5.5 KiB
title | template | taxonomy | ||
---|---|---|---|---|
User groups and permissions | docs |
|
Installing an app creates the permission app.main
with all_users
allowed by default.
If you wish to make the application publicly available, instead of the old unprotected_urls
mechanism, you should give access to the special group visitors
:
ynh_permission_update --permission "main" --add visitors
If you wish to create a custom permission for your app (e.g. to restrict access to an admin interface) you may use the following helpers:
ynh_permission_create --permission "admin" --url "/admin" --allowed "$admin_user" --label "Label for your permission"
You don't need to take care of removing permissions or backing up/restoring them as it is handled by the core of YunoHost.
Migrating away from the legacy permission management
When migrating/fixing an app still using the legacy permission system, it should be understood that the accesses are now to be managed by features from the core, outside of the application scripts!
Application scripts are only expected to:
- if relevant, during the install script, initialize the main permission of the app as public (
visitors
) or private (all_users
) or only accessible to specific groups/users ; - if relevant, create and initialize any other specific permission (e.g. to some admin interface) in the install script (and maybe in some migration happening in the upgrade script).
Applications scripts should absolutely NOT mess up with any already-existing app accesses (including unprotected
/skipped_uris
settings) during any other case, as it would reset any admin-defined access rule!
When migrating away from the legacy permission, you should:
- remove any management of
$is_public
-like or$admin_user
-like setting, except for any manifest question meant to either initialize the app as public/private or specific permissions ; - remove the old legacy permissions. Check out the recommended way to proceed in the example_ynh app (in particular this code snippet)
It should boil down to :
if ynh_legacy_permissions_exists; then
ynh_legacy_permissions_delete_all
ynh_app_setting_delete --app=$app --key=is_public
# Create the permission using the new framework (if your app has relevant additional permissions)
ynh_permission_create --permission="admin" --url="/admin" --allowed=$admin
fi
- remove any call to
yunohost app addaccess
and similar actions that are now obsolete and deprecated. - if your app use LDAP and support filter, use the filter
'(&(objectClass=posixAccount)(permission=cn=YOUR_APP.main,ou=permission,dc=yunohost,dc=org))'
to allow users who have this permission. (A complete documentation of LDAP here if you want to undestand how it works with YunoHost)
Additional features from 4.1
- Label customization : this is the name displayed to end users in the user portal. You can provide a default label (for example app.admin maybe be labelled 'Admin interface'). The label may be changed later by the admin after installation.
- Enabling/disabling tile : this toggles wether or not an app is shown in the user portal (if the user has the corresponding permission). The corresponding option is called
show_tile
which may beTrue
orFalse
. A single app may have multiple tiles in the SSO. The url of each tile corresponds to theurl
parameter of the permission. - Multiple url support: a permission may have additional urls associated to it. This give the possiblity to protect many url with the same permission - in particular for tricky use case (for example several pieces of admin interfaces spread over different subpaths).
- Protecting permission: As a packager, you may choose to "protect" a permission if you believe that it's not relevant for the admin to add/remove this permission to/from the visitors group. For example, this is the case for the API permission of Nextcloud, which in the vast majority of cases should be kept publicly because mobile client won't go through the SSO. Note that when using the helper
ynh_permission_update
, it's still possible to add/remove thevisitor
group of this permission. - Disabling auth header: some app authentification mecanism do not appreciate that SSOwat injects the Authorization header (which is an essential mecanism for single sign-on). You can now choose to disable the auth header injection from SSOwat to fix this (instead of the previous hack of using
skipped_uris
)
Correspondance between the old and new permission mecanism
with auth header | no auth header | |
---|---|---|
public | unprotected_uris | skipped_uris |
private | protected_uris | N/A |
with auth header | no auth header | |
---|---|---|
public | auth_header=True, visitor group allowed | auth_header=False, visitor group allowed |
private | auth_header=True, visitor group not allowed | auth_header=False, visitor group not allowed |
All of theses feature are managable by theses following helper:
ynh_permission_create
ynh_permission_url
ynh_permission_update
If you have any question, please contact the app team