Open mstfdkmn opened 2 years ago
This is correct, and working as designed (I think).
The metadata guard is guarding against manipulation/edits - not against visibility.
We can implement that separately (instrumenting the query PEPs), but by default, all metadata in the system is visible, as the initial iRODS design and use cases were around being a finding aid.
Happy to entertain counter-examples. Everyone's use cases and demands are unique.
But normally I guess a rodsuser (contrary to rodsadmin) cannot see attached metadata on an object (data obj/col) where it doesnt have access, right?
imeta ls -C /tempZone/home/someoneElse/col
At least it should see Error: Collection ... does not exist.
I guess the zone collection (/zoneName) has exception here?
We noticed that the public group has read access on the zone collection.
If you remove g:public#tempZone:read object
, can the rodsuser still see the metadata on /tempZone
?
Once the read access of public group is removed, indeed the rodsuser cannot see anymore the metadata on the zone collection.
rodsusers receive:
AVUs defined for collection /tempZone:
Error: Collection tempZone does not exist.
Do you remember any specific important reason to keep the read
access level to the group public
on the zone collection?
It allows a user to be able to traverse down from the root (/
) and then the zone (/tempZone
). But it is not required.
I'm running iRODS 4.2.10 on CentOS 7. The plugin is 4.2.10.1 Release
A rodsadmin specifies guarded metadata attributes and values:
A rodsuser can query all guarded metadata although it doesnt normally have right to make a catalog query for a collection that it has no access.
Strangely enough a rodsuser can also make db query for the zone collection:
Although it doesnt have access right on
/tempZone
: