Skip to content
This repository has been archived by the owner on Jan 25, 2022. It is now read-only.

Why read permission of destination collection is forced to system.Everyone ? #55

Closed
leplatrem opened this issue Apr 13, 2016 · 6 comments
Labels

Comments

@leplatrem
Copy link
Contributor

/cc @almet @Natim ?

@almet
Copy link
Member

almet commented Apr 15, 2016

I don't understand the question: can you rephrase?

@leplatrem leplatrem changed the title Why read permission is forced everyone ? Why read permission of destination collection is forced to system.Everyone ? Apr 19, 2016
@leplatrem
Copy link
Contributor Author

@Natim
Copy link
Member

Natim commented Apr 19, 2016

This is because the way the signer works is to sign data that are public and read only to be cached by a CDN.

Today we do not have any other usecases but that's something we can change if needed.

@almet
Copy link
Member

almet commented Apr 19, 2016

I believe putting this in the configuration and defaulting to System.Everyone if nothing is set would be a good addition to the project.

If we want to go further, we could have "strategies" for the permission of the destination collection, but I don't think we need this just now.

@leplatrem
Copy link
Contributor Author

@Natim explained me that since we duplicate records in the destination collection, and since we don't want to duplicate permissions, a read permission is set on the parent destination.

We could also do nothing and leave that to the user during setup.

With the current state of the code, we might to add a warning in the readme :

The current implementation assumes the destination collection will be readable anonymously (See Kinto/kinto-signer#55)

@almet
Copy link
Member

almet commented Apr 19, 2016

"since we don't want to duplicate permissions" is not completely accurate. We actually don't want anyone to be able to write on the destination collection, but we do want to have people write to the origin collection, so the permission set is different (at least for the OneCRL project).

I agree with your proposed solution. I'll state clearly that it's easy to add a configuration option for this. If you need it, please don't hesitate to make a pull request :)

almet added a commit that referenced this issue May 4, 2016
Add mention about destination collection permissions (ref #55)
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

3 participants