-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature/ckanext iauth #200
Conversation
…ory-app into feature/ckanext-iauth
Feature/local reload
…ory-app into feature/ckanext-iauth
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Grab me if some of this doesn't make sense. There's a lot here. This is looking good, but I have some questions/issues about the approach.
I'm concerned we're overwriting the existing auth functions instead of augmenting them (chaining them). We don't want to accidentally allow access because the user exists when the controls should be more nuanced (only allow if user exists and is a member of an organization).
Adding more comprehensive tests would allow us to be sure. We should be testing all CKAN roles as a matrix to be sure we've captured all the cases. When dealing with authorization, we should be thorough in our tests.
ckanext-datagov_inventory/ckanext/datagov_inventory/templates/error_document_template.html
Outdated
Show resolved
Hide resolved
ckanext-datagov_inventory/ckanext/datagov_inventory/tests/logic/auth/test_plugin.py
Outdated
Show resolved
Hide resolved
ckanext-datagov_inventory/ckanext/datagov_inventory/tests/logic/auth/test_plugin.py
Outdated
Show resolved
Hide resolved
ckanext-datagov_inventory/ckanext/datagov_inventory/tests/logic/auth/test_plugin.py
Outdated
Show resolved
Hide resolved
ckanext-datagov_inventory/ckanext/datagov_inventory/tests/logic/auth/test_plugin.py
Outdated
Show resolved
Hide resolved
My two cents here @jbrown-xentity @adborden Have we already identified any case where it is required to preserve/chain the previous logic? |
Thanks @avdata99, yeah I think you're right since we're really only touching the read functions, we can get away with |
Create new users:
Create dataset with certain parameters on the fly:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great! I left a few minor suggestions.
Now that we've dug into all the actions... Is it possible to deny package_show to anonymous users while still allowing access to resources? That way we can get rid of the private -> public upload hack.
ckanext-datagov_inventory/ckanext/datagov_inventory/templates/error_document_template.html
Show resolved
Hide resolved
ckanext-datagov_inventory/ckanext/datagov_inventory/tests/logic/auth/test_auth.py
Outdated
Show resolved
Hide resolved
ckanext-datagov_inventory/ckanext/datagov_inventory/tests/logic/auth/test_auth.py
Outdated
Show resolved
Hide resolved
ckanext-datagov_inventory/ckanext/datagov_inventory/tests/logic/auth/test_auth.py
Outdated
Show resolved
Hide resolved
ckanext-datagov_inventory/ckanext/datagov_inventory/tests/logic/auth/test_auth.py
Outdated
Show resolved
Hide resolved
ckanext-datagov_inventory/ckanext/datagov_inventory/tests/logic/auth/test_auth.py
Outdated
Show resolved
Hide resolved
ckanext-datagov_inventory/ckanext/datagov_inventory/tests/logic/auth/test_auth.py
Show resolved
Hide resolved
…c/auth/test_auth.py Co-authored-by: Aaron D Borden <[email protected]>
…error_document_template.html Co-authored-by: Aaron D Borden <[email protected]>
Integrating CKAN authentication customizations. Related to GSA/data.gov#2575.