Uploaded image for project: 'Isis'
  1. Isis
  2. ISIS-2700

If no members visible for type, then veto viewing of _instances_ of that type.

    XMLWordPrintableJSON

    Details

      Description

      To summarise what's to be done here:

      • we already have a HiddenObjectFacet (currently derived from a "hidden()" method on the object itself) that can be installed on the ObjectSpecification.  Make it a viewer responsibility that if this exists, hide any collections for that ObjectSpecification.
      • create a further implementation for this facet that is derived from the set of permissions : if all props are invisible, infer that the object as a whole is.
      • as belt-n-braces, implement a general tenancy evaluator that hides an object if its ObjectSpecification has this facet.
      • similar to the work done in ISIS-2701, we'll should also introduce an `ApplicationUser_effectiveTypePermissions` mixin to surface this computed set.   Only secman admins should be able to see this collection.

       

      some of the discussion leading to this outcome below (and for the original discussion, see https://the-asf.slack.com/archives/CFC42LWBV/p1621939985113300 )

      ~~~~~~~~~~~~~~~

      A permission that vetoes the viewing of a type (such as in the example below) is not fully honored. In this concrete case a user that is being assigned a role with this permission (and no other roles with any permission that would contradict this permission) could still navigate to an entity page of a ApplicationUser and would see the title and the the icon and perhaps an empty metadata tab.

      The desired behavior would be the display of an error message saying "Not authorized or no such object".

       

       

      This is a screenshot of how the vetoed entity page presents to the user:

       

        Attachments

        1. image-2021-05-26-15-20-31-139.png
          7 kB
          Martin Hesse
        2. image-2021-05-26-15-18-02-115.png
          43 kB
          Martin Hesse

          Activity

            People

            • Assignee:
              danhaywood Daniel Keir Haywood
              Reporter:
              mwhesse Martin Hesse
            • Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: