-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Roles/permission not applied to migrations #114
Comments
At least one fundamental issue here is that validation for migrated content is not enabled (a related ticket #86 might be satisfied merely be enabling validation of migrations). Library staff will be populating Islandora primarily by defining csv files to migrate, so getting validation to work in the first place would be a big step. To the extent that this specific issue (roles/permission verification) is not satisfied merely be enabling validation, please track down and implement the missing pieces. I'm sure that existing migrations used in tests do are missing required fields, so it is likely an additional ticket would be needed to update those existing migrations, should migration validation prove to be possible to enable. |
In regards to the access use case(s) is there anything supplemental to this Google doc or direction to the existing implementation in code? Is this ticket referring to ingesting via the GUI only or does it also apply to Drupal Migrate migrations ran via CLI? Given that ParseEntityLookup is invoking Assuming node access is being used (with an implementation to satisfy the use case(s)), From a GUI perspective it looks like Lastly, setting |
Unfortunately, Bethany is on vacation for another couple weeks (and she's most familiar with this work), but here's a working doc she wrote up: Her work mostly leverages the workbench module Ingests will be acheved by uploading CSVs via the migrate plus UI |
Blocked awaiting advice on required validation for launch |
This PR solves part of this ticket (the member_of part): #184 A fix for field_access_terms is being worked on by @jordandukart |
All parts are in place, as of jhu-idc/idc_defaults#4 |
Allow macs to be slower during initial build - fixes #113
A user with access to run ingests can add collections and items in such ways that are beyond the permissions they should have access to.
To be clear, the roles that can access ingests are Collection Level Admins (CLA) and Global Admins. The Global Admin is not a concern, but the CLA's will only have access to certain content.
Right now a CLA can ingest material into any collection via an ingest (and UI). They cannot have edit access the item afterwards, but they can still create them, which is an issue.
This is tangential to this ticket. #108
Once that ticket is solved, I think the ingests will be better scoped to the user performing them and will fail unless they apply member_of and access terms the user has permission to use. I'm not sure if ticket 108 will fully solve the ingest issue though.
The text was updated successfully, but these errors were encountered: