-
Notifications
You must be signed in to change notification settings - Fork 0
Specify permission for service admin #342
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
specify additional privileges for service admins.
docs/API.md
Outdated
|
||
Users in the [service admin group](#service-admin-group) can read data from any project, and edit (read/update/delete) data in any project. | ||
|
||
Users belonging to a project can update/delete data of that project that are not global resources and that are not public. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Small rephrasing to avoid the "not":
Users belonging to a project can update/delete data of that project that are not global resources and that are not public. | |
Users belonging to a project can update/delete data of that project only if they are private. |
For confirmation, only the service admins should be allowed to update or delete public resources in a project? In that case we can say explicitly something like:
Global resources (not in a project) and public entities (in a project) can be updated only by service admins.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I changed it . I am not sure why the "in a project" / "not in a project" would matter. These should be editable only by service admin.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I was meaning that it should be clear that it applies to both the types of resources:
- globals (not in a project because they don't have authorized_project_id: e.g. species, strain...)
- public (in a project because they have authorized_project_id, but authorized_public is True: e.g. morphologies...)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I updated with a definition of global resource.
Are we good with the changes now ? |
* origin/main: Validate scale and build_category in circuit filter (#352) Add admin delete endpoints for all routers (#281) root routes should not require auth, make sure tests reflect this (#351) Specify permission for service admin (#342) Add assets in ValidationResultRead schema (#348) Fix transaction_per_migration in alembic (#346)
* origin/main: Add IonChannel and IonChannelRecording (#305) Add update endpoints for users (#347) Adds deterministic order fallback by entity id (#350) Validate scale and build_category in circuit filter (#352) Add admin delete endpoints for all routers (#281) root routes should not require auth, make sure tests reflect this (#351) Specify permission for service admin (#342) Add assets in ValidationResultRead schema (#348) Fix transaction_per_migration in alembic (#346) Add the ability to filter by name to IonChannelModel (#338)
No description provided.