-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Permission issue #2934
Comments
Just tried with my NC29 test installation and followed your step. But actually user in group2 is able to delete. |
Hello, I tried a few things back and forth, but unfortunately to no avail. This error is causing major problems in our organization. Steps I have now taken
To narrow down the error further, I have done the following. 1 & 2 work as expected, but the error already occurs in 3., which is why I started the post. 1.
Result Users in the "Admin" group can see the "Images" folder // Users in the "All" group cannot // Users who are in the "Admin" group and in the "All" group at the same time can see the "Images" folder. >> Works 2.
Result Users in the "Admin" group can see the "Pictures" folder // Users in the "All" group can also see the "Pictures" folder // Users who are in the "Admin" group and in the "All" group at the same time can see the "Pictures" folder. >> Works 3.
Expectation: Users who are in the "Admin" and "All" groups at the same time should see the "Tablet" subfolder. So to speak, the "Admin" group's read permission should be higher than denying read rights to the "All" group. I suspect that the permissions are not being passed on to the subfolders correctly!? I hope I made it clear. |
I assume you are mixing up general Access rights via Admin settings and ACL. |
On the frist view I would say as expected. ACL deny does overwrite general permit. Try to add a ACL grant to read for Admin and double check again. Regarding displaying of inheritance, I think there's already an issue for this (probably also a fix). |
Please also double check whether your issue is a duplicate of #2812. |
Maybe related or even fixed by: #2870 |
Unfortunately, I have to disagree with you because the regulations are such that approvals override refusals.
I'll look at it tomorrow |
So I have no idea what has changed in Nextcloud 29 or in the Groupfolder app, but something is wrong here. According to the documentation, the allow right should override the deny right. This has worked for me in the past and we have been using Nextcloud since version 25. And from now on it no longer works without any changes to the rights. Maybe something has been messed up here? @#2902 What I can't find anywhere is what does |
I think this is the same issue as #2812 because in general, inherited "allow" permissions of a group A do not take precedence over explicit "deny" permissions of a different group B in the current folder while you are a member of both groups. This behaviour changed somewhere within the last year. |
@icewind1991 I would like to draw your attention to this thread. |
Once again some feature was added without documentation. You have to read through the description in the PR here: #2870 (comment). This should give you an idea what the new option is about. This was only added a few weeks ago and it seems like it has been backported to NC 26 to 29. |
I do not get it. Do I now have to set acl-inherit-per-user to true or false to restore the previous behavior or is that no longer possible? Such a change is totally annoying! |
To restore old ACLs (prior to Groupfolders versions 14.0.6, 15.3.3, 16.0.2 and 17.0.0), you need to set the This setting is the result of Nextcloud correcting a bug in Groupfolder. This bug was being exploited by many users (as it was not easy to identify). This correction therefore implies a change in the expected behavior of Groupfolder ACLs on the part of users who were exploiting this bug. (intentionally or not) To my knowledge, there is no documentation on this yet. Arawa plans to write one as soon as possible to provide a clear view of these changes and the impact of this new configuration. Damour Dorianne |
I have now executed the occ config:app:set groupfolders acl-inherit-per-user --value true. However, it doesn't work properly, here are 3 videos: User is in group "admin" & group "Alle" Video 1: General assignment of rights for groups, locking the "Tablet" folder for the "Alle" group, folder no longer visible even though users are also in the "admin" group Video 2. Inheritance should be basically on, but selected again, folder not visible. Video 3. "admin" group explicitly given read rights, folder not visible Video 4. Inheritance display error? In general, it seems to me that there is a bug with inheritance!? https://vimeo.com/947520766?share=copy EDIT: With Nextcloud Hub 8 (29.0.1 RC1) the display error (video 4) seems to have been resolved. |
Thanks, setting this to true re-activates the old behaviour. In the future, it would be good to document these changes since this is a critical permission behaviour and I think many people were locked out of folders due to this change. In general, old behaviour should have priority over activating a new critical permission behaviour for everybody by default. |
But the problem is not yet solved! True doesn't seem to perform the old behavior correctly see my post with the videos... The display error has been fixed but the folder still does not remain visible to the "admin" if the folder is locked for the "Everyone" group. |
!?!? |
Worked for me thx. |
Hi @Mululu , I don't know if your problem has been solved. Could you please tell me which version of the Group folders application you had installed when you wrote your comment containing the 4 videos? Could you also confirm that the “occ config:app:set groupfolders acl-inherit-per-user --value” parameter was set to “true”? The problems seen in the videos seem to be solved if the parameter is set to “true”. In video 1: I've reproduced the problem as best I can on an instance, and my user being in “admin” and “Alle” can see the “Tablet” folder after reloading. But if the “false” mode is activated for the new parameter, the result is that this same user can no longer see “Tablet” (in the case of inherited and manual rights, it's the manual right that takes priority when the mode is set to “wrong”). In video 2, my thoughts are similar: the manual “false” read right of “Alle” overrides the “true” read right of “admin” if the “occ config:app:set groupfolders acl-inherit-per-user --value” parameter is set to “false”. At “true”, “admin” should see the folder. The same applies to video 3. After various tests, I noticed that when the parameter “occ config:app:set groupfolders acl-inherit-per-user --value ”is set to :
I hope this will help you or others. |
@dorianne-arawa but a dash means |
I think you're right @level420 . It means inherited in both case. But it's inherited rights when you only click on the user or group in the advanced permission, and define nothing. I suppose the applying rule is taken from the group folder interface (nearest parent here) and the three rights (delete, share, write). The Files interface displays a dash, even if a right "true" or "false" applied. advanced permissions interface: Maybe those 2 links can help you too : #3067 and https://github.com/arawa/nextcloud-groupfolder-acl-flattener (trying to fix the dashed with script, but it's dedicated this is dedicated to the transition from the old version of GF without dashes to the new version with dashes, to be done in one time) |
Duplicate of #598 |
How to use GitHub
Steps to reproduce
Create a group folder and assign 2 groups.
Group 1 read, write
Group 2 read, write, delete
Try deleting folder with user in group 2
Expected behaviour
Users in group 2 should be able to delete
Actual behaviour
User from group 2 cannot delete because he is also in group 1 and is not allowed to delete group 1. The higher permission in this case, allowing deletion, should override the deletion note
Nextcloud Hub 8 (29.0.0)
The text was updated successfully, but these errors were encountered: