The Needs Review Queue Bot → tested this issue. It either no longer applies to Drupal core, or fails the Drupal core commit checks. Therefore, this issue status is now "Needs work".
Apart from a re-roll or rebase, this issue may need more work to address feedback in the issue or MR comments. To progress an issue, incorporate this feedback as part of the process of updating the issue. This helps other contributors to know what is outstanding.
Consult the Drupal Contributor Guide → to find step-by-step guides for working with issues.
- 🇧🇪Belgium kristiaanvandeneynde Antwerp, Belgium
With 🌱 [Meta, Plan] Pitch-Burgh: Policy based access in core Active around the corner (hopefully?), this issue no longer makes sense.
Current situation: Your permissions are not calculated based merely on your role, but also on whether or not you are user 1, as rightfully pointed out in #33. So until that was fixed, we could never resolve this issue.
Future situation (again, hopefully): Your permissions are calculated based on an unpredictable amount of access policies, some of which being your user roles and your UID1 status. So as soon as we have access policies in core, we will never be able to fold the user.permissions cache context into user.roles and for good reason.
So if everyone agrees, we can close this issue as won't fix as it's looking more likely that access policies will turn this into a moot point. Furthermore, access policies will allow us to land 📌 Add a container parameter that can remove the special behavior of UID#1 Fixed after ~14-15 years :)
- Status changed to Closed: won't fix
about 1 year ago 10:31am 7 November 2023 - 🇬🇧United Kingdom catch
Yes agreed, let's won't fix it. user.roles is not often used so even if we hadn't broken the optimization possibility, it would have been a relatively marginal one.