-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rework how tenant admin works #1
Comments
You should be able to grant 'authenticated' to your postgres role and it should then be able to do whatever that role can do. |
After a short research, I'm starting to think that using custom Postgres roles, might not be the best way to proceed. @GaryAustin1 , In the referred chat, you mentioned that
Do you still believe it? Shall I continue using References: |
I would say if you know postgres well you have a better shot of dealing with things if something is changed by Supabase. I was discouraging that user because they did not seem to understand grants and privileges with postgres roles. Using this method relies on Supabase granting postgres role certain privileges (which they have done after they broke it), but that is also needed for test jwt RLS in the SQL editor so may not have been done for the issue in your github link). I doubt role column will change or be unavailable though. PostgREST itself is probably fine as it uses that without Supabase. |
Currently, the tenant-admin is defined by setting
auth.users.raw_app_metadata
toThat works, but I was thinking that it might be better to create a "tenant_admin" postgresql role. And add it to
auth.users.role
column. This looks like a more native approach. However, if I create this role, it will not have access like the standard users.And I'm not a PostgreSQL expert. Is this really a better way of doing it? What do you think?
The text was updated successfully, but these errors were encountered: