.crt' : lstat /home/prchowdh/ecommerce/spicedb-operator/examples/cockroachdb-tls-ingress/ingress/tls.crt: no such file or directory
Singha1
01/06/2023, 7:06 PMJake
01/06/2023, 7:07 PMJake
01/06/2023, 7:09 PM(allowed - denied)
and document:123#allowed@user:*
and document:123#denied@user:jake
Singha1
01/06/2023, 7:10 PMJoey
01/06/2023, 7:10 PMexcludedSubjectId
is now deprecated in favor of excludedSubjects
Jake
01/06/2023, 7:10 PMSingha1
01/06/2023, 7:11 PMJoey
01/06/2023, 7:14 PM*
, then excluded subjects will be a list of those subjects to not be includedJoey
01/06/2023, 7:16 PMPrchowdh
01/06/2023, 7:16 PMJoey
01/06/2023, 7:42 PMSingha1
01/06/2023, 7:45 PMJoey
01/06/2023, 7:45 PMJoey
01/06/2023, 7:45 PMSingha1
01/06/2023, 7:46 PMJoey
01/06/2023, 8:36 PMjbrown
01/07/2023, 5:47 PMdsieczko
01/07/2023, 10:12 PMjbrown
01/07/2023, 10:14 PMUnhinged
01/09/2023, 9:41 AMvroldanbet
01/09/2023, 10:27 AMconsole
(human readable form) or json
for structured logging. You can use --log-format
to change the logging format.LarsRan
01/09/2023, 12:44 PMdefinition document {
relation aaa: group#member
relation bbb: group#member
permission ccc = aaa & bbb
}
definition group {
relation member: user
}
definition user {}
Here users get their permission by the group that they are in. For permission ccc
then need permissions aaa
and bbb
.
In this example if a user is part of group1
which has aaa
on document1
and is also part of group2
which has bbb
on document1
then this user has permission ccc
on document1
.
However, lets say we want permissions to only come from a single group so that a user only has permission ccc
if they are in a group that has both aaa
and bbb
. How do I do this? My naive incorrect approach was this
definition document {
relation aaa: group
relation bbb: group
permission ccc = (aaa & bbb)#member
}
definition group {
relation member: user
}
definition user {}
but that is (unsurprisingly) syntactically incorrect. What would be a good way to model this, perhaps using auxiliary definitions/relations/permissions? (Note: this is of course simplified from our actual usecase so just merging aaa
and bbb
does not work for us)yogurtsaucechicken
01/09/2023, 7:44 PMJoey
01/09/2023, 7:48 PMyetitwo
01/09/2023, 8:56 PMyetitwo
01/09/2023, 9:00 PM