mirror of
https://github.com/BookStackApp/BookStack.git
synced 2026-02-06 19:06:02 +03:00
Separate permissions options for Allow and Deny #3340
Closed
opened 2026-02-05 06:24:34 +03:00 by OVERLORD
·
4 comments
No Branch/Tag Specified
development
further_theme_development
l10n_development
release
llm_only
vectors
v25-11
docker_env
drawio_rendering
user_permissions
ldap_host_failover
svg_image
prosemirror
captcha_example
fix/video-export
v25.12.3
v25.12.2
v25.12.1
v25.12
v25.11.6
v25.11.5
v25.11.4
v24.11.4
v25.11.3
v25.11.2
v25.11.1
v25.11
v25.07.3
v25.07.2
v25.07.1
v25.07
v25.05.2
v25.05.1
v25.05
v25.02.5
v25.02.4
v25.02.3
v25.02.2
v25.02.1
v25.02
v24.12.1
v24.12
v24.10.3
v24.10.2
v24.10.1
v24.10
v24.05.4
v24.05.3
v24.05.2
v24.05.1
v24.05
v24.02.3
v24.02.2
v24.02.1
v24.02
v23.12.3
v23.12.2
v23.12.1
v23.12
v23.10.4
v23.10.3
v23.10.2
v23.10.1
v23.10
v23.08.3
v23.08.2
v23.08.1
v23.08
v23.06.2
v23.06.1
v23.06
v23.05.2
v23.05.1
v23.05
v23.02.3
v23.02.2
v23.02.1
v23.02
v23.01.1
v23.01
v22.11.1
v22.11
v22.10.2
v22.10.1
v22.10
v22.09.1
v22.09
v22.07.3
v22.07.2
v22.07.1
v22.07
v22.06.2
v22.06.1
v22.06
v22.04.2
v22.04.1
v22.04
v22.03.1
v22.03
v22.02.3
v22.02.2
v22.02.1
v22.02
v21.12.5
v21.12.4
v21.12.3
v21.12.2
v21.12.1
v21.12
v21.11.3
v21.11.2
v21.11.1
v21.11
v21.10.3
v21.10.2
v21.10.1
v21.10
v21.08.6
v21.08.5
v21.08.4
v21.08.3
v21.08.2
v21.08.1
v21.08
v21.05.4
v21.05.3
v21.05.2
v21.05.1
v21.05
v21.04.6
v21.04.5
v21.04.4
v21.04.3
v21.04.2
v21.04.1
v21.04
v0.31.8
v0.31.7
v0.31.6
v0.31.5
v0.31.4
v0.31.3
v0.31.2
v0.31.1
v0.31.0
v0.30.7
v0.30.6
v0.30.5
v0.30.4
v0.30.3
v0.30.2
v0.30.1
v0.30.0
v0.29.3
v0.29.2
v0.29.1
v0.29.0
v0.28.3
v0.28.2
v0.28.1
v0.28.0
v0.27.5
v0.27.4
v0.27.3
v0.27.2
v0.27.1
v0.27
v0.26.4
v0.26.3
v0.26.2
v0.26.1
v0.26.0
v0.25.5
v0.25.4
v0.25.3
v0.25.2
v0.25.1
v0.25.0
v0.24.3
v0.24.2
v0.24.1
v0.24.0
v0.23.2
v0.23.1
v0.23.0
v0.22.0
v0.21.0
v0.20.3
v0.20.2
v0.20.1
v0.20.0
v0.19.0
v0.18.5
v0.18.4
v0.18.3
v0.18.2
v0.18.1
v0.18.0
v0.17.4
v0.17.3
v0.17.2
v0.17.1
v0.17.0
v0.16.3
v0.16.2
v0.16.1
v0.16.0
v0.15.3
v0.15.2
v0.15.1
v0.15.0
v0.14.3
v0.14.2
v0.14.1
v0.14.0
v0.13.1
v0.13.0
v0.12.2
v0.12.1
v0.12.0
v0.11.2
v0.11.1
v0.11.0
v0.10.0
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.2
v0.8.1
v0.8.0
v0.7.6
v0.7.5
v0.7.4
v0.7.3
0.7.2
v.0.7.1
v0.7.0
v0.6.3
v0.6.2
v0.6.1
v0.6.0
v0.5.0
Labels
Clear labels
🎨 Design
📖 Docs Update
🐛 Bug
🐛 Bug
:cat2:🐈 Possible duplicate
💿 Database
☕ Open to discussion
💻 Front-End
🐕 Support
🚪 Authentication
🌍 Translations
🔌 API Task
🏭 Back-End
⛲ Upstream
🔨 Feature Request
🛠️ Enhancement
🛠️ Enhancement
🛠️ Enhancement
❤️ Happy feedback
🔒 Security
🔍 Pending Validation
💆 UX
📝 WYSIWYG Editor
🌔 Out of scope
🔩 API Request
:octocat: Admin/Meta
🖌️ View Customization
❓ Question
🚀 Priority
🛡️ Blocked
🚚 Export System
♿ A11y
🔧 Maintenance
> Markdown Editor
pull-request
Mirrored from GitHub Pull Request
No Label
🔨 Feature Request
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/BookStack#3340
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @alanmcseveney on GitHub (Nov 11, 2022).
Describe the feature you'd like
I would like to be able to deny actions upon Shelf, Book or Page using a permissions option that explicitly denies an action, thereby extending the permissions options to:
Allow: view
Allow: update
Allow: delete
Deny: view
Deny: update
Deny: delete
Explicit Deny permissions should supersede Allow permissions, potentially following the conventions established by Windows ACL's.
Describe the benefits this would bring to existing BookStack users
Not having the ability to explicitly deny access to content can require entire structural changes to existing security groups within an organization. For e.g., here is an Active Directory nest group structure that ends with a group mapped to a Bookstack Role:
user1 is member of "department.region" security group;
"department.region" is a nested member of "department" security group;
"department" is a nested member of "creativedepartments" security group;
"creativedepartments" is a nested member of "bookstack-role-creativedepartments" security group;
"Creative Departments" role in Bookstack has External Authentication ID "bookstack-role-creativedepartments".
user2 is also a member of "department.region", but user2 is a temporary staff member.
user2 should not have access to "Health Insurance & Benefits" Book on the "Human Resources" Shelf.
Explicitly applying a "Deny: view,update,delete" to Bookstack Role "Temporary Staff" for the given book would achieve the desired outcome.
Can the goal of this request already be achieved via other means?
Without the ability to say "Deny: view,update,delete" for "role-temporary-staff", then we have to go all the way to the top of the chain in the directory, and create a new structure like:
department.region.temps > department.temps > creativedepartments.temps > bookstack-role-creativedepartments-temps
department.region.perms > department.perms > creativedepartments.perms > bookstack-role-creativedepartments-perms
This would force us to split the entire permissions structure into a much more complex structure, where the number of required groups increases exponentially.
Have you searched for an existing open/closed issue?
How long have you been using BookStack?
0 to 6 months
Additional context
No response
@ssddanbrown commented on GitHub (Jan 31, 2023):
Thanks for the request @alanmcseveney.
To be honest, I really don't want to complicate the permission system much further for the types of permission levels we already have, since the permission model is already complex enough to maintain.
That said, a significant part of what you desire may be possible.
Lack of permission check can already act as a denial.
Since v22.10 the behaviour of this was somewhat unreliable in complex scenarios but a major part of v23.01 was around improving this and defining the logic followed.
As of v23.01, an item-level role permission override, with lack of permission (unchecked) will override and deny existing role/fallback permissions.
We still side towards allow though, where both allow and deny exist at the same permission specificity, which I know isn't what you'd prefer but it's how we've done permissions from the start so likely not something I'd look to change.
There's more details in the v23.01 blogpost and I also rant/describe permissions at about 7:22 in the accompanying release video.
Additionally, our docs have a new section to provide a high-level view of the logic defined and implemented.
@alanmcseveney commented on GitHub (Jan 31, 2023):
That's a real shame. Additive and subtractive options really are necessary, as demonstrated by their inclusion in all modern permissions models. Yes, we got by with POSIX (and still do) for many things, but in other places it's just not good enough and with Bookstack housing sensitive documentation for us (others too, I'm sure), a more robust approach to permissions would have been very welcome.
ACL's are present in all of these competing solutions:
Microsoft SharePoint - It provides a comprehensive ACL-based permissions model that allows administrators to control access to content at a very granular level.
Confluence - It also offers an ACL-based permissions model, allowing administrators to specify who does and does not have access to specific pages, spaces, or the entire platform.
MediaWiki - It has a flexible permissions model that can be configured to use ACLs, providing fine-grained control over user access to content.
Notion - It offers a flexible permissions model that can be configured to allow or restrict access to specific pages or databases, effectively implementing an ACL-based system.
@ssddanbrown commented on GitHub (Jan 31, 2023):
@alanmcseveney based on your comment, I'm not too sure what you want from BookStack's permission system to be honest, and what about the BookStack permission is not considered "robust". You can add an subtract permissions, we just default in a slightly different way to what you desire. From my perspective the permission options are already more ACL based than POSIX as your comment infers, and the options we provide are very similar to some of those platforms listed. The only significant thing we're maybe lacking right now in comparison is direct user-level permissions, since we do everything via roles really.
Also, keep in mind, that total funding of BookStack is probably less that a single junior developer at those large companies you're comparing us to. We do have to set our scope to what is reasonable to a certain degree.
@ssddanbrown commented on GitHub (Feb 18, 2023):
I'm going to proceed and close this off since, as explained above, we do now have some ability to deny permissions and I wouldn't look to expand the logical complexity of permissions beyond what we now support.