Dear iRODS Consortium,
I am writing to better understand the permission requirements for rename/move operations and metadata modifications in iRODS 5.0.1.
From our testing, we have observed the following:
- Rename/move operations appear to require ownership (as noted in GitHub issue https://github.com/irods/irods/issues/6400). This prevents users with standard permissions from renaming objects or collections.
- Metadata (AVU) modifications require elevated privileges (modify_object).
We are developing a web application in which users can create collections, upload files, and manage their own data. In this context, requiring “own” permission for simple operations such as renaming is a significant limitation, as granting ownership also allows ACL modification, which is not always desirable.
We would appreciate your guidance on the following:
- Are there recommended patterns or best practices to enable safe rename/move operations without granting full ownership?
- Are there any plans or a tentative timeline to address or improve this behavior for both rename/move operations and metadata modifications?
These aspects have a strong impact on our application design.
Best regards,
Laura
--
--
The Integrated Rule-Oriented Data System (iRODS) - https://irods.org
iROD-Chat: http://groups.google.com/group/iROD-Chat
---
You received this message because you are subscribed to the Google Groups "iRODS-Chat" group.
To unsubscribe from this group and stop receiving emails from it, send an email to irod-chat+...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/irod-chat/15768a09-4369-4db2-be16-6a3ec2d12bb4n%40googlegroups.com.
Dear Terrell,
thank you for your suggestions.
Unfortunately, the deny list approach is not feasible for us. Our setup relies on duplicated groups (owners/users per research line), where owners can also manage permissions with fine granularity. This would make deny lists complex and hard to maintain. For similar reasons, restricting the ability to manage permissions would also not work well in our case, as it would interfere with operations that our group owners need to perform.
The only viable option we see is to use a service account with admin privileges to perform rename operations on behalf of users, with appropriate checks at the permissions level.
Do you see any drawbacks with this approach, or would you recommend an alternative?
Best regards,
Laura
To view this discussion visit https://groups.google.com/d/msgid/irod-chat/CAFaqteY0%3DPK-VpwbZN7%3DfOiLwS14-y79ke6Op7vuwm1PdSvhwQ%40mail.gmail.com.
To view this discussion visit https://groups.google.com/d/msgid/irod-chat/VI1PR06MB892718E7187D77D86E047771822D2%40VI1PR06MB8927.eurprd06.prod.outlook.com.
To view this discussion visit https://groups.google.com/d/msgid/irod-chat/CAKCrKVi3gtY8xzkgadfiNrQRVuYhBTn2A6ME8dvaWy_0oc91qg%40mail.gmail.com.
Dear Terrell, Mustafa, all,
Thank you for the feedback and suggestions.
I have implemented the solution suggested by Mustafa, taking care to avoid leaving any temporary permissions in place after the operation completes.
This approach looks promising for our use case until a definitive fix is available, because by isolating the logic in the iRODS rules, we can support rename/move operations not only from our web UI, but also from other iRODS clients.
Many thanks to everyone for the useful discussion.
To view this discussion visit https://groups.google.com/d/msgid/irod-chat/CAFaqteYcmp2ff0JHdjyVFCAMowK-PDO1501EwDuNP0L%3D3R_Ckg%40mail.gmail.com.