-
-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Role-pointer column in CLP #3583
Comments
Any chance that this could be implemented? @flovilmart, seems like you implemented the pointer permissions, do you think that this would be possible? |
I believe that's possible, do you want to try implementing it? |
I don't have experience with implementing parse server, I am implementing cloud code functions in javascript for my app, but have no experience with Node.js and parse-server project at all. I am not sure if I could make it :-/ What do you think? Would you give me some hints, maybe? |
@rihadavid I didn't have much a few months ago, and I was able to do a few small but incremental PRs in the past just by trying it and going over the project. Maybe take a look at the User pointer CLP, it might give you some direction; and I'm pretty sure @flovilmart can help you giving some hints also. |
So, I finally decided to try to implement this. I have ran into two problems.
If it really is a bad idea using Roles for 'followers model', then I will probably not need this CLP-Role-Pointer feature at all. What do you think? |
So, if I understand correctly, for your use case, you'd like that a column 'role' in your object would define what role to allow read/writes. As you mention, we usually mark roles with their names and not their objectId, that's not too big to overcome, but may require a quite large refactor, or the column could be just identified by a string, the role name. That still implies that you write this role and have it alongside the objects. The design decision behind pointer permissions is that the user would be anyway in the object, so that would reuse the existing schema design to apply security on it. This ends-up being the same as writing the role name in the ACL, which works properly now. |
@flovilmart I am having a similar challenge as @rihadavid - I have a class in which I want public Get, but only a specific role may Find (and that role is different for each row). I see two solutions:
Are any of these realistic? Any suggestions on workarounds? (Right now I have find disabled in the CPL and instead have a cloud code function that returns the list when needed, but this kills a lot of the nice things with parse, live query in particular). |
We need to investigate properly the ability to use a role column as a pointer permission it seems. Are you willing to take a crack at it? |
I have never contributed to a project like this but it would be fun to try. Any pointers as to where I would start? Also I am guessing this would require edits to the parse-server implementation as well as the dashboard, are there any other places? To summarize, the issue is the level of control in the ACL vs the CPL: What you can set:
Who can be set:
Looks like either the ACL should be given the fine grained control of the CPL (which will probably break a lot or get a strange syntax) or the CPL should get the pointer to role (seems simpler to me). |
I would go for the CLP additions, this is not breaking and well understood as modeled upon the user pointer permissions. The core of the security logic would lie here. In this method we add the user permissiosn to the query, we should do the same with the roles.
What do you think? |
Makes sense - will try to find some time to give it a shot :) |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
@mullwaden @rihadavid If either of you have time it would be exciting to see this come to completion. I think it would be a very useful feature. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
i also need this! |
Thanks for opening this issue! |
Would it be possible to implement Role-pointer CLP permission?
Currently we can add a User-pointer column to CLP, but Role-pointer CLP is not allowed.
EXAMPLE:
In my CLP, I need to disable public Find, enable public Get and enable Find for certain Role. But each row has different Role that it should be visible for. It would be solved with a Role-pointer column CLP, but CLP does not allow me to add Role-pointer column.
It seems to my that it might be easy to implement, since Role CLP is possible (just allowing the pointer..). Unfortunately I can't do it by myself, my skills in js are not that good.
The text was updated successfully, but these errors were encountered: