rsinger86/drf-access-policy
Declarative access policies/permissions modeled after AWS' IAM policies.
PythonMIT
Issues
- 0
Bug Report: deny Effect Always Returns True Regardless of Conditions
#104 opened by AlexandrVasilchuk - 1
How to apply access policies to class based views
#103 opened by noemiefedon - 0
Inconsistent expression parsing
#102 opened by michal-klimek - 5
scope_queryset not working
#43 opened by hardntrash - 1
- 1
Can I write all policies in one json file?
#101 opened by puraminy - 1
Documentation webpage doesn't work
#96 opened by jeluengasm - 2
- 1
- 3
- 1
- 1
- 3
- 0
Support db statements
#85 opened by syifarahmat - 1
Why "principal: authenticated" is "not anonymous" instead of "is authenticated"?
#80 opened by danyi1212 - 1
- 1
- 0
Reusable conditions not working
#79 opened by JupiterThreads - 4
Support dynamic response message and code
#45 opened by Char2sGu - 6
[BUG] bool type error
#66 opened by HonakerM - 2
Introduction of support for condition expressions is a breaking change on existing condition strings
#55 opened by ajcsimons - 2
Response philosophy based on type of failure
#31 opened by lorinkoz - 0
Default value "effect": "allow"
#51 opened by BarnabasSzabolcs - 1
Thanks for writing this library ❤️
#12 opened by simkimsia - 1
- 0
- 3
Allow OR operation for the condition statement
#39 opened by tanonl - 0
- 2
Can i use it on generic api views ?
#37 opened by mmohajer9 - 1
user.id error
#32 opened by InzGIBA - 0
- 4
- 4
get_user_group_values is not efficient
#24 opened by filwaline - 1
- 2
URL path variable in custom condition
#19 opened by tobiasge - 0
- 1
- 1
- 9
Check anonymous user
#4 opened by bogdandm - 0
- 1
- 0
Object level permissions
#2 opened by bogdandm