Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

policy: evaluate wildcard matching strategy #11

Closed
aeneasr opened this issue May 20, 2018 · 1 comment
Closed

policy: evaluate wildcard matching strategy #11

aeneasr opened this issue May 20, 2018 · 1 comment
Labels
feat New feature or request.
Milestone

Comments

@aeneasr
Copy link
Member

aeneasr commented May 20, 2018

One issue with access control policies is that, at the moment, we have the burden of regular expression overhead. This implies that scalability is limited.

Most matches however require simple wildcard logic, like resources:* or users:*:emails. It should be explored if wildcard matches perform better in memory and in databases and decided if regexp matching will be replaced with wildcard matching, or at least complemented.

See ory/hydra#580

@aeneasr aeneasr added the feat New feature or request. label May 20, 2018
@aeneasr aeneasr added this to the unplanned milestone May 25, 2018
@aeneasr
Copy link
Member Author

aeneasr commented Dec 8, 2018

This is now resolved

@aeneasr aeneasr closed this as completed Dec 8, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feat New feature or request.
Projects
None yet
Development

No branches or pull requests

1 participant