-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handle anonymous user vs group during permission creation #352
Comments
I don't see the point in having this user at all if not for technical reason. |
Admin user vs group has the exact same situation, but the issue is hidden since user within admin group is granted full access regardless. So specific permissions added explicitly on the user does not change the result. For anonymous, I agree that the user could be removed altogether. |
Some use case that I identified. When we are NOT* logged in, we can do We could argue that, given we target "anonymous" user, there shouldn't be any difference between inherited group permission from the "anonymous" group (or even effective user permissions), since that user is supposed to ONLY have unique membership to that group, none other and not even any direct permission on the user. The biggest problem in this case really is that routes |
In how this is useful? I mean, why would I want more than my own permissions or my effective permissions? For me, having access to public permissions would be the same as wanting to know my inherited permissions from groupA. And as you pointed out, this require an admin level and I'm fine with it. |
For the end-user itself, it is not useful to have this information. At least I can't think of one. It is useful for an admin to quickly debug a deployed instance. Calling |
Ok I see. Given that the only use case relate to an admin. I think that when we'll be ready to adress this issue it should not be hard to provide an alternative to the admin. |
Originally posted by @dbyrns in #340 (comment)
As described in the docs and observed a few times, setting permissions to user
anonymous
is permitted, but often leads the wrong impression that the resource would become public. To do so, it is rather the groupanonymous
that must receive the permission.Since this mistake is easily encountered and produces results not matching expectations, we should try to think of a method to prevent this situation.
The biggest problem is that, technically,
anonymous
user is not special in any way compared to any other user. It is only created at startup for historical reasons (i.e.: when each user had their corresponding group named the same as their username), but more recent Magpie only requires theanonymous
group which is automatically applied to all users. Checking explicitly forMAGPIE_ANONYMOUS_USER
to block permission creation could create problematic situation where this was the intended user to apply the operation to.The text was updated successfully, but these errors were encountered: