nice-cpu-85235
12/17/2021, 8:31 AMstraight-pharmacist-68416
12/14/2021, 4:21 AMListIdentities
page
is 1-indexed instead of 0-indexed? page=0 seems to be the same as page=1
also, is there an efficient way to get the total number of all identities in the system, for pagination?straight-pharmacist-68416
12/13/2021, 9:00 PMCheck
and List
to be out of sync/inconsistent?
We assigned a role to a user and Check
confirmed that the user had that role. But when we call List
on that user, the role doesn’t show up
we only started seeing this today - was working fine for monthsorange-businessperson-74791
12/07/2021, 9:35 PMbig-library-77731
12/06/2021, 9:26 AMoathkeeper
that authorizes the routes based on matching the url.
But this forces me to make multiple rules for the same permissionastonishing-manchester-36531
12/04/2021, 3:08 PMhallowed-rain-91377
12/03/2021, 8:25 AMcuddly-city-78540
11/30/2021, 12:26 PMvictorious-flower-63171
11/22/2021, 12:59 PM// z is parent of y which is parent of x
storage:z#read@user // if allowed, stop here, else continue
bucket:y#read@user // same
object:x#read@user // if still not allowed here, then the user is not allowed on this object
I find that this is quite inefficient with the calls, as it creates quite a lot of calls for a single object. Is there a way to optimize it by doing a bulk check that would return as soon as there is 1 allowed ? Or maybe I'm missing something else ?future-engine-65380
11/22/2021, 10:36 AMvictorious-flower-63171
11/18/2021, 12:24 PMstorage:id1#read@roles:editor#member
storage:id1#write@roles:editor#member
However I read a bit about hotspot handling in the zanzibar paper and it seems this representation would cause a hotspot I think ?
I guess the alternative to that would be to use inheritance of relations with subjectset rewrites once they're added, but in that case how would you handle listing the roles available for binding ? Do you have any best practice advice on this maybe ?victorious-flower-63171
11/15/2021, 2:00 PMhigh-optician-2097
victorious-flower-63171
11/05/2021, 10:25 AMketo expand
but the other way around ?purple-activity-8730
11/03/2021, 12:14 PMread
write
delete
or update
policies for particular operations on the docs. For ex, in order to delete a doc called temp_doc.txt
, you need temp_doc.txt#delete@<user_id>
.
• Also, the admin should do all of these operations like *#*@(members:admin#member
which implies that the admin can do any
action on any
object.
• So that, if the admin wants to read this temp_doc.txt
, temp_doc.txt#read@<admin_id>
should return true.
However, I couldn't find a way to design this system. Does anyone have experience of Keto usage similar to this?
Thanks in advance!lively-machine-47461
11/01/2021, 11:37 AM# User1 owns usergroup:
echo "usergroups:395ba5f9-f596-4095-aaf1-25d138dfab9c#owner@(users:72f65406-45b1-4b2a-a6f2-af909c10c832#)" | \
keto relation-tuple parse - --format json | jq . > ./relation-tuples/user_usergroup.json
# Usergroup owns location:
echo "locations:0a4fa775-1bed-455b-b1b1-b91d40df667b#owner@(usergroups:395ba5f9-f596-4095-aaf1-25d138dfab9c#)" | \
keto relation-tuple parse - --format json | jq . > ./relation-tuples/usergroup_location.json
I would then think that I can validate the first authz relation like:
keto check users:72f65406-45b1-4b2a-a6f2-af909c10c832 owner usergroups 395ba5f9-f596-4095-aaf1-25d138dfab9c
It fails, since the user is not a subject, removing the #
makes it work.
keto check users:72f65406-45b1-4b2a-a6f2-af909c10c832 owner locations 0a4fa775-1bed-455b-b1b1-b91d40df667b
high-optician-2097
refined-addition-34429
10/28/2021, 12:35 PMketo.yml
? Just wondering if for every new namespace do I then need to modify this file? Or are these namespaces configurable in another way?refined-addition-34429
10/28/2021, 11:14 AMgroups:395ba5f9-f596-4095-aaf1-25d138dfab9c#owner@(users:72f65406-45b1-4b2a-a6f2-af909c10c832)
mysterious-rose-44236
10/25/2021, 1:57 PMproducts:org=1#list@(groups:organization1#members)
products:org=1,dep=1#list@(groups:department1#members)
products:org=1,dep=2#list@(groups:department2#members)
products:org=1,dep=1#list@(products:org=1#list)
products:org=1,dep=2#list@(products:org=1#list)
groups:department1#members@john
groups:organization1#members@jane
This way, John can only list products from his own department whereas Jane can list products from both department 1 and 2.
Is this best-practice, or would you recommend another approach?mysterious-rose-44236
10/23/2021, 8:12 AMwres, err := write.TransactRelationTuples(context.Background(),&ketoV1.TransactRelationTuplesRequest{
RelationTupleDeltas: deltas,
})
If I specify a non-existent namespace in the deltas, err
is nill and I can't really get anything useful out of wres
mysterious-rose-44236
10/22/2021, 12:45 PMvictorious-flower-63171
10/15/2021, 8:22 AMthankful-traffic-31087
10/11/2021, 1:14 PMketo-client-java
? It is basically "broken" and prevents us to being able to migrate to version 0.7flat-vase-70537
10/07/2021, 4:33 PMthankful-traffic-31087
10/06/2021, 9:14 PMGET /relation-tuples
the object and relation parameter are now required. But the documentation says that "List API: Display all Objects a User has Access to" is still possible. I could create a ticket or Pull Request for that, but I am unsure where to do that, due to being some kind of automatic process 🙂purple-energy-75954
10/06/2021, 4:17 PM--all-namespaces
is unknown in
https://github.com/ory/k8s/blob/master/helm/charts/keto/templates/job-migration.yaml#L37
Can this be fixed easily and if so, are there any other issue to expect, or would everything work fine when this particular issue is solved?adamant-shoe-395
10/05/2021, 2:01 PMsteep-lamp-91158
best-glass-41299
10/01/2021, 8:52 AM