Related to palkan/action_policy#89 and #22.
Let's think about how we can use policies to authorize mutations inputs (and, probably, resolvers in general). What are the possible use-cases? I can recall a few:
- Making some input fields or arguments non-public (maybe, we can re-use
authorize_field: here?), for example, available only to admins/managers/etc.
- Checking the arguments/input fields values for access rights, e.g., when a user provide an associated object ID as a part of the payload.
The goal of this ticket is to discuss how a general approach could look like, collect examples (and convert them into test cases), design the API.
Related to palkan/action_policy#89 and #22.
Let's think about how we can use policies to authorize mutations inputs (and, probably, resolvers in general). What are the possible use-cases? I can recall a few:
authorize_field:here?), for example, available only to admins/managers/etc.The goal of this ticket is to discuss how a general approach could look like, collect examples (and convert them into test cases), design the API.