vroldanbet
09/02/2022, 9:42 AMvroldanbet
09/02/2022, 9:43 AMLookupWatch
. That's still WIP: https://github.com/authzed/spicedb/issues/207vroldanbet
09/02/2022, 9:44 AMraffaelespazzoli
09/16/2022, 5:02 PMthing
, but not to a specific object id
4. (to keep it simple) the things
are related to groups
the resolution would be that if a user belongs to a group assigned to the thing and at the same time belongs to a role with the requested permission then they are allowed.
In my attempts to model this, I always end up with roles being assigned to a specific object id, making them non-reusable (i.e. multiple assigned need to be done to each object id, at which point groups become useless and users could be assigned directly to roles.Joey
09/16/2022, 5:03 PMluke
09/16/2022, 8:06 PMtype user {}
type group {
relation admin: user
relation member: user
permission add_document = admin
}
type document {
relation owner: user
relation editor: user
relation viewer: user
relation group: group
permission add_to_group = owner // no way to assert about the group being added to here because it is not yet related!
}
and then the operation simply requires to permission checks?Joey
09/16/2022, 8:12 PMeastfisher
10/20/2022, 1:59 AMJoey
10/20/2022, 2:02 AMchance
10/21/2022, 4:42 PMtype user {}
type district {
relation admin: user
}
type site {
relation district
relation site_admin: user // <- is it possible to limit this down to a user must be an admin of district?
}
yezb
11/04/2022, 3:17 AMJoey
11/04/2022, 3:23 AMJoey
11/04/2022, 3:24 AMJoey
11/04/2022, 3:25 AMJoey
11/04/2022, 3:36 AMyezb
11/04/2022, 4:24 AMJoey
11/04/2022, 4:53 AMJoey
11/04/2022, 4:53 AMJoey
11/04/2022, 4:54 AMyezb
11/04/2022, 4:55 AMJoey
11/04/2022, 4:56 AMJoey
11/04/2022, 4:56 AMyezb
11/04/2022, 4:56 AMJoey
11/04/2022, 4:56 AMJoey
11/04/2022, 4:57 AMyezb
11/04/2022, 4:59 AMJoey
11/04/2022, 4:59 AMJoey
11/04/2022, 5:00 AMJoey
11/04/2022, 5:00 AMyezb
11/04/2022, 5:01 AM