-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
External Storage Admin Checkbox to turn sharing, share links On and Off #19157
Comments
The mount option will be on the same level as "disable encryption" so it will be settable through all APIs. |
Discussed with @icewind1991 and with the current architecture it is not possible to separate "user share" from "link share" permission. If we agree to combine them both into a single option "Enable sharing", then it can be easily implemented by reusing the "share" permission that we already have on the filesystem and every API (Webdav, etc). The implementation would need to make the storage return false for However if we do want to keep them separate, we'll need to introduce a new separate permission and modify all the API and API consumers to be able to understand the distinction, which is a lot more work. |
Thanks. Note that this PR is the simple solution that disables sharing completely (no distinction between user share and link share) |
@MTRichards can you clarify the following:
|
@PVince81 A few answers.
A lot more important than you might think. A SharePoint, for example, makes sense to share internally only. But network drives are more likely to be shared as both. The more enterprise backends we add, the more that sharing granularity is necessary.
If the admin is changing the behavior of the system, then the shares should be blocked and not work. In theory, after a meaningful pause ("oops, I clicked the wrong button"), the shares would also be removed so we are not carrying around all this meta data for functionality that doesn't work any more. That could take forever of course, and we should discuss the implications of such. |
Thanks for the info.
|
@MTRichards we discovered a tricky situation: Mount points can be set to subfolders like "/mymounts/SMB". If sharing is disabled on "SMB", then should we also disallow sharing of "mymounts" ? It almost looks like the permissions need to propagate somehow. @icewind1991 will have a look whether it's possible somehow |
For 9.0 we'll then aim to have the combined share part. It already comes with a few tricky edge cases, see #19157 (comment) I raised the part about splitting shares in a separate ticket here #21000 |
The mount option to disable sharing completely (both user share + public shares as a single option) for external storages has been implemented and merged already. There is one open issue:
|
|
This is implemented, closing. This follow up ticket is about providing separate permissions for "link shares" and "user shares": #21000 |
Doubt : previously, when this option was disable, before doint the action we warn the admin with this: This is not included in this version...do we want to add it? @MTRichards ? |
"disable personal mountpoints" @rperezb this ticket is about disabling sharing, not personal mount points. files_external works a bit differently. If you disable personal mounts, the users don't see them any more but they still exist internally. If the admin reenables it, the mount points will appear again. The same is true for shares: the shares continue to exist but are inaccessible. |
Sorry! wrong copy-paste |
Yeah, as said above, the shares are preserved in the database but we added code to prevent these to be accessible when sharing is disabled. |
yes, previously, the original data was not removed either, however, the user with whom it was shared they stopped having access. |
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
External Storage Sharing Switch – As an admin, I want to be able to disable sharing on a per mount point basis so that files can remain secured by the backend system and backend ACLs are maintained when used by the end user.
Acceptance Criteria:
The text was updated successfully, but these errors were encountered: