Thank you for the good point, Martin.
I will take it into account.

Best regards
Dominic


2019년 7월 5일 (금) 오후 10:10, Martin Henke <martin.he...@web.de>님이 작성:

> Dominic,
>
> I would very much like to have this change introduced in a backward
> compatible fashion.
>
> In Detail:
> The default permissions should either keep the same behaviour as with the
> current code
> or better be configurable via Ansible in a way that he system behaves the
> same as before.
> If you decide for a schema change, the code should be handle existing
> actions with the existing behaviour.
>
> With being backward compatible there would be no need to introduce this
> change in a new EntitlementProvider implementation but can (and should)
> be placed in the (default) LocalEntitlement provider to have consistent
> code in the default configuration for Action creation (adding the access
> rights) and entitlement checking (reading the access rights).
>
> Thank you for driving this forward.,
> Martin
>
>
>
> > On 4. Jul 2019, at 17:12, Dominic Kim <style9...@gmail.com> wrote:
> >
> > Thank you for the feedback, James.
> >
> > I am thinking of implementing it with annotations.
> > For example, we would add a new annotation reserved by the system.
> > When an action is created, the default permission will be specified via
> the
> > annotation.
> >
> > When any request comes, a new EntitlementProvider will look for the
> > annotation and reject the request based on it.
> >
> > This is to minimize the action schema change.
> > But if it's ok to bear with the schema change, I am ok with adding one
> more
> > field in an action other than annotations or parameters.
> >
> > 2019년 7월 4일 (목) 오후 10:07, James Thomas <jthomas...@gmail.com>님이 작성:
> >
> >> Protecting accidental overwritting or deletion of actions would be a
> great
> >> feature. I like the suggestion and approach of using Unix-style
> >> permissions.
> >>
> >> On Thu, 4 Jul 2019 at 07:25, Dominic Kim <style9...@gmail.com> wrote:
> >>
> >>> Recently I discussed this:
> >>> https://github.com/apache/incubator-openwhisk/pull/4058 with my
> >>> colleagues.
> >>> That PR is to add a feature to protect actions from deletion by
> mistake.
> >>> That is a good suggestion and I think we can also include more
> >> generalized
> >>> way to handle the issue.
> >>>
> >>> For example, what we can expect about permission are as follows.
> >>>
> >>> 1. Action protection.
> >>> 2. Hide codes from the shared package.
> >>>
> >>> I am a bit faint but IIRC, Rodric suggested linux-like permission
> >>> management.
> >>>
> >>> Regarding number 1, we can achieve it with the permission, "Read / not
> >>> Write / Execute".
> >>> And with regared to number 2, we can also achieve it with the
> permission,
> >>> "not Read / not Write (this is the default of shared package action) /
> >>> Execute".
> >>>
> >>> If we apply linux-like permission to these cases, we can have two
> >> different
> >>> permission flags, one for owners, the other for users of shared
> packages.
> >>> Then actions can have permission information such as "71" or "51".
> >>> So "71" would mean the owner of an action can do "read/write/execute"
> it
> >>> but the one who uses the shared action would be able to do "not
> read/not
> >>> write/execute".
> >>> "51" would mean the owner can do "read/not write/execute".
> >>>
> >>> There might be more cases, but I believe we can deal with them in the
> >> same
> >>> way.
> >>> Any feedback or idea on this would be appreciated.
> >>>
> >>> Thanks
> >>> Best regards,
> >>> Dominic
> >>>
> >>
> >>
> >> --
> >> Regards,
> >> James Thomas
> >>
>
>

Reply via email to