Dear iRODS Consortium,
I am writing to better understand the permission requirements for rename/move operations and metadata modifications in iRODS 5.0.1.
From our testing, we have observed the following:
- Rename/move operations appear to require ownership (as noted in GitHub issue https://github.com/irods/irods/issues/6400). This prevents users with standard permissions from renaming objects or collections.
- Metadata (AVU) modifications require elevated privileges (modify_object).
We are developing a web application in which users can create collections, upload files, and manage their own data. In this context, requiring “own” permission for simple operations such as renaming is a significant limitation, as granting ownership also allows ACL modification, which is not always desirable.
We would appreciate your guidance on the following:
- Are there recommended patterns or best practices to enable safe rename/move operations without granting full ownership?
- Are there any plans or a tentative timeline to address or improve this behavior for both rename/move operations and metadata modifications?
These aspects have a strong impact on our application design.
Best regards,
Laura
--
--
The Integrated Rule-Oriented Data System (iRODS) - https://irods.org
iROD-Chat: http://groups.google.com/group/iROD-Chat
---
You received this message because you are subscribed to the Google Groups "iRODS-Chat" group.
To unsubscribe from this group and stop receiving emails from it, send an email to irod-chat+...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/irod-chat/15768a09-4369-4db2-be16-6a3ec2d12bb4n%40googlegroups.com.
Dear Terrell,
thank you for your suggestions.
Unfortunately, the deny list approach is not feasible for us. Our setup relies on duplicated groups (owners/users per research line), where owners can also manage permissions with fine granularity. This would make deny lists complex and hard to maintain. For similar reasons, restricting the ability to manage permissions would also not work well in our case, as it would interfere with operations that our group owners need to perform.
The only viable option we see is to use a service account with admin privileges to perform rename operations on behalf of users, with appropriate checks at the permissions level.
Do you see any drawbacks with this approach, or would you recommend an alternative?
Best regards,
Laura
To view this discussion visit https://groups.google.com/d/msgid/irod-chat/CAFaqteY0%3DPK-VpwbZN7%3DfOiLwS14-y79ke6Op7vuwm1PdSvhwQ%40mail.gmail.com.