- Issue created by @paul121
- @paul121 opened merge request.
- Status changed to Needs review
about 1 year ago 6:28am 30 October 2023 - πΊπΈUnited States paul121 Spokane, WA
Update IS to clarify issue with "Admin" roles
- πΊπΈUnited States paul121 Spokane, WA
I did not add additional tests with this MR but all existing tests are passing. Including a patch for use in the meantime.
- π³πΏNew Zealand Josh Waihi
I did some testing of the above patch in #3404804 and it worked as expected but I did find one bug.
In the UI, when you select an authenticate user to have a permission, all other roles inherit that permission. If that permission was not explicitly set for a scope role, then the role doesn't provide the permission even though the UI suggests implicitly selects it.As a work around, I had to uncheck the permission for the authenticated user, check the permission for the role, then recheck the permission for the authenticated user.
- Status changed to RTBC
about 1 year ago 11:36pm 3 December 2023 - First commit to issue fork.
-
bojan_dev β
committed bb0965bf on 6.0.x authored by
paul121 β
Issue #3397590: Add method to check if scope has permission
-
bojan_dev β
committed bb0965bf on 6.0.x authored by
paul121 β
- Status changed to Fixed
12 months ago 10:49am 26 December 2023 - π³π±Netherlands bojan_dev
Thanks @paul121, this is a nice improvement.
FYI: I have removed the
Oauth2ScopeProviderInterface::getFlattenPermissionTree
method (which is redundant now), updated the tests and fixed some coding standard/deprecations errors. Automatically closed - issue fixed for 2 weeks with no activity.