On 01/19/2011 08:04 PM, Jerome Velociter wrote:
> Hi developers,
>
> I've setup and worked on a couple of wiki farms recently, and my feedback is
> that the PR issue has become for me a major PITA.
> It's worst than before, because we've introduced a lot of pages that
> requires it : annotations style and script, plus the wiki macros for
> activity, tag cloud, space, etc. (OK, it's not really PR, it's edit right of
> the last person who did edit it, but it's the same issue mostly : you need
> to have it saved by someone with sufficient rights).
>
> Importing not as back-up (meaning all pages imported from the XAR are saved
> by the user doing the import) is not sufficient answer, for several reason :
> * User might not have programming rights
> * When user has programming rights, it's a BAD practice in terms of security
> (it means every page of the wiki initially has the PR right OK)
> * Wiki creation is also done by template wiki copy, which is not covered by
> this
> * This problem is not just an import/creation problem, we need generally a
> way to know which pages require PR, and which are missing this PR (users can
> be deleted, their rights can change, etc.).
>
> OK, that looks like sufficient complaining :)
>
> Here what I propose, tell me what you think :
>
> 1. We define a XWiki class, like XWiki.RequiredRightClass, with a field that
> describe the required right the user saving the document must have for it to
> behave properly (for example it will be "edit" for wiki macros with a "wiki"
> scope, and "programming" for pages that uses privileged APIs, or JSR
> scripts, or always use SSX, etc.)
> 2. We make a simple UI (for example in the administration section of the
> admin app) that list all of them, and their current status. Plus a button to
> fix the status if there is something to fix (a missing PR for example) and
> if the user seeing the page has the required rights of course.

+1 as a quick fix.

> That's what I propose for now.
>
> In the future, we could imagine that :
>
> 3. Programming right can only be granted on a page that requires
> it explicitly. This would be a non-backward compatible change.

In the future this will be done with signed scripts. The work is halfway 
done, with the xwiki-crypto module in place. That way you'd be sure only 
trusted scripts are executable.

> Let me know what you think.
>
> If we agree I volunteer to implement this in 3.0 M2.

-- 
Sergiu Dumitriu
http://purl.org/net/sergiu/
_______________________________________________
devs mailing list
[email protected]
http://lists.xwiki.org/mailman/listinfo/devs

Reply via email to