To unsubscribe from this group and stop receiving emails from it, send an email to vcap-dev+u...@cloudfoundry.org.
Looks good Scott. Though I don't have a big issue with the current user roles. I do have issue with bugs and apparent lack of consistency in the current roles. So, if redefining the roles helps to fix and provides a test suite for the roles in the cloud controller then I'm all for it. :)I cannot comment on the document so here are some thoughts:
* Have you considered just making Org Owner a space manager of all spaces in the org also? It seems a bit odd that you would require the org owner to give himself Space Developer or Manager access to do stuff in a space. This could also simplify access for simple orgs where one or two person just do everything. Wouldn't the justification to merge Space manager and space developer apply to Org Owner as well?
* I would like special rules for service binding credentials. At the very least service binding credentials shouldn't be accessible to Org or Space Viewers from the UI or a CC service invocation. But, the Space Viewer should have access to apps and what services are bound to that app. https://groups.google.com/a/cloudfoundry.org/d/msg/vcap-dev/W_0jaAJV2j0/m5BndGPl8SoJ
* Any particular reason why a space viewer cannot see files? I can see a reason to remove file access if env.log exists. But I'd like to see env.log go away. If env.log goes away is there a reason to restrict "files" access?
* It would be nice if a Space Viewer could see "env" but not env values.
* Should Org members be able to see all quotas? Or just the one currently assigned to them?
* Should Org members be able to see all quotas? Or just the one currently assigned to them?
the api endpoint for all quotas is currently open to any user with a valid OAuth token. the only reason i can think of to not have it open is that you may not want some depts to get jealous of another depts quota. that's really stretching things in my view. seems fine to keep it open.
$ cf curl /v2/quota_definitions
{
"total_results": 6,
"total_pages": 1,
"prev_url": null,
"next_url": null,
"resources": [
{
"metadata": {
"guid": "8c4b4554-b43b-4673-ac93-3fc232896f0b",
"url": "/v2/quota_definitions/8c4b4554-b43b-4673-ac93-3fc232896f0b",
"created_at": "2013-11-19T18:53:48+00:00",
"updated_at": "2013-11-19T19:34:57+00:00"
},
"entity": {
"name": "free",
"non_basic_services_allowed": false,
"total_services": 0,
"total_routes": 1000,
"memory_limit": 0,
"trial_db_allowed": false
}
},
{
"metadata": {
"guid": "7dbdcbb7-edb6-4246-a217-2031a75388f7",
"url": "/v2/quota_definitions/7dbdcbb7-edb6-4246-a217-2031a75388f7",
"created_at": "2013-11-19T18:53:48+00:00",
"updated_at": "2013-11-19T19:34:57+00:00"
},
"entity": {
"name": "paid",
"non_basic_services_allowed": true,
"total_services": -1,
"total_routes": 1000,
"memory_limit": 10240,
"trial_db_allowed": false
}
},
{
"metadata": {
"guid": "2228e712-7b0c-4b65-899c-0fc599063e35",
"url": "/v2/quota_definitions/2228e712-7b0c-4b65-899c-0fc599063e35",
"created_at": "2013-11-19T18:53:48+00:00",
"updated_at": "2014-01-13T18:25:49+00:00"
},
"entity": {
"name": "runaway",
"non_basic_services_allowed": true,
"total_services": -1,
"total_routes": 1000,
"memory_limit": 153600,
"trial_db_allowed": false
}
},
{
"metadata": {
"guid": "b72b1acb-ff4f-468d-99c0-05cd91012b62",
"url": "/v2/quota_definitions/b72b1acb-ff4f-468d-99c0-05cd91012b62",
"created_at": "2013-11-19T18:53:48+00:00",
"updated_at": "2013-11-19T19:34:57+00:00"
},
"entity": {
"name": "trial",
"non_basic_services_allowed": false,
"total_services": 10,
"total_routes": 1000,
"memory_limit": 2048,
"trial_db_allowed": false
}
},
{
"metadata": {
"guid": "39d630ba-66d6-4f6d-ba4e-8d45a05e99c4",
"url": "/v2/quota_definitions/39d630ba-66d6-4f6d-ba4e-8d45a05e99c4",
"created_at": "2014-01-23T20:03:27+00:00",
"updated_at": null
},
"entity": {
"name": "25GB",
"non_basic_services_allowed": true,
"total_services": -1,
"total_routes": 1000,
"memory_limit": 25600,
"trial_db_allowed": false
}
},
{
"metadata": {
"guid": "81226624-9e5a-4616-9b9c-6ab14aac2a03",
"url": "/v2/quota_definitions/81226624-9e5a-4616-9b9c-6ab14aac2a03",
"created_at": "2014-03-11T00:13:21+00:00",
"updated_at": "2014-03-19T17:36:32+00:00"
},
"entity": {
"name": "25GB:30free",
"non_basic_services_allowed": false,
"total_services": 30,
"total_routes": 1000,
"memory_limit": 25600,
"trial_db_allowed": false
}
}
]
}
I just checked again that the sharing settings allow anyone with the link to comment. lmk if you're still having trouble.
There is a certain symmetry in saying that Org Owner is also a Space Owner in all spaces, and likewise, Org Viewer is also a Space Viewer in all spaces. Anyone object to that?
There's definitely a level of detail missing in the spreadsheet. A Space Viewer should be able to 'see' high-level details about apps and services, but nothing sensitive like credentials and env values (to your point below). That would solve your issue here, correct?
* Have you considered just making Org Owner a space manager of all spaces in the org also? It seems a bit odd that you would require the org owner to give himself Space Developer or Manager access to do stuff in a space. This could also simplify access for simple orgs where one or two person just do everything. Wouldn't the justification to merge Space manager and space developer apply to Org Owner as well?I hadn't considered that, Mike, but I can see the rationale. It does go against my goal of differentiating orgs and spaces. Perhaps I pushed the 'manager' metaphor to far on the Org Manager role...There is a certain symmetry in saying that Org Owner is also a Space Owner in all spaces, and likewise, Org Viewer is also a Space Viewer in all spaces. Anyone object to that?
* Any particular reason why a space viewer cannot see files? I can see a reason to remove file access if env.log exists. But I'd like to see env.log go away. If env.log goes away is there a reason to restrict "files" access?Makes sense. I added files to the Space Viewer role.
* Should Org members be able to see all quotas? Or just the one currently assigned to them?Hmm, I can't think of a reason why not. Anyone object to that?
On 30/03/2014, at 6:42 pm, Scott Truitt <str...@gopivotal.com> wrote:* Have you considered just making Org Owner a space manager of all spaces in the org also? It seems a bit odd that you would require the org owner to give himself Space Developer or Manager access to do stuff in a space. This could also simplify access for simple orgs where one or two person just do everything. Wouldn't the justification to merge Space manager and space developer apply to Org Owner as well?
I hadn't considered that, Mike, but I can see the rationale. It does go against my goal of differentiating orgs and spaces. Perhaps I pushed the 'manager' metaphor to far on the Org Manager role...There is a certain symmetry in saying that Org Owner is also a Space Owner in all spaces, and likewise, Org Viewer is also a Space Viewer in all spaces. Anyone object to that?From what I understood you Scott, they would still be two distinct roles, but Org Owners would imply Space Owners (on all spaces) and that means a user can still be given solely Space Owner on a single space (without having the ability to create other spaces) - correct?The original Org Manager role allowed for an “administration” person to be assigned a somewhat high level role, which allowed them to manage the organisation (billing, users, etc), without having access to the Apps… I can still imagine that being needed across enterprises…
* Any particular reason why a space viewer cannot see files? I can see a reason to remove file access if env.log exists. But I'd like to see env.log go away. If env.log goes away is there a reason to restrict "files" access?Makes sense. I added files to the Space Viewer role.Does that mean file contents as well? Certain files may contain sensitive information.
* Should Org members be able to see all quotas? Or just the one currently assigned to them?Hmm, I can't think of a reason why not. Anyone object to that?Personally, I can imagine a scenario where ’special quotas’ have been created and applied to specific Orgs, that isn’t publicly available - having them visible could be problematic.I think the more useful information for an Org (member or otherwise), would be to see things like which quota is assigned to the Org, and how much of it is used up, or being able to set their own quotas.But I understand thats beyond the scope of this conversation.
-- Neto
The original Org Manager role allowed for an “administration” person to be assigned a somewhat high level role, which allowed them to manage the organisation (billing, users, etc), without having access to the Apps… I can still imagine that being needed across enterprises…