mirror of
https://github.com/BookStackApp/BookStack.git
synced 2026-02-08 11:19:36 +03:00
Role ownership based permissions #101
Closed
opened 2026-02-04 16:49:42 +03:00 by OVERLORD
·
10 comments
No Branch/Tag Specified
development
further_theme_development
l10n_development
release
llm_only
vectors
v25-11
docker_env
drawio_rendering
user_permissions
ldap_host_failover
svg_image
prosemirror
captcha_example
fix/video-export
v25.12.3
v25.12.2
v25.12.1
v25.12
v25.11.6
v25.11.5
v25.11.4
v24.11.4
v25.11.3
v25.11.2
v25.11.1
v25.11
v25.07.3
v25.07.2
v25.07.1
v25.07
v25.05.2
v25.05.1
v25.05
v25.02.5
v25.02.4
v25.02.3
v25.02.2
v25.02.1
v25.02
v24.12.1
v24.12
v24.10.3
v24.10.2
v24.10.1
v24.10
v24.05.4
v24.05.3
v24.05.2
v24.05.1
v24.05
v24.02.3
v24.02.2
v24.02.1
v24.02
v23.12.3
v23.12.2
v23.12.1
v23.12
v23.10.4
v23.10.3
v23.10.2
v23.10.1
v23.10
v23.08.3
v23.08.2
v23.08.1
v23.08
v23.06.2
v23.06.1
v23.06
v23.05.2
v23.05.1
v23.05
v23.02.3
v23.02.2
v23.02.1
v23.02
v23.01.1
v23.01
v22.11.1
v22.11
v22.10.2
v22.10.1
v22.10
v22.09.1
v22.09
v22.07.3
v22.07.2
v22.07.1
v22.07
v22.06.2
v22.06.1
v22.06
v22.04.2
v22.04.1
v22.04
v22.03.1
v22.03
v22.02.3
v22.02.2
v22.02.1
v22.02
v21.12.5
v21.12.4
v21.12.3
v21.12.2
v21.12.1
v21.12
v21.11.3
v21.11.2
v21.11.1
v21.11
v21.10.3
v21.10.2
v21.10.1
v21.10
v21.08.6
v21.08.5
v21.08.4
v21.08.3
v21.08.2
v21.08.1
v21.08
v21.05.4
v21.05.3
v21.05.2
v21.05.1
v21.05
v21.04.6
v21.04.5
v21.04.4
v21.04.3
v21.04.2
v21.04.1
v21.04
v0.31.8
v0.31.7
v0.31.6
v0.31.5
v0.31.4
v0.31.3
v0.31.2
v0.31.1
v0.31.0
v0.30.7
v0.30.6
v0.30.5
v0.30.4
v0.30.3
v0.30.2
v0.30.1
v0.30.0
v0.29.3
v0.29.2
v0.29.1
v0.29.0
v0.28.3
v0.28.2
v0.28.1
v0.28.0
v0.27.5
v0.27.4
v0.27.3
v0.27.2
v0.27.1
v0.27
v0.26.4
v0.26.3
v0.26.2
v0.26.1
v0.26.0
v0.25.5
v0.25.4
v0.25.3
v0.25.2
v0.25.1
v0.25.0
v0.24.3
v0.24.2
v0.24.1
v0.24.0
v0.23.2
v0.23.1
v0.23.0
v0.22.0
v0.21.0
v0.20.3
v0.20.2
v0.20.1
v0.20.0
v0.19.0
v0.18.5
v0.18.4
v0.18.3
v0.18.2
v0.18.1
v0.18.0
v0.17.4
v0.17.3
v0.17.2
v0.17.1
v0.17.0
v0.16.3
v0.16.2
v0.16.1
v0.16.0
v0.15.3
v0.15.2
v0.15.1
v0.15.0
v0.14.3
v0.14.2
v0.14.1
v0.14.0
v0.13.1
v0.13.0
v0.12.2
v0.12.1
v0.12.0
v0.11.2
v0.11.1
v0.11.0
v0.10.0
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.2
v0.8.1
v0.8.0
v0.7.6
v0.7.5
v0.7.4
v0.7.3
0.7.2
v.0.7.1
v0.7.0
v0.6.3
v0.6.2
v0.6.1
v0.6.0
v0.5.0
Labels
Clear labels
🎨 Design
📖 Docs Update
🐛 Bug
🐛 Bug
:cat2:🐈 Possible duplicate
💿 Database
☕ Open to discussion
💻 Front-End
🐕 Support
🚪 Authentication
🌍 Translations
🔌 API Task
🏭 Back-End
⛲ Upstream
🔨 Feature Request
🛠️ Enhancement
🛠️ Enhancement
🛠️ Enhancement
❤️ Happy feedback
🔒 Security
🔍 Pending Validation
💆 UX
📝 WYSIWYG Editor
🌔 Out of scope
🔩 API Request
:octocat: Admin/Meta
🖌️ View Customization
❓ Question
🚀 Priority
🛡️ Blocked
🚚 Export System
♿ A11y
🔧 Maintenance
> Markdown Editor
pull-request
Mirrored from GitHub Pull Request
No Label
☕ Open to discussion
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/BookStack#101
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @riorii on GitHub (May 12, 2016).
It would be nice the possibility of creating groups of users and manage permissions that groups. For example, create Group 1 and 2, with 2 members each, and you give permissions to Group1 to see pages created by a member of any group.
@jonigl commented on GitHub (May 12, 2016):
Hey @riorii ,
You can create some roles for achieve this task.
Best!
Jonathan
@riorii commented on GitHub (May 12, 2016):
Yes but the problem is that, imagine you create role 1 & 2. If you are member of role 1, and you create a book/chapter/page, members from role 2 can see it and there's no way of revoke the view permission from them. I think this is related with #92 issue right?
@ssddanbrown commented on GitHub (May 12, 2016):
@riorii Yes, That seems correct, Although in the latest release you can achieve your example by preventing members of Role2 seeing the book & it's contents by activating permissions on the book and not giving role 2 view access. (So it's kind of a black-listing approach)
This issue you linked to is now complete and as of the next release you'll be able to have roles without any default view permissions then override this on a per-book (Then also chapter or page) basis (As a white-listing approach).
View access depending on fellow role-member ownership is not currently planned as its not been requested before. It would also add a lot of complexity to the permission calculations. If you would like this as a feature just let me know and I'll tag this as 'Open to discussion' so it can sit to gain support otherwise, if the above features would be enough for your use case, this issue can be closed.
@riorii commented on GitHub (May 13, 2016):
@ssddanbrown I tried this using custom permissions and it worked =)
Evenly it would be nice to have the functionality of showing book/chapters/pages based on your role.
Leave this issue as you said, open to discussion, and if it does not have quorum, you can close it.
Thanks!!
@ssddanbrown commented on GitHub (May 13, 2016):
@riorii Awesome, Glad to hear you could sort out your issue with the in-built system.
Cool, I'll add the label and change the issue title to be more specific and we'll see if anyone requests 'role ownership' based permissions.
@fredericmohr commented on GitHub (May 13, 2016):
I sort of had the same problem, and also solved it the same way. The only thing is, that whenever I create a book, it has open permissions by default. To restrict a book to be only visible by my group, I have to check the "use custom permissions" button. I think it would be nice to automatically choose that one (more restrictive) and give users the option to choose a more permissive setting, than the other way around.
Sort of like social media works. Default is share with your friend, but another option you can select is share publicly.
@ssddanbrown commented on GitHub (May 13, 2016):
@fredericmohr As of the next release (v0.10) there will be view permissions at a role level so you will be able to have a more restrictive approach. It just won't be automatic based on fellow role member ownership as it suggested in this issue.
@fredericmohr commented on GitHub (May 13, 2016):
Thanks for the info, I'll look into it when v0.10 is out :)
@galaxyfeeder commented on GitHub (Nov 8, 2017):
Maybe I'm losing something but I think this request should be closed. Right now I think that all the feature requests have been satisfied.
@ssddanbrown commented on GitHub (Aug 4, 2018):
Bit of a late reply but yeah, I think this may be achievable now so closing. Let me know if I am wrong though.