-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Simplified acl check for a user #561
Comments
A slight tweak/suggestion...
Should it handle group names too? hmmm. not sure the use case... |
I don't think a clear use-case exists, but we might have to allow that someone will eventually pass a group name in through the |
Also: I am thinking the Please correct my assumption here if false! |
Yes, I think |
Can a SpecificQuery be put together to accomplish this in one or two calls? I imagine leaning on the database for this will be significantly more efficient than making multiple iRODS API calls. |
I imagine we'd have it standard -indexable by name, yes? - and baked in to the server. Yes it would probaby be more efficient. |
Correct. First, we prove a SpecificQuery can be developed to satisfy (or help satisfy) the requirement. If we succeed, then the SpecificQuery is added to the next release of the iRODS server, making it available to all clients. |
Is it likely to have different text between the different DB flavors, or is this a standard enough query that one specific query string would do for all the dialects? |
I'm not sure off the top of my head. My guess is there are a few ways to approach the query.
We have to investigate the space. |
Going off of my last comment, I think we need to think about how to best approach this. Bumping until we have a better grasp on the possible solutions. |
Feature:
It would have been useful to have a relevant method that will return a True/False in access manager to check easily a given user's access level on an object (data objects, collections?). Say I have an object and the user A has the "read" access on it and the group A (the user A is member of) has the "own" access. In order to know whether the user A has the "own" access I need to query the group A. If there are more group based permissions available, then I need to query each of them. Also I need to check the user name's access level.
what is needed might be something like:
session.acls.check_user_acl("bob", "own", "path/to/object")
I have this solution below for a specific need, but I think it might be useful to have a functionality that will work for each access type and for each entity.
The text was updated successfully, but these errors were encountered: