-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🌟 Community Feature Challenge: Software Development Lifecycle 🌟 #4
Comments
/bounty 200 |
💎 $200 bounty • gemanor💎 $200 bounty • Permit.ioSteps to solve:
Thank you for contributing to permitio/permit-cli! Add a bounty • Share on socials
|
/attempt #4 How It Works:
BENEFITS |
@lota02: We appreciate your enthusiasm but since you already have 3 active bounty attempts, we're going to keep this open for other contributors to attempt. 🫡 |
/attempt #4 Options |
Hi @gemanor I have a couple of questions.
|
Feature Proposal: "Automated Policy Validation and CI/CD Integration for Fine-Grained Authorization"How it would work:
Implementation Roadmap:
Why would it be valuable:
Outcome: Options |
We tried to have each issue in a different category. This is why we created multiple bounties.
Since the submitter and the solver would be the same person, we measure it by relevancy to the community. If someone feels their offer is too big/small for $200, they can break it to smaller content pieces.
Yeah, bounty is for implementation
It is a bug indeed |
For this one, we will go with @lota02 proposal, since @bhavuk2002 shows some gap in understanding the way Permit.io works. @lota - please share here your plan and detailed implementation, so I can assign you to the issue. |
Related to permitio#4 Add CI/CD integration feature within the Permit CLI for automated deployment and testing of fine-grained authorization policies. * **New Commands**: - Implement `permit deploy <policy-file>` command in `source/commands/deploy.tsx` for automated policy deployment. - Implement `permit test <policy-file>` command in `source/commands/test.tsx` for automated policy testing. * **Documentation**: - Update `README.md` to include documentation for the new `permit deploy` and `permit test` commands. * **CI/CD Workflows**: - Update `.github/workflows/node.js.yml` to include steps for running `permit deploy` and `permit test` commands. - Update `.github/workflows/npm-publish.yml` to include steps for running `permit deploy` and `permit test` commands. * **Webhook Support**: - Implement webhook support in `source/lib/webhook.ts` for triggering policy validation and deployment processes upon code changes.
/attempt #4 Submitted by: Felicien Feature Idea: Integrated Authorization Gates in CI/CD Pipelines Overview Enhance the Permit CLI by introducing Authorization Gates that can be seamlessly integrated into various stages of the Software Development Lifecycle (SDLC). These gates will enforce fine-grained authorization policies automatically during code commits, builds, deployments, and runtime operations, ensuring that security and compliance are maintained without disrupting the development flow. How It Works
Why It’s Valuable
Implementation Steps
Conclusion Integrating Authorization Gates into the Permit CLI’s SDLC workflow offers a robust solution for managing fine-grained access controls throughout the development lifecycle. This feature not only enhances security and compliance but also streamlines the development process, making it an invaluable addition to the Permit CLI toolkit. Looking forward to the community’s feedback and collaboration to bring this feature to life! 🚀 Vote for this proposal to help shape the future of Permit CLI’s integration with the Software Development Lifecycle and Authorization!
|
Need some new way to integrate authorization with your SDLC? Do you feel like you can have better CI/CD for fine-grained authorization? This is one of our 10 community feature challenges, and we want your input on how we can enhance the Permit CLI in the area of Software Development Lifecycle and Authorization. This is a space for you to share your ideas on what would make this part of the CLI even better!
How to Participate
Why Join In?
What’s Next?
We’ll keep this challenge open for proposals and upvotes until November 10th, 2024. Once the top idea is chosen, we’ll update this issue with details on the bounty and the next steps for development.
Thank you for helping us make the Permit CLI even better. We can’t wait to see what you come up with! 🌟
The text was updated successfully, but these errors were encountered: