Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add launch-only property for project users #413

Closed

Conversation

strangeman
Copy link
Contributor

Fix for #344

The solution may be not ideal - I just added separate launch_only property, so the user may have project admin rights and not be able to edit task templates. :)
On the other hand, this is may be useful to prevent accidental editing/deletion of templates (project admin can add/remove launch_only property for himself).

Also (please, move it to separate issue, if needed) we need to rewrite system user or project user code. Currently, they contain a similar logic (admin and ordinary user UI, various rights checks), but a very different implementation.

@twhiston
Copy link
Contributor

twhiston commented Feb 16, 2018

surely an admin should always be able to do everything? (this is the definition of an admin I would say). Perhaps this could be the basis of a general discussion about more granular user permissions

@n3rV3
Copy link

n3rV3 commented Mar 8, 2018

I am thinking of using Semaphore in a project. But, the restriction is that I will be deploying Semaphore in a different team's infra(with help from their admin/devops). They won't be happy if I have the ability to run/edit/update everything. But with this feature, I can have limited access and push only the changes I am authorized to do.

Their admins will be happy with the control, and I will have only as much access as i need(run tasks/playbooks).

@twhiston
Copy link
Contributor

twhiston commented Mar 8, 2018

I totally hear your use case here, and i agree that it would be good to have, the question is if we put just this in now (as it touches a lot of files) or we try to look at a more fully featured and granular permissions system that will allow us to go deeper with permissions in future.
@strangeman what are your thoughts?

@strangeman
Copy link
Contributor Author

We need to invest in the more clear solution. This was a kind of dirty hack because I had no time for the proper solution. But currently, the project had active maintainers and we can do it much better. I think this is the good milestone for 2.6 or 2.7.

@twhiston
Copy link
Contributor

twhiston commented Mar 10, 2018

I'm going to close this PR then and we can use #344 as the issue to deal with this in a more fully featured way

@twhiston twhiston closed this Mar 10, 2018
@strangeman strangeman deleted the 344-launch-only-role branch October 22, 2018 12:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants