Hi,
I upgraded to 3.7.0.1 without any issue for me
The groups and permissions stuff is good and very useful !
Best,
Ludovic
Hi,
I upgraded to 3.7.0.1 without any issue for me
The groups and permissions stuff is good and very useful !
Best,
Ludovic
So there was a few iterations and we should be getting close to being able to release this âŠ
For people that already are in testing : please not that after upgrading to the 3.7.0.4, if you want everything to run smoothly, you should :
yunohost user permission list
visitors
enabled but not all_users
, you should add the all_users
group to this permission like this :yunohost user permission update foo.main --add all_users
(replacing foo.main
with the name of the permission). Note that you can also do the same thing from the webadmin interface (In Users > Manage groups and permissions)
Hello,
Do you know if the stable version will be released in days / weeks / months ?
Thank you
Mise à jour effectuée sans encombre.
Je nâutilise pas les groupes et peu de permissions diffĂ©rentes sur mon serveur. Lâinterface est claire en tout cas!
Possibly in a few days / weeks, yes⊠The more feedback we get, the faster we can validate the release with as few issues as possible
Hi,
Upgrade went smoothly Thanks !
I added the visitors on all_users groups in both command line and webadmin
Ludovic
Hi, it seems itâs my first post here, so hello everybody
Here is the output I have from launching the command:
root@garnet:/home/admin# curl https://install.yunohost.org/switchToTesting | bash
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 459 100 459 0 0 5010 0 --:--:-- --:--:-- --:--:-- 5043
----
Patching sources.list to enable testing repository...
----
----
Running 'apt-get update'
----
Ign:1 http://ftp.debian.org/debian stretch InRelease
Hit:2 http://security.debian.org stretch/updates InRelease
Hit:3 http://ftp.debian.org/debian stretch-updates InRelease
Hit:4 http://ftp.debian.org/debian stretch Release
Hit:5 http://forge.yunohost.org/debian stretch InRelease
Reading package lists... Done
----
Running 'apt-get dist-upgrade'
----
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
The following packages were automatically installed and are no longer required:
etckeeper iproute
Use 'sudo apt autoremove' to remove them.
The following packages will be upgraded:
moulinette ssowat yunohost yunohost-admin
4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 10.2 MB of archives.
After this operation, 672 kB of additional disk space will be used.
Do you want to continue? [Y/n] Abort.
root@garnet:/home/admin# curl https://install.yunohost.org/switchToTesting | bash
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 459 100 459 0 0 4379 0 --:--:-- --:--:-- --:--:-- 4413
----
Patching sources.list to enable testing repository...
----
----
Running 'apt-get update'
----
Ign:1 http://ftp.debian.org/debian stretch InRelease
Hit:2 http://ftp.debian.org/debian stretch-updates InRelease
Hit:3 http://security.debian.org stretch/updates InRelease
Hit:4 http://forge.yunohost.org/debian stretch InRelease
Hit:5 http://ftp.debian.org/debian stretch Release
Reading package lists... Done
----
Running 'apt-get dist-upgrade'
----
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
The following packages were automatically installed and are no longer required:
etckeeper iproute
Use 'sudo apt autoremove' to remove them.
The following packages will be upgraded:
moulinette ssowat yunohost yunohost-admin
4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 10.2 MB of archives.
After this operation, 672 kB of additional disk space will be used.
Do you want to continue? [Y/n] Abort.
See, at then end it automatically aborts, so I had to apt update/upgrade by hand. After this migration seemed ok, but I have this message in admin backend:
Unable to retrieve the feed: Security | Yunohost Documentation. An extension may prevent your browser from executing this request (or the website may be down).
BTW, will this issue be fixed with new release?
(also this one seems to be the same)
Weird error happening updating discourseâŠ
https://paste.yunohost.org/ivogibihij.coffeescript
EDIT: nevermind, I removed/re-added all_users and visitors permissions and it worked (now I understand the release notes of the latest beta )
Hi guys
is there a documentation or anything similar about the new permission system ?
Also, how the migration is going to be for the apps that donât use that permission system yet ?
EDIT:
Looks like the answer is into that PR 'visitors' mechanics (replace the old public/private mechanic) + integrate the permission system with SSOwat by alexAubin · Pull Request #797 · YunoHost/yunohost · GitHub
I wasnât there by the time of that PR, and Iâm not so relieved actuallyâŠ
Found the doc as well, https://github.com/YunoHost/doc/blob/group-and-permissions/groups_and_permissions.md
Whatâs worry me especially is that the doc says :
Applications scripts should absolutely NOT mess up with any already-existing app accesses
Public/private access is not always just about skipped_uris "/"
, thereâs many specific access, like an admin panel or other stuff.
We canât expect that users are going to play with all the specific permissions for an app when willing to turn off or on the public access for an app. It as to be simple.
So actions scripts dedicated to that purpose have to be still available for the users willing to turn on or off a public access without complication.
EDIT 2:
Before releasing that testing, a clear announce has to be done to all packagers to explain how to modify their apps with examples and clear explanations.
Iâm really worried that weâre going to break a lot of apps if thereâs no proper warning about that new feature. I wasnât aware of it myself.
Do we have a bot on Github that can automagically open an issue in the appsâ repos if scripts contain anything related to accesses? (Now that I wrote it, I think it will involve all apps actually)
Exactly @tituspijean, if not almost every apps.
If I understand well, for apps with a simple skipped_uris "/"
it shouldnât be a problem. But for all apps with API access, admin panel or public download links, itâs going to be a problem.
Pretty much everything is backward compatible, so basically all install and other scripts will keep working as they do right now (modulo depreciationg warning), and if they donât then thatâs a bug that should be fixed.
As far as I remember, the only not-backward compatible thing is the use of protected uris, in the sense that even when being logged-in you still wonât have access to the protected uris (so thatâs kinda conservative). The affected apps are apparently : lstu, lufi, dotclear, lektor, bozon, and lutim.
Admin panels are expected to be handled by a specific permission. Typically you would define such a permission with something like :
ynh_permission_create --permission "admin" --url "/admin" --allowed "$admin_user"
which controls accesses to https://domain.tld/app/admin
. Then the instanceâs admin can add/remove accesses to this permission from the webadmin interface, just like it does for the main permission which controls access to /app
. (Also, if I remember correctly, a user has to be authorized for /app/
to be able to access /app/admin
.)
Not sure what youâre thinking about, but right now itâs âjustâ about : going into Users > Manage permissions and groups, then adding / removing the permission to the âVisitorsâ group and thatâs it. Then visitors will be able to access (or not) to /app
(but not to /app/admin
if itâs controlled through a diferent permission)
There have been test batches using the unstable CI to validate that there was no regression (at least from the CI point of view) though I didnât re-ran a batch of test following the release of the testing and the next iterations of fixes
What Iâm thinking about is that kind of thing:
Thatâs not obvious (my bad by the way) but here the idea is to have the links always publicly available, but not the main page of jirafeau nor its admin panel.
It would translate as 3 different permissions. But an user willing to turn the app public or private shouldnât have to play with those 3 different permissions and know which one should be private or not.
An user that want to turn the app public or private should be able to simply ask for it, without having to know how it should work. And that exactly the purpose of the actions public_private.
Jirafeau is only one example of those permissions.
We have also that kind of situation for API for mobile apps.
Those situations are what Iâm thinking about when I say that apps are going to break. The CI canât test those things.
Again, Iâm not saying that all that permission system is a bad thing, but packagers should have a proper warning and a clear explanation before that testing is released.
I quickly read the install
script of all our apps tagged as âworkingâ.
Among them, here a list of the ones which are doing non trivial things with the old permission system (not only a simple protect â/â):
I may miss some of them.
I added those that are doing something like yunohost app addaccess $app -u $admin
because I was not sure if it can be a problem with the new permission system.
A new testing version has been released, which includes some important fixes:
Thanks so much to all the contributors ! (Aleks, amirale qt, Bram, ButterflyOfFire, elie gavoty, Filip Bengtsson, Josué, Kay0u, ljf, Maniack, Quenti, xaloc33)
Bonsoir,
Dans le cadre du passage de Stretch
Ă Buster
, faudra-tâil passer par un mise Ă niveau de YunoHost 3.6.x Ă 3.7.x prĂ©alablement Ă la migration ?
ppr
Bonjour,
Rien nâest encore fixĂ© il me semble, mais de toute façon il vaut mieux (si ce nâest pas obligatoire?) ĂȘtre Ă la version la plus Ă jour avant de faire la migration.
Nous prévoyons encore une 3.8 avant le passage à la 4.0 (Buster
) afin de préparer le terrain.
Bonjour,
Merci pour ces informations.
La version stable actuelle est 3.6.x.
Est-ce que la 3.7.x testing va bientĂŽt passer en stable ?
On verra pour la 3.8.x aprĂšs avant la migration vers la 4.0.x
ppr