-
Notifications
You must be signed in to change notification settings - Fork 177
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTTP super user route called even if ACL yet defined in file backend #332
Comments
Sadly, unless you disable super user checks for http backend or globally, you'll get this behavior because checking an ACL first loops through superuser enabled backends to check for it, and then loops through backends to check the ACL. I could add an option to instead of checking superuser for all backends and then acl for them, looping through backends and checking superuser and acl individually on them before trying next backend. But that's not implemented right now, so the short answer is the first comment: only way is to disable super user checks for http or generally. |
Thanks for your prompt reply @iegomez! Having an option to check superuser and ACL at the same time would be perfect. Is there any way to sponsor the feature? |
Inverting the loop logic on a flag should be simple enough to implement, the only caveat is that I need to introduce ordering to backends as well. |
Hi,
First I would like to thank you for your very useful authentication system!
I'm using it with 2 backends:
file
andhttp
.I have a user created in the
file
backend.I added an equivalent of super user to this user using the following ACL file rule:
When this user connects, the
super user
route on thehttp
backend is always called.I think this is not the expected behavior as the user is yet a super user.
Is there a way to avoid this situation?
My problem is that it overloads the
http
backend unnecessarily.Thanks,
Adrien
The text was updated successfully, but these errors were encountered: