permissions.rst 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. Permission system
  2. =================
  3. As the Modelverse runs as a service, and allows users to share models, permissions become required.
  4. We briefly introduce the permission system used in the Modelverse.
  5. As in the Modelverse everything is modelled explicitly, all permisions and meta-information about models is also modelled explicitly in the *core* model.
  6. This model is not readable to any user, but can be queried and altered through the provided set of operations.
  7. Model permissions
  8. -----------------
  9. First and foremost are the permissions on the models.
  10. When creating a new model with *model_add*, the model is by default only readable and writable for the creating user.
  11. All other users have neither read, nor write access unless explicitly granted by the creating user.
  12. Similar to UNIX permissions, we use numeric values to indicate permissions, in the form XYZ.
  13. X indicates the permissions of the owner itself.
  14. Y indicates the permissions of the owning group.
  15. Z indicates the permissions of all other users.
  16. The values can range from 0 to 2.
  17. 0 indicates that the model is not readable, nor writable.
  18. 1 indicates that the model is readable, but not writable.
  19. 2 indicates that the model is both readable and writable.
  20. As such, a model can have permission 210.
  21. This indicates that the owner can read and write the model, the owning group can open the model read-only, and all other users have no access at all to the model.
  22. Models can be queried for their permission information with the *model_list_full* operation::
  23. >>> model_list_full("models/petrinets/")
  24. [("my_pn", "user1", "group1", "200"),
  25. ("my_pn2", "user2", "group1", "210"),
  26. ("my_pn3", "user2", "group2", "210"),
  27. ("my_pn4", "user2", "group2", "211"),
  28. ...
  29. ]
  30. In this case, user1 can modify my_pn, as he is the owner (permission 2: read/write), read my_pn2, as he is a member of group1 (permission 1: read), and has no access to my_pn3, as he is neither owner, nor in the group (permission 0: none).
  31. All users can read my_pn4, independent of their group (permission 1: read).
  32. In future versions of the Modelverse, an additional *executable* permission can be added.
  33. This permission will be checked before executing the activity or process model.
  34. For now, read permissions are equal to execution permissions, although this will in the future not always be the case.
  35. Indeed, read permissions allows users to open the model and read its contents (i.e., see how it does it), whereas execution permission allows users to execute it (i.e., see what it does).
  36. Both are distinct: one might want users to execute an activity, but not see how it is implemented (e.g., for protection of intellectual property).
  37. Vice versa, one might want users to open activities as a model, but not execute them (e.g., if the user does not have permissions to execute code on the server).
  38. For user-specific information on which operations are permitted, the operation *read_permissions* can be used.
  39. This operation returns either the empty string (no permissions), "R" (read permission), or "W" (read/write permission) for a single model, based on the user and the groups he is a member of::
  40. >>> read_permissions("models/petrinets/my_pn")
  41. "W"
  42. >>> read_permissions("models/petrinets/my_pn2")
  43. "R"
  44. >>> read_permissions("models/petrinets/my_pn3")
  45. ""
  46. >>> read_permissions("models/petrinets/my_pn4")
  47. "R"
  48. Folder permissions
  49. ^^^^^^^^^^^^^^^^^^
  50. Similar to models, folders can also have permissions, owners, and an owning group.
  51. In this case, a readable folder is required to perform a *model_list* operation on that folder.
  52. A writable folder is required to create new entries (either models or new folders) in that folder.
  53. Note that this permission system leads to interesting situations, as in the UNIX permission model, where a folder cannot be read, but its contained files can (if their exact name is used).
  54. When a file was already created, overwriting that file does not require any permissions of the folder at all.
  55. Permission management
  56. ^^^^^^^^^^^^^^^^^^^^^
  57. To share your models, you basically need to relax their permissions.
  58. The default permissions are such that only the owning user can read/write the model, and no other users have access to it.
  59. To alter the permissions, we have access to several operations.
  60. 1. *permission_modify* changes the permissions of a model to the specified string.
  61. For example, to make my_pn readable for everyone::
  62. >>> permission_modify("models/my_pn", "211")
  63. 2. *permission_owner* changes the owner of a model, thereby possibly revoking our own permission, but passing it on to someone else.
  64. For example, to make user2 the owner of our PetriNet model::
  65. >>> permission_owner("models/my_pn", "user2")
  66. 3. *permission_group* changes the owning group of a model, thereby possibly revoking permissions for several users.
  67. For example, to make group2 the owning group of our PetriNet model::
  68. >>> permission_group("models/my_pn", "group2")
  69. Meta-level propagation
  70. ^^^^^^^^^^^^^^^^^^^^^^
  71. Due to its meta-modelling nature, Modelverse permissions are more involved than just file-like permissions.
  72. Indeed, a model depends on the language used to create it, such as *PetriNets*.
  73. While in this case we have assumed *PetriNets* to be always readable, this does not necessarily need to be the case.
  74. Creating a new instance of an unreadable metamodel, or language, is of course impossible, and the call to *model_add* will be prevented.
  75. Worse, however, is when the permissions of the metamodel are altered when there already is a model in that language.
  76. In this case, the model will suddenly become unreadable, as it depends on an unreadable metamodel.
  77. Later on, we will see that this does not necessarily make it impossible for the model to be opened, as it only prevents it to be opened with that specific metamodel.
  78. This does, however, require multi-conformance, which is an advanced concepts that is currently out of scope of this tutorial.
  79. Group permissions
  80. -----------------
  81. Groups are merely sets of users.
  82. Users can be added to the group with the *group_join* operation.
  83. To make *user1* join *group1*::
  84. >>> group_join("group1", "user1")
  85. Similarly, they can be removed from a group, thereby revoking all their permissions that were granted by the group.
  86. To make *user1* leave *group1* again::
  87. >>> group_kick("group1", "user1")
  88. As groups are key to model permissions, care should be taken who is made a member of a specific group.
  89. Groups are themselves managed by group administrators, who govern the members of a specific group.
  90. Group administrators can create new group administrators as well, who also automatically become a member of the group.
  91. Similarly, group administrators can revoke the permissions of other group administrators::
  92. >>> group_owner_add("group1", "user1")
  93. >>> group_owner_delete("group1", "user1")
  94. Note that, when removing group administrator status of a user, the user will still be a member of the group, though no longer an administrator.
  95. As such, the result of the previous two commands will leave *user1* as a group member, even though that might not have been the case before.
  96. A *group_kick* automatically removes group administrator permissions as well.
  97. All users can create new groups, of which they automatically become the group administrator::
  98. >>> group_add("group2)
  99. Similarly, groups can be removed by the group owner.
  100. This not only removes the group, but also kicks all users and thereby revokes all permissions originally given by that group::
  101. >>> group_delete("group2")
  102. User management
  103. ---------------
  104. Users can manage the basics of their accounts.
  105. This includes changing their username.
  106. In this case, only the name is altered, and all permissions remain unaltered.
  107. This is because only the name changes, and not the internal representation of that user.
  108. For example, to change the username of *user1* to *user_1*::
  109. >>> user_name("user1", "user_1")
  110. Similarly, users can alter their password::
  111. >>> user_password("user_1", "new_password")
  112. In both cases, all currently active sessions remain active, but future logins need to use the new credentials.
  113. Administrators
  114. --------------
  115. Finally, there is still the notion of an administrator in the Modelverse.
  116. Administrators are basically like the root users on UNIX systems: independent of permissions, they are allowed to perform any operation they want.
  117. As such, they are implicitly owner of each model, administrator of all groups, and have full permissions for user management.
  118. The Modelverse is initialized with one administrator user, but administrators can create (promote) new administrators, or revoke their administrator permissions (demote)::
  119. >>> admin_promote("user1")
  120. >>> admin_demote("user1")