feat+refactor: filtering of assigned resource groups in entitlements, filtering of groups in access control filter, refactor PerunRPC Adapter
- Entitlements claim sources now support specifying a resource attribute, which, if set and non-null on the Resource object, groups from this resource will not be considered for producing group-based entitlements. Use option
custom.claim.[claimName].source.groupEntitlementDisabledAttribute
to configure the attribute name and add the attribute name mapping (to LDAP, RPC names) into the resource attribute mappings file. - AccessControl filter (PerunAuthorizationFilter) now supports specifying a resource attribute, which, if set and non-null on the Resource object, groups from this resource will not be considered for controlling access. Use option
filter.[name].accessControlDisabledAttr
to configure the attribute name and add the attribute name mapping (to LDAP, RPC names) into the resource attribute mappings file. - Refactor the PerunRPC Adapter and extract strings as constants (methods, parameters, etc.)