-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replace userAuthGroup with userRole in vehicles - Part 2 #1541
Conversation
Quality Gate passed for 'onroutebc_scheduler'Issues Measures |
Quality Gate passed for 'onroutebc_policy'Issues Measures |
Quality Gate passed for 'onroutebc dops'Issues Measures |
Quality Gate failed for 'onroutebc vehicles'Failed conditions |
Quality Gate failed for 'onroutebc frontend'Failed conditions |
frontend/src/features/permits/components/permit-list/ApplicationsInProgressList.tsx
Show resolved
Hide resolved
frontend/src/features/settings/components/dashboard/ManageSettingsDashboard.tsx
Show resolved
Hide resolved
@zgong-gov Marking all of your comments as resolved as I'll create new tickets to correct the terminology in the frontend. |
Description
userAuthGroup
withuserRole
in vehiclesuserAuthGroup
touserRole
in request and response bodies. Note that this is only a subset of changes to align with API change. There will be additional PRs to modify the language in frontend.Some core terminology changes regarding permissions:
This is because, PPC_CLERK , SYS_ADMIN etc. among IDIR and COMPANY_ADMIN , PERMIT_APPLICANT among BCeID are all roles a user can take on. They should have been called roles to begin with.
READ-DOCUMENT, READ-PERMIT, WRITE-PERMIT etc. are all claims useful in a claim based authorization model. However, in our system, we never talk about these claims to business and for the most part, they aren't even aware of the development around this. They only care about the user's role like PPC_CLERK. These should have been called claims to begin with.
But because we misnamed claims as roles, we had to call the actual roles as userAuthGroups, we were stuck in a perennial confusion cycle of how to consolidate authorization and kept mixing up terminology and hence our permission implementation became a lot of custom calculation when in reality we needed a simple role based authorization scheme.
Type of change
Please delete options that are not relevant.
How Has This Been Tested?
Please describe the tests that you ran to verify your changes. Provide instructions so we can reproduce. Please also list any relevant details for your test configuration
Checklist
Further comments
Thanks for the PR!
Deployments, as required, will be available below:
Please create PRs in draft mode. Mark as ready to enable:
After merge, new images are promoted to:
Thanks for the PR!
Deployments, as required, will be available below:
Please create PRs in draft mode. Mark as ready to enable:
After merge, new images are promoted to: