-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Database sharing and access control #281
Comments
I think we should combine forking and querying, if someone can fork the database then they can run read-only queries as well :) |
Definitely before we have forking support and support for varying memory/CPU for different databases, I agree. :) The reason I was thinking someone might want to give fork read-only access but not query read-only access is because queries take up resources on your running database, whereas forking doesn't. So perhaps in the future when you want someone to look at your dataset but don't want them to use up your CPU running queries, you can say "fork my dataset and let me know what you find!" without having to worry about beefing up your own running database. Definitely not something we have to worry about for a while :). |
Working on this next! Came up with a rough outline of a plan in the issue description! |
SQLite data models work, and started on Rust data models. For next time
|
|
Done
Next
|
Reworked plan to be endpoint-focused (e.g., expose public sharing first) rather than layer-focused (e.g., implementing all DB functionality first, but no endpoints are exposed). First up: Add endpoint to support updates to a database's public sharing level. Make this a generic update_database endpoint. Permissions: must be manager or owner. |
Almost done with endpoint to update public sharing level. Next
|
Server-side support for public sharing level updates done. Started writing end-to-end tests. Next
|
Next up:
|
List and query logic and tests are all set (exposed to the query and entity details endpoints, passed through properly to rusqlite). Next
|
Merged working support for fork/read-only public sharing level! Next
|
Wrote up documentation for both public sharing level and entity-level permissions. Next
|
Database-/endpoint-/CLI-level support for sharing is implemented (but untested) on branch
|
Rough description
A database owner should be able to allow other users/entities to have following levels of access
A database owner should also be able to control whether the public can have various forms of read-only access
The plan
no_access
removes the row if it exists. Permissions: must be manager or owner, managers can't change owner permissions.The text was updated successfully, but these errors were encountered: