Resource permissions
Warning
This document is a work in progress.
As base for the platform permissions we use the library miracle-acl (now deprecated).
- The library includes the following concepts - which we mirror in the platform:
resource - the object you want to protect
permissions - possible actions on the resource
roles - used to group resource + permission set
Permissions
- The available permissions are:
create
read
update
delete
execute
reset
Note
Not all permissions are available for all resources.
For specific resource permissions, see BaseUser.has_permission.
In the case of InternalUser, the permission check is done in InternalUser.user_can_edit_internaluser. This allows for specific overrides for InternalUser permissions when it comes to the InternalUser accessing its own data.
Resources
See available resources in: ResourceType.
Roles
- The available roles are:
ADMIN
DEPLOYER
OPERATOR
- The DEPLOYER role includes the following permissions:
EmailsAlertsConfig: read and update
EmailsAlertsRecipients: read
Configuration: read
InternalUser: read
Role: read
AclObject: read
Access to all Applications
- The OPERATOR role includes the following permissions:
EmailsAlertsConfig: read
EmailsAlertsRecipients: read and update
Configuration: read
Access to Launcher and FleetBoard