Skip to content

Attenuate delegation rights #327

@srosset81

Description

@srosset81

Context

For ActivityPods, we need Data Grants to have a limit in their delegation. I will implement this in the coming weeks.

We had a long discussion about this with @elf-pavlik, @niko-ng, @Laurin-W here: activitypods/activitypods#386

For delegation to work, we will also need #328

Proposal

My proposal would be to add these two predicates to the interop:DataGrant class:

  • interop:delegationLimit: Integer with the number of times the data grant can be delegated
    • If zero, it means the data grant cannot be delegated
    • If not specified, it means there is no limit to the amount of time the Data Grant can be delegated
  • interop:delegableMode: The ACL modes that can be delegated
    • It cannot include other modes than those specified in interop:accessMode
    • If interop:delegationLimit is 0, it should not be specified (it will not be taken into account)

Note that this would not be taken into account for applications (in the case a resource is shared with me, and I want to grant the application access to this resource)

Example

Bob gives Alice read/write access to his projects + the right to delegate the read access to one level:

bob:b2b6a645
  a interop:DataGrant ;
  interop:dataOwner bob: ;
  interop:grantee alice:\#id ;
  interop:registeredShapeTree pm-shapetrees:ProjectTree ;
  interop:hasDataRegistration bob-work-data:08a99a10\/ ;
  interop:accessMode acl:Read, acl:Create ;
  interop:creatorAccessMode acl:Update, acl:Delete ;
  interop:scopeOfGrant interop:AllFromRegistry ;
  interop:delegationLimit 1 ;
  interop:delegableMode acl:Read .

If Alice then share Bob's projects with Craig, the Delegated Data Grant will look like this:

alice:b2b6a645
  a interop:DataGrant ;
  interop:dataOwner bob: ;
  interop:grantee craig:\#id ;
  interop:registeredShapeTree pm-shapetrees:ProjectTree ;
  interop:hasDataRegistration bob-work-data:08a99a10\/ ;
  interop:accessMode acl:Read ;
  interop:creatorAccessMode acl:Update, acl:Delete ; # Not sure how to handle this predicate (see below)
  interop:scopeOfGrant interop:AllFromRegistry ;
  interop:delegationLimit 0 .

Craig thus cannot delegate the projects to someone else.

Open questions

  • Would it be more clear to also have a interop:delegationAllowed boolean ?
  • Would interop:delegationLevel state more clearly that this is not about the number of Delegated Data Grants that can be created, but rather if Delegated Data Grants can themselves generate new Delegated Data Grants ?
  • How should the interop:creatorAccessMode predicate be taken into account irw interop:delegableMode ? Since we haven't implemented yet this, I'm not sure how it works.

Once we agree on these details, I can propose a PR.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions