-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move HTTP Permissions and Roles policies from build-time to runtime #36874
Move HTTP Permissions and Roles policies from build-time to runtime #36874
Conversation
🎊 PR Preview fded7c0 has been successfully built and deployed to https://quarkus-pr-main-36874-preview.surge.sh/version/main/guides/ |
This comment has been minimized.
This comment has been minimized.
dda1ea1
to
c840758
Compare
docs/src/main/asciidoc/security-authorize-web-endpoints-reference.adoc
Outdated
Show resolved
Hide resolved
c840758
to
e32e52e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've looked through and it looks perfect, but I'll need a few more iterations to make sure I follow it. Thanks Michal, nicely researched and done
@stuartwdouglas This is a very important PR done by Michal, have a look if you get a chance, LGTM but I haven't looked very deeply yet |
@michalvavrik So what do you think about making the named policy concept realized in a follow up PR ? I recommend but not insist, IMHO it would be better - it is an independent enhancement of its own. I'll let you decide |
Problem is that we don't know whether someone else is not using
If you let me decide, then I think because of the |
This comment has been minimized.
This comment has been minimized.
@michalvavrik Thanks, I'd find it easier to isolate the changes related to the configuration scope only if the named policy enhancement was done in another PR, it is hard to be certain otherwise if a given change is related to the move to the runtime scope or the named policy update |
e32e52e
to
19ce35f
Compare
✔️ The latest workflow run for the pull request has completed successfully. It should be safe to merge provided you have a look at the other checks in the summary. |
I don't see anything concerning now, fine PR, important enhancement, lets have it settled a bit in 3.6.0 CR1 |
HTTP Permissions and Roles policies have been moved from build-time to runtime. See PR quarkusio/quarkus#36874 Signed-off-by: Sebastian Veit <[email protected]>
HTTP Permissions and Roles policies have been moved from build-time to runtime. See PR quarkusio/quarkus#36874 Signed-off-by: Sebastian Veit <[email protected]>
fixes: #12594