issue_comments
15 rows where author_association = "OWNER" and "updated_at" is on date 2020-06-07 sorted by updated_at descending
This data as json, CSV (advanced)
Suggested facets: issue_url, created_at (date)
id | html_url | issue_url | node_id | user | created_at | updated_at ▲ | author_association | body | reactions | issue | performed_via_github_app |
---|---|---|---|---|---|---|---|---|---|---|---|
640287967 | https://github.com/simonw/datasette/issues/811#issuecomment-640287967 | https://api.github.com/repos/simonw/datasette/issues/811 | MDEyOklzc3VlQ29tbWVudDY0MDI4Nzk2Nw== | simonw 9599 | 2020-06-07T22:16:10Z | 2020-06-07T22:16:10Z | OWNER | The tests in test_permissions.py could check the .json variants and assert that permission checks were carried out too. |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Support "allow" block on root, databases and tables, not just queries 633578769 | |
640280741 | https://github.com/simonw/datasette/issues/395#issuecomment-640280741 | https://api.github.com/repos/simonw/datasette/issues/395 | MDEyOklzc3VlQ29tbWVudDY0MDI4MDc0MQ== | simonw 9599 | 2020-06-07T21:12:57Z | 2020-06-07T21:12:57Z | OWNER | This is a pattern I like:
|
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Find a cleaner pattern for fixtures with arguments 396215043 | |
640277775 | https://github.com/simonw/datasette/issues/801#issuecomment-640277775 | https://api.github.com/repos/simonw/datasette/issues/801 | MDEyOklzc3VlQ29tbWVudDY0MDI3Nzc3NQ== | simonw 9599 | 2020-06-07T20:49:40Z | 2020-06-07T20:49:40Z | OWNER | I'm going to pass the entire actor object as a dictionary of available named query parameters. So if the actor looks like this:
|
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
allow_by_query setting for configuring permissions with a SQL statement 631932926 | |
640277557 | https://github.com/simonw/datasette/issues/801#issuecomment-640277557 | https://api.github.com/repos/simonw/datasette/issues/801 | MDEyOklzc3VlQ29tbWVudDY0MDI3NzU1Nw== | simonw 9599 | 2020-06-07T20:48:00Z | 2020-06-07T20:48:00Z | OWNER | Now that I'm expanding permission checks to everything else too (#811), not just canned queries, I think it makes sense to re-prioritize this. |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
allow_by_query setting for configuring permissions with a SQL statement 631932926 | |
640274171 | https://github.com/simonw/datasette/issues/811#issuecomment-640274171 | https://api.github.com/repos/simonw/datasette/issues/811 | MDEyOklzc3VlQ29tbWVudDY0MDI3NDE3MQ== | simonw 9599 | 2020-06-07T20:21:14Z | 2020-06-07T20:21:14Z | OWNER | Next step: fix this
|
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Support "allow" block on root, databases and tables, not just queries 633578769 | |
640273945 | https://github.com/simonw/datasette/issues/811#issuecomment-640273945 | https://api.github.com/repos/simonw/datasette/issues/811 | MDEyOklzc3VlQ29tbWVudDY0MDI3Mzk0NQ== | simonw 9599 | 2020-06-07T20:19:15Z | 2020-06-07T20:19:15Z | OWNER | I'm going to add a |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Support "allow" block on root, databases and tables, not just queries 633578769 | |
640270178 | https://github.com/simonw/datasette/issues/811#issuecomment-640270178 | https://api.github.com/repos/simonw/datasette/issues/811 | MDEyOklzc3VlQ29tbWVudDY0MDI3MDE3OA== | simonw 9599 | 2020-06-07T19:48:39Z | 2020-06-07T19:48:39Z | OWNER | Testing pattern:
|
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Support "allow" block on root, databases and tables, not just queries 633578769 | |
640248972 | https://github.com/simonw/datasette/issues/811#issuecomment-640248972 | https://api.github.com/repos/simonw/datasette/issues/811 | MDEyOklzc3VlQ29tbWVudDY0MDI0ODk3Mg== | simonw 9599 | 2020-06-07T17:04:22Z | 2020-06-07T17:04:22Z | OWNER | I'll need a neat testing pattern for this. |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Support "allow" block on root, databases and tables, not just queries 633578769 | |
640248864 | https://github.com/simonw/datasette/issues/810#issuecomment-640248864 | https://api.github.com/repos/simonw/datasette/issues/810 | MDEyOklzc3VlQ29tbWVudDY0MDI0ODg2NA== | simonw 9599 | 2020-06-07T17:03:15Z | 2020-06-07T17:03:15Z | OWNER | This is obsoleted by #811. |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Refactor permission check for canned query 633066114 | |
640248669 | https://github.com/simonw/datasette/issues/811#issuecomment-640248669 | https://api.github.com/repos/simonw/datasette/issues/811 | MDEyOklzc3VlQ29tbWVudDY0MDI0ODY2OQ== | simonw 9599 | 2020-06-07T17:01:44Z | 2020-06-07T17:01:44Z | OWNER | If the allow block at the database level forbids access this needs to cascade down to the table, query and row levels as well. |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Support "allow" block on root, databases and tables, not just queries 633578769 | |
640121917 | https://github.com/simonw/datasette/issues/215#issuecomment-640121917 | https://api.github.com/repos/simonw/datasette/issues/215 | MDEyOklzc3VlQ29tbWVudDY0MDEyMTkxNw== | simonw 9599 | 2020-06-06T21:42:58Z | 2020-06-07T05:58:36Z | OWNER | I might use some dependency injection here, with Maybe a view function can take |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Allow plugins to define additional URL routes and views 314506669 | |
640160487 | https://github.com/simonw/datasette/issues/800#issuecomment-640160487 | https://api.github.com/repos/simonw/datasette/issues/800 | MDEyOklzc3VlQ29tbWVudDY0MDE2MDQ4Nw== | simonw 9599 | 2020-06-07T05:34:07Z | 2020-06-07T05:34:07Z | OWNER | See #810 for work to finish this. |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Canned query permissions mechanism 631931408 | |
640157216 | https://github.com/simonw/datasette/issues/808#issuecomment-640157216 | https://api.github.com/repos/simonw/datasette/issues/808 | MDEyOklzc3VlQ29tbWVudDY0MDE1NzIxNg== | simonw 9599 | 2020-06-07T04:58:40Z | 2020-06-07T04:58:40Z | OWNER | ... and I want a unit test which confirms that all permissions are documented. |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Permission check for every view in Datasette (plus docs) 632918799 | |
640152036 | https://github.com/simonw/datasette/issues/808#issuecomment-640152036 | https://api.github.com/repos/simonw/datasette/issues/808 | MDEyOklzc3VlQ29tbWVudDY0MDE1MjAzNg== | simonw 9599 | 2020-06-07T03:38:07Z | 2020-06-07T03:38:07Z | OWNER | I'm going to need to add permissions documentation for this. |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Permission check for every view in Datasette (plus docs) 632918799 | |
640135332 | https://github.com/simonw/datasette/issues/807#issuecomment-640135332 | https://api.github.com/repos/simonw/datasette/issues/807 | MDEyOklzc3VlQ29tbWVudDY0MDEzNTMzMg== | simonw 9599 | 2020-06-07T00:13:51Z | 2020-06-07T00:13:51Z | OWNER | These should not be shipped as the latest version on Docker Hub. They also should not become the "stable" release on ReadTheDocs. |
{ "total_count": 0, "+1": 0, "-1": 0, "laugh": 0, "hooray": 0, "confused": 0, "heart": 0, "rocket": 0, "eyes": 0 } |
Ability to ship alpha and beta releases 632843030 |
Advanced export
JSON shape: default, array, newline-delimited, object
CREATE TABLE [issue_comments] ( [html_url] TEXT, [issue_url] TEXT, [id] INTEGER PRIMARY KEY, [node_id] TEXT, [user] INTEGER REFERENCES [users]([id]), [created_at] TEXT, [updated_at] TEXT, [author_association] TEXT, [body] TEXT, [reactions] TEXT, [issue] INTEGER REFERENCES [issues]([id]) , [performed_via_github_app] TEXT); CREATE INDEX [idx_issue_comments_issue] ON [issue_comments] ([issue]); CREATE INDEX [idx_issue_comments_user] ON [issue_comments] ([user]);
issue 8