-
Notifications
You must be signed in to change notification settings - Fork 2.8k
Open
Labels
a/authzIssues related to "authorization" and the policy engine after session claims are procesedIssues related to "authorization" and the policy engine after session claims are procesedc/serverRelated to serverRelated to serverk/ideasDiscuss new ideas / pre-proposals / roadmapDiscuss new ideas / pre-proposals / roadmapp/mediumnon-urgent issues/features that are candidates for being included in one of the upcoming sprintsnon-urgent issues/features that are candidates for being included in one of the upcoming sprints
Description
To restrict access to sensitive fields, the solution proposed in https://docs.hasura.io/1.0/graphql/manual/queries/control-access.html requires one to modify the db schema (creating a view and setting up new relationships/permissions)
Instead if it were possible to define multilple row + column permission rules this could be avoided.
e.g. For table user(id, name, email, phone)
, select
permissions for role user
can be
-
Rule 1:
- Row permission:
{}
i.e. without any checks - Col permission:
name
- Row permission:
-
Rule 2:
- Row permission:
{id: {_eq: 'x-hasura-user-id'}}
i.e. if user is the owner - Col permission:
name, email, phone
- Row permission:
dijam, andreasnilssondev, tolgakoyluoglu, yasinarik, revskill10 and 42 more
Metadata
Metadata
Assignees
Labels
a/authzIssues related to "authorization" and the policy engine after session claims are procesedIssues related to "authorization" and the policy engine after session claims are procesedc/serverRelated to serverRelated to serverk/ideasDiscuss new ideas / pre-proposals / roadmapDiscuss new ideas / pre-proposals / roadmapp/mediumnon-urgent issues/features that are candidates for being included in one of the upcoming sprintsnon-urgent issues/features that are candidates for being included in one of the upcoming sprints