Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: all_database_access should enable access to all datasets/charts/dashboards #28205

Merged
merged 6 commits into from
May 2, 2024

Conversation

mistercrunch
Copy link
Member

@mistercrunch mistercrunch commented Apr 24, 2024

When granting all_database_access, one would expect to get access to all charts and datasets.

From my understanding all_database_access is practically identical to all_datasource_access, and perhaps the two perms should be collapsed into one. In the meantime, this addresses user confusion around this perm not working according to its name.

I'm guessing that the difference between the two could be that all_database_access would also allow you to CRUD database objects(?)

Side mission:

Introducing a nifty context manager for tests to create temp user:

with self.temporary_user(clone_user=gamma_user, extra_pvms=[('all_database_access', 'all_database_access')],login=True) as user:
    user.do_stuff()

The neat thing is it can clone a user, will delete it on exit, optionally can log user in/out. It's not mutating anything so it should work well for running tests in parallel and/or for tests that fail half way through.

I'm planning on a follow up refactoring PR to standardize on using temporary_user everywhere where the current create_user is used.

Copy link

request-info bot commented Apr 24, 2024

We would appreciate it if you could provide us with more info about this issue/pr! Please do not leave the title or description empty.

@request-info request-info bot added the need:more-info Requires more information from author label Apr 24, 2024
@mistercrunch mistercrunch removed the need:more-info Requires more information from author label Apr 24, 2024
Comment on lines +412 to +415
return self.can_access_all_databases() or self.can_access(
"all_datasource_access", "all_datasource_access"
)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This makes sense and looks fine, I'm just worried about unintended consequences. Would be nice to get a signoff from @dpgaspar and/or @villebro and/or @john-bodley here, just in case.

Also, it would be really nice if we could decouple the data permissions from the API permissions. Maybe we should create a workgroup to brainstorm how this should look like.

Copy link
Member Author

@mistercrunch mistercrunch Apr 25, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree, grepping for all_database_access there's very little justifying its existence as AFAIU, two choices here:

  • make it work as "expected" based on name which would be what's in this PR, essentially making all_database_access == all_datasource_access
  • deprecate all_database_access and [either]
    • migrate all_datasource_access where it's defined
    • or NOT migrate, do as if it never existed as migrating may effectively grant things that were not granted before

Copy link
Member Author

@mistercrunch mistercrunch Apr 25, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Digging a bit deeper I found a reference to SecurityManager.can_access_all_databases (which wraps the all_database_access permission) in superset/databases/filters.py, which seems potentially at odds with the model-based perms as in Database.can_write and Database.can_read. If we were to deprecate all_database_access we could transfer it to Database.can_read in roles where it's specified to try to match the current behavior.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@eschutho mentioned the case where we want to give someone access to all the tables for them to query in SQL Lab, but we don't want them modifying the database configuration. In that case, we'd want them to have all_datasource_access but not all_database_access, no?

Copy link
Member Author

@mistercrunch mistercrunch Apr 25, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the CRUD on Database is tied to the model / modelview, as opposed to this special term.

I have a spreadsheet of all the perms, and the relevant ones for database CRUD should be these ->

<style type="text/css"></style>

view_menu permission perm_type
Database can_export MODEL_VIEW
Database can_read MODEL_VIEW
Database can_write MODEL_VIEW
Databases menu_access MENU

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We (Airbnb) tend not to use these access controls and thus I don't really have much to add. My only question would be, why this hasn't been an issue in the past as it potentially looks like a fairly egregious oversight from a consistency standpoint—if in fact the proposed behavior is correct.

@mistercrunch
Copy link
Member Author

So, what do we do? Deprecate or fix?

@eschutho
Copy link
Member

/testenv up

Copy link
Contributor

@eschutho Ephemeral environment spinning up at http://34.221.9.95:8080. Credentials are admin/admin. Please allow several minutes for bootstrapping and startup.

@eschutho
Copy link
Member

eschutho commented Apr 25, 2024

Also a few more places like here where it could break. Plus as @mistercrunch mentioned the filters present more complexity where we can remove specific access through configs even with all database access.

We can fix any outliers, so maybe the bigger question, is how do we want it to work? Most people probably logically assume that permissions work like Database -> Dataset -> Dashboard -> Chart, but they don't. I'm usually for small incremental changes, but the permissions models are so complex, that I expect even a small change could break quite a few things. I vote fix, but maybe for a larger 5.0 project?

@mistercrunch
Copy link
Member Author

I think this specific special permission is redundant with all_datasource_access on one side (data access policy) and redundant with Database - can_read on the CRUD side of managing databases.

I vote for deprecating this perm, though I'd rather get consensus prior to doing the bit of work.

@rusackas rusackas requested a review from dpgaspar April 26, 2024 03:16
@mistercrunch
Copy link
Member Author

After conversations with @eschutho and @yousoph , we decided that all_database_access should remain and provide both access to all data (through all databases connections) and allow listing all said database connections. Adding a note to UPDATING.md to notify people upgrading, but it should't come as a surprise that all_database_access give access to all databases.

…dashboards

When granting `all_database_access`, one would expect to see all
dashboards, charts and datasets.

From my understanding `all_database_access` is practically identical to
`all_datasource_access`, and perhaps the two perms should be collapsed
into one. In the meantime, this addresses user confusion around
this perm not working according to its name.
@mistercrunch mistercrunch force-pushed the all_database_access branch from 00bf1ac to e716e68 Compare May 1, 2024 00:12
@dpgaspar
Copy link
Member

dpgaspar commented May 2, 2024

After conversations with @eschutho and @yousoph , we decided that all_database_access should remain and provide both access to all data (through all databases connections) and allow listing all said database connections. Adding a note to UPDATING.md to notify people upgrading, but it should't come as a surprise that all_database_access give access to all databases.

I agree with this change, to my understanding before 2.1, all database access or a specific database access on X would not list any chart, dashboards, users would have database, schema and table access on SQLLab only. Currently granting database access on X will give access to all charts and dashboards based on that database, but not all database access so it does seem like a bug.

@mistercrunch mistercrunch merged commit 513852b into master May 2, 2024
27 checks passed
Copy link
Contributor

github-actions bot commented May 2, 2024

Ephemeral environment shutdown and build artifacts deleted.

@rusackas rusackas deleted the all_database_access branch May 2, 2024 17:03
dpgaspar pushed a commit to preset-io/superset that referenced this pull request May 6, 2024
jzhao62 pushed a commit to jzhao62/superset that referenced this pull request May 16, 2024
eschutho pushed a commit that referenced this pull request Jun 23, 2024
vinothkumar66 pushed a commit to vinothkumar66/superset that referenced this pull request Nov 11, 2024
@mistercrunch mistercrunch added the 🏷️ bot A label used by `supersetbot` to keep track of which PR where auto-tagged with release labels label Nov 27, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
🏷️ bot A label used by `supersetbot` to keep track of which PR where auto-tagged with release labels preset-io size/L 🚢 4.1.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants