@@ -22,7 +22,7 @@ impl SupersetOpaConfig {
2222 . full_document_url_from_config_map ( client, superset, None , OpaApiVersion :: V1 )
2323 . await ?;
2424
25- // striping package path from base url. Needed by CustomOpaSecurityManager. TODO: <Path/to/manager.py>
25+ // striping package path from base url. Needed by CustomOpaSecurityManager.
2626 let opa_base_url = match opa_config. package . clone ( ) {
2727 Some ( opa_package_name) => {
2828 let opa_path = format ! ( "/v1/data/{opa_package_name}" ) ;
@@ -38,24 +38,20 @@ impl SupersetOpaConfig {
3838 }
3939
4040 // Adding necessary configurations. Imports are solved in config.rs
41- // TODO: Currently: .unwrap_or_default() which ends in e.g. :
42- // CUSTOM_SECURITY_MANAGER = None => CUSTOM_SECURITY_MANAGER = ""
43- // Could be better if not set.
4441 pub fn as_config ( & self ) -> BTreeMap < String , Option < String > > {
4542 BTreeMap :: from ( [
4643 (
4744 "CUSTOM_SECURITY_MANAGER" . to_string ( ) ,
4845 Some ( "OpaSupersetSecurityManager" . to_string ( ) ) ,
4946 ) ,
5047 // This is now a PythonType::Expression. Makes it easy to find a default.
51- // only necessary when opa role mapping is activated, as the user
52- // has to have a role to be valid.
48+ // EnvOverrides are supported.
5349 (
5450 "AUTH_USER_REGISTRATION_ROLE" . to_string ( ) ,
5551 Some ( "os.getenv('AUTH_USER_REGISTRATION_ROLE', 'Public')" . to_string ( ) ) ,
5652 ) ,
5753 // There is no proper way to interfere this without changing e.g. CRD's.
58- // Thus, we go for an default and make it accessible through envOverrides .
54+ // EnvOverrides are supported .
5955 // TODO: Documentation
6056 (
6157 "STACKABLE_OPA_RULE" . to_string ( ) ,
0 commit comments