Skip to content

Conversation

jdcourcol
Copy link
Contributor

No description provided.

docs/API.md Outdated

Users in the [service admin group](#service-admin-group) can read data from any project, and edit (read/update/delete) data in any project.

Users belonging to a project can update/delete data of that project that are not global resources and that are not public.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Small rephrasing to avoid the "not":

Suggested change
Users belonging to a project can update/delete data of that project that are not global resources and that are not public.
Users belonging to a project can update/delete data of that project only if they are private.

For confirmation, only the service admins should be allowed to update or delete public resources in a project? In that case we can say explicitly something like:

Global resources (not in a project) and public entities (in a project) can be updated only by service admins.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I changed it . I am not sure why the "in a project" / "not in a project" would matter. These should be editable only by service admin.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was meaning that it should be clear that it applies to both the types of resources:

  • globals (not in a project because they don't have authorized_project_id: e.g. species, strain...)
  • public (in a project because they have authorized_project_id, but authorized_public is True: e.g. morphologies...)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I updated with a definition of global resource.

@jdcourcol
Copy link
Contributor Author

Are we good with the changes now ?

@jdcourcol jdcourcol merged commit 69f1bf5 into main Sep 3, 2025
1 check passed
@jdcourcol jdcourcol deleted the specify_ACL branch September 3, 2025 09:11
GianlucaFicarelli added a commit that referenced this pull request Sep 5, 2025
…-model

* origin/main:
  root routes should not require auth, make sure tests reflect this (#351)
  Specify permission for service admin (#342)
GianlucaFicarelli added a commit that referenced this pull request Sep 11, 2025
* origin/main:
  Validate scale and build_category in circuit filter (#352)
  Add admin delete endpoints for all routers (#281)
  root routes should not require auth, make sure tests reflect this (#351)
  Specify permission for service admin (#342)
  Add assets in ValidationResultRead schema (#348)
  Fix transaction_per_migration in alembic (#346)
GianlucaFicarelli added a commit that referenced this pull request Sep 11, 2025
* origin/main:
  Add IonChannel and IonChannelRecording (#305)
  Add update endpoints for users (#347)
  Adds deterministic order fallback by entity id (#350)
  Validate scale and build_category in circuit filter (#352)
  Add admin delete endpoints for all routers (#281)
  root routes should not require auth, make sure tests reflect this (#351)
  Specify permission for service admin (#342)
  Add assets in ValidationResultRead schema (#348)
  Fix transaction_per_migration in alembic (#346)
  Add the ability to filter by name to IonChannelModel (#338)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants