Skip to content

Conversation

@jjoyce0510
Copy link
Collaborator

@jjoyce0510 jjoyce0510 commented Sep 4, 2025

The problem is: Currently we have a default, but editable policy that grants all users to view all entity types.

However, often times admin users will disable this policy to restrict access to specific assets, domains, or glossary.
This however, disables user's ability to see entity types that really should be considered "public", making some features feel broken.

This PR introduces a new NON-EDITABLE policy that enables all users to view "public" entity types. This will prevent customers from shooting themselves in the foot by disabling other default policies.

Thanks to @acrylJonny for pointing this out!

@github-actions github-actions bot added the devops PR or Issue related to DataHub backend & deployment label Sep 4, 2025
@jjoyce0510 jjoyce0510 changed the title feat(policies): Add a new default policy for viewing "public feat(policies): Add a new default policy for viewing "public" entity types. Sep 4, 2025
@datahub-cyborg datahub-cyborg bot added the needs-review Label for PRs that need review from a maintainer. label Sep 4, 2025
@datahub-cyborg datahub-cyborg bot added pending-submitter-merge and removed needs-review Label for PRs that need review from a maintainer. labels Sep 4, 2025
Copy link
Collaborator

@pedro93 pedro93 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add documentation around this. We need to educate users on how to use and model policies correctly.

@jjoyce0510
Copy link
Collaborator Author

jjoyce0510 commented Sep 5, 2025

This is not end user facing. This is "good defaults" that need to be there to avoid confusing users.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

devops PR or Issue related to DataHub backend & deployment pending-submitter-merge

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants