Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Authorization.load_config breaks when authorization config contains scope based permission linked with anything other than a role based policy #445

Closed
sras1599 opened this issue May 14, 2023 · 0 comments · Fixed by #446

Comments

@sras1599
Copy link
Contributor

Its pretty clear that the library only supports loading role based policies for now. When creating a scope based permission, we should first check if the policy linked to that permission has been loaded by us and if not, we should skip adding that policy to the policies attribute of the Authorization class. Since we're pretty much doing the same thing with resource based permissions, I'm not sure why we haven't done the same with scope based permissions.

@sras1599 sras1599 changed the title Authorization.load_config breaks when authorization config contains scope based permission with anything other than a role based policy Authorization.load_config breaks when authorization config contains scope based permission linked with anything other than a role based policy May 14, 2023
sras1599 added a commit to sras1599/python-keycloak that referenced this issue May 14, 2023
…ission is linked with anything other than a role based policy. Fixes marcospereirampj#445
ryshoooo pushed a commit that referenced this issue May 15, 2023
…ission is linked with anything other than a role based policy. Fixes #445 (#446)
NoDataIsAvailable pushed a commit to NoDataIsAvailable/python-keycloak-extended that referenced this issue Jan 8, 2024
…ission is linked with anything other than a role based policy. Fixes marcospereirampj#445 (marcospereirampj#446)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
1 participant