-
Notifications
You must be signed in to change notification settings - Fork 108
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create a fine-grained permissions to ReqMgr2 #6072
Comments
And two more comments:
|
Hi Alan, Yes I agree what you said. Base logic are following.
|
Thanks Seangchan! Individual request level control is just too much in my opinion as well. About permissions being tied to groups, did you mean physics group? If so, IMO we could skip it as well, currently there are only a few people creating workflows, I'd go for a single group, easier to manage. |
group and role here is just sitedb group and roles, I am not sure how groups and roles defined there. But it is pretty flexible to define groups and roles, right? |
good ! |
@vlimant, Jean-Roch could you give me the list which one needs which permission to have. Here is some examples Permission can be controlled by request type. i.e.
|
In face of: #11190, this now becomes higher priority and we need to make sure it's functional. We might want to review how that permission document gets created in reqmgr_auxiliary db, given that I see it only in CMSWEB production but not in testbed. |
On what concerns permissions based on the request status (or the lack of it), this is what I just came up with:
Note that this is actually based on the Do people have any comments and/or corrections to make? Tagging a few names that come to my mind, but others are of course welcome to provide their input @haozturk @todor-ivanov @vkuznet PS.: PdmV being able to reject looks sensible to me in case they injected a workflow that is actually broken. However, they would be able to also reject a workflow that is either completed or closed-out, which is not so desirable. |
If I looked at the right file
https://github.com/dmwm/WMCore/blob/master/src/python/WMCore/ReqMgr/Auth.py
it seems the only permissions distinctions are for: creating a request (new), approving (assign-approved) and assigning it (assigned).
If someone wants to reject a request, then this person needs to have full privileges (ReqMgr: Admin).
My suggestion would be (for ReqMgr group):
@ticoann does it make sense?
The text was updated successfully, but these errors were encountered: