Skip to content

Permission implication#447

Merged
augustuswm merged 5 commits into
mainfrom
permission-implication
May 15, 2026
Merged

Permission implication#447
augustuswm merged 5 commits into
mainfrom
permission-implication

Conversation

@augustuswm
Copy link
Copy Markdown
Collaborator

The permission currently operates on a strict equality check, either a user has a permission or not. This means every cal site needs to check if the caller has direct permission to a resource or permission to all resources of that type.

Instead the caller should only be asking "does this user have a given permission on a resource". This PR addresses this by introducing the concept of implication. A given permission can imply that the caller has another permission. Namely

∀x : GetResourceFooAll -> GetResourceFoo(x)

This applies both to the *All permissions as well as permissions that carry a set of ids. A permission carrying a set of ideas implies access to any individual id in that set as well as any subset of that set.

@augustuswm augustuswm merged commit 24d6f6f into main May 15, 2026
8 checks passed
@augustuswm augustuswm deleted the permission-implication branch May 15, 2026 21:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant