-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Role config per database [was: How to rewrite "Defining Custom Privilege" in version 6.] #572
Comments
Hi @HermanPool . This is a regression of ldap2pg 6.0. Can you share your custom privilege to see how you could implement this in 6.0 ? In 6.0, privileges are distinct from ACL. An ACL retruns all aclitem from a system catalog. A privilege references a privilege type in an ACL. I plan to add custom ACL so that you can reference more system catalog acls like foreign data wrapper, etc. Waiting for your use case. Étienne |
See the attached zip file for the ldap2pg.yml file |
Ok, interesting. You used privileges to configure a role. See https://ldap2pg.readthedocs.io/en/latest/config/#role-options I suggest the following configuration format : rules:
- role:
name: alice
config:
__global__:
log_statement: all
db1:
edb_audit_statement: all What do you think of this ? Do you need LDAP attribute injection in config ? |
In the attached file is my version 6 yml file. The purpose is that everybody in the App_DBApg_ddl , App_DBApg_write and App_DBApg_read group, the value "all" gets for the config property edb_audit_statement. |
We had a custom privilege in ldap2pg version 5.
See the example: https://ldap2pg.readthedocs.io/en/v5/privileges/
How do implement that in version 6?
with regards,
Herman Pool
The text was updated successfully, but these errors were encountered: