Bug 6976

Summary: Wish: acl-manager(s) in kfm
Product: [Unmaintained] kio Reporter: Unknown <null>
Component: generalAssignee: Till Adam <adam>
Status: RESOLVED FIXED    
Severity: wishlist CC: adam, burnus, daeron, dr.dee, gaaf, gnor, ironfroggy, ivansb2003, jens-bugs.kde.org, kdebugtrackingsystem, landrews, rudd-o, tnagy256, torquil, uno
Priority: NOR    
Version: unspecified   
Target Milestone: ---   
Platform: unspecified   
OS: Other   
Latest Commit: Version Fixed In:
Sentry Crash Report:
Attachments: acls.png
ACL Dialog
acl dialog prototype
acl dialog prototype
file acl dialog prototype
dir/file acl dialog prototype
POSIX-ACL-support-kioslave.diff
POSIX-ACL-support-kio.diff

Description Robert =?Iso-8859-1?Q?Gr=E4b?= 2000-07-31 15:54:00 UTC
(*** This bug was imported into bugs.kde.org ***)

Package: kfm
Version: all
Severity: wishlist

Kfm currently supports only the 
standard unix file permissions.

But newer UNIX'es support access
control lists too. 
Furthermore there are filesystems 
such as AFS and DFS (which we use)
that support ACLs.

I think it would be a good idea to 
make the "Kfm/File Permissions" window 
aware of these ACLs or - better - provide 
an easy plugin mechanism for it.

Robert
Comment 1 John Firebaugh 2003-08-01 07:39:13 UTC
*** Bug 60374 has been marked as a duplicate of this bug. ***
Comment 2 John Firebaugh 2003-08-01 07:40:26 UTC
*** Bug 34172 has been marked as a duplicate of this bug. ***
Comment 3 Michael Nottebrock 2004-02-07 03:11:41 UTC
Four years later, still open, still unimplemented, still a good idea. Go for it! :-)
Comment 4 Stephan Kulow 2004-02-07 11:07:43 UTC
*** Bug 56580 has been marked as a duplicate of this bug. ***
Comment 5 Stephan Kulow 2004-02-07 11:08:37 UTC
*** Bug 23194 has been marked as a duplicate of this bug. ***
Comment 6 Stephan Kulow 2004-02-07 11:09:32 UTC
and still only 20 votes? We're still open for patches though
Comment 7 Christian Mayrhuber 2004-03-05 12:31:07 UTC
Would be nice to see, now that there are ACL's in 2.6.
One could even stop to manage ACL's with M$ Explorer
trough Samba ;-)
Comment 8 Julien 2004-03-12 17:20:19 UTC
It seems that there is already a fonctionnal implementation here :
http://www.kde-apps.org/content/show.php?content=11315
I'll test it soonly.
Comment 9 David Faure 2004-03-12 18:20:13 UTC
On Friday 12 March 2004 17:20, Julien wrote:
> It seems that there is already a fonctionnal implementation here :
> http://www.kde-apps.org/content/show.php?content=11315
> I'll test it soonly.

Good luck.
That's a mockup, not an actual implementation (it's just a .ui file).

Comment 10 Stephan Kulow 2004-03-16 10:44:12 UTC
*** Bug 77131 has been marked as a duplicate of this bug. ***
Comment 11 Manuel Amador (Rudd-O) 2004-03-17 01:07:09 UTC
The mockup is too complicated.  I mean, its a great step forward, but
it's too complicated for a regular user to be using.  The current
permission manager in konqueror is good enough for regular users, and
something like that should be extended to manage ACLs as well.


El vie, 12-03-2004 a las 12:20, David Faure escribió:
> ------- You are receiving this mail because: -------
> You are on the CC list for the bug, or are watching someone who is.
>       
> http://bugs.kde.org/show_bug.cgi?id=6976      
> 
> 
> 
> 
> ------- Additional Comments From faure kde org  2004-03-12 18:20 -------
> On Friday 12 March 2004 17:20, Julien wrote:
> > It seems that there is already a fonctionnal implementation here :
> > http://www.kde-apps.org/content/show.php?content=11315
> > I'll test it soonly.
> 
> Good luck.
> That's a mockup, not an actual implementation (it's just a .ui file).
Comment 12 Rene Horn 2004-03-23 20:52:01 UTC
Ideally, permissions should be a plug-in into kfm so that different permission sets can be easily adapted into kfm.  I would imagine that the best way to do this is to take some inspiration from the Linux kernel's security modules and create hooks into kfm that the plug-ins can control.
Comment 13 Morten Sjoegren 2004-05-17 03:30:44 UTC
I did really would like this to be implementet, for advanced users.
Comment 14 Andrew Somerville 2004-05-17 04:27:50 UTC
> The mockup is too complicated.  I mean, its a great step forward, but 
> it's too complicated for a regular user to be using.  The current 
> permission manager in konqueror is good enough for regular users, and 
> something like that should be extended to manage ACLs as well. 

You know what I say to that??? BS...that's a load of crap...I still haven't figured out the current one...the shell was a lot easier to understand than that, and I AM a relative newbie. There is no point in pretending that things are more complex then they are, just to make them look less confusing, and a 4 x 3 inch grid of check boxes, to me looks way more complex then simple unix file permissions should have to be.

I say that the mockup's ideas are lightyears ahead of the current system...and I might actually be more likely to use kfm if it looked a little more like that mockup. Way to go Julien!!!! I mean we're using unix, and there are well established sets of visuals associated with certain things like file permissions...like the rwx symbolism, which is nice to keep...it makes the interface a lot faster for experienced users; and for newbies we can have a properties panel for each user...and provide the handholding in there, so that newbies can learn it the right way, instead of feeding them bullshit and making things look artificial, and misleading.

:) Just my thoughts...take them or leave them. :)
Comment 15 Christian Mayrhuber 2004-07-15 18:00:08 UTC
> Additional Comment #11 From Manuel Amador (Rudd-O) 2004-03-17 01:07 ------- 
> The mockup is too complicated.  I mean, its a great step forward, but 
> it's too complicated for a regular user to be using.  The current 
> permission manager in konqueror is good enough for regular users, and 
> something like that should be extended to manage ACLs as well. 

Maybe, but regular users won't need ACL's at all, they normally are pretty much happy with the standard unix permissions.
If a user is using ACL's he/she should know what he/she is doing.
Even splitting the dialog into two parts makes sense. The ACL part can be
hidden or disabled if the filesystem is not mounted with acl's.
What I'm missing in this dialog is how to deal with default ACL entries.
Comment 16 David Faure 2004-07-15 18:08:23 UTC
On Thursday 15 July 2004 18:00, Christian Mayrhuber wrote:
> What I'm missing in this dialog is how to deal with default ACL entries.

The ACL tab which I implemented in KMail (for IMAP folders) could be a good model to follow.

Comment 17 Christian Mayrhuber 2004-07-15 18:39:01 UTC
Hmm, these changes seem to be in CVS since may 2004 and are not part
of an official kmail release. Screenshot anyone?
If this dialog can do ACL's + Default ACL's I would prefer to see it in
konqueror, too.
Dealing with ACL's should look the same in every kde app.
Comment 18 David Faure 2004-07-15 19:18:19 UTC
Maybe I misunderstood what "Default ACLs" is.
Anyway here's the kmail dialog.



Created an attachment (id=6688)
acls.png
Comment 19 Christian Mayrhuber 2004-07-16 12:42:47 UTC
From the getfacl manpage:
Manpage author: Andreas Gruenbacher, <a.gruenbacher@computer.org>
----SNIP----
       If getfacl is used on a file system that does not support  ACLs,  get-
       facl  displays  the access permissions defined by the traditional file
       mode permission bits.

       The output format of getfacl is as follows:
               1:  # file: somedir/
               2:  # owner: lisa
               3:  # group: staff
               4:  user::rwx
               5:  user:joe:rwx               #effective:r-x
               6:  group::rwx                 #effective:r-x
               7:  group:cool:r-x
               8:  mask:r-x
               9:  other:r-x
              10:  default:user::rwx
              11:  default:user:joe:rwx       #effective:r-x
              12:  default:group::r-x
              13:  default:mask:r-x
              14:  default:other:---

       Lines 4, 6 and 9 correspond to the user, group and other fields of the
       file  mode  permission  bits.  These  three  are  called  the base ACL
       entries. Lines 5 and 7 are named user and named group entries. Line  8
       is  the  effective rights mask. This entry limits the effective rights
       granted to all groups and to named users. (The file owner  and  others
       permissions  are  not affected by the effective rights mask; all other
       entries are.)  Lines 10--14 display the default  ACL  associated  with
       this  directory.  Directories  may  have  a default ACL. Regular files
       never have a default ACL.
----SNAP----
Comment 20 Calum 2004-09-08 23:23:54 UTC
Is there any work going on on this? I would love to see this implemented.

The users are clamouring for it!! :)
Comment 21 kris 2004-10-15 18:23:16 UTC
http://evidence.sourceforge.net/features.html, http://evidence.sourceforge.net/screenshots/info_acl.jpg

They also do xattr. If you have questions on evidence, contact azundris@azundris.com
Comment 22 kris 2004-10-15 18:26:43 UTC
http://bugs.kde.org/show_bug.cgi?id=43895 is a duplicate of this one.
http://bugs.kde.org/show_bug.cgi?id=40826 is a duplicate of this one.
http://bugs.kde.org/show_bug.cgi?id=67112 is a duplicate of this one.
http://bugs.kde.org/show_bug.cgi?id=80973 is a duplicate of this one.

Dragging Konqui into the 21st century, kicking and screaming... :)
Comment 23 Tom Albers 2004-10-15 19:24:55 UTC
*** Bug 40826 has been marked as a duplicate of this bug. ***
Comment 24 Tom Albers 2004-10-15 19:28:37 UTC
*** Bug 80973 has been marked as a duplicate of this bug. ***
Comment 25 Roger 2004-10-16 05:13:23 UTC
Created attachment 7895 [details]
ACL Dialog

After a bit of googling I found what Windows 2003 does for ACL's.  They seem to
be present all over the place.

The attached screenshot seems to be a little more professional looking and
long-list friendly than the dialog from evidence.

The username box is usually filled with entries like "DOMAIN\username" and a
special "Everyone" entry which is the default ACL to use.  You can also specify
groups in here as well to fully exploit ACL's.	The simple "Allow / Deny"
interface is user friendly too. Please take a look.
Comment 26 uno 2004-10-17 00:29:05 UTC
ACLs is not something new for windows 2003, it been around in windows at least since NT4. Given the mysterious popularity of windows, there are probably more people who knows how to use ACLs than how to use standard unix permissions in combinations with groups to do advanced permissions management. 

As I see it the main problem with KDE not being aware of ACLs is not that you can't set them from a KDE GUI  but rather that you can not see them at all. This could be a potential security problem if windows users logged in trough samba have better control over permissions than the unix sysadmin. 

But then again if we just changed the file permissions dialog to display it, most people would wonder why they had to resort to windows or the command line to change them.
Comment 27 kris 2004-10-17 10:24:53 UTC
ACL support and EA support is deeper than just a change dialog. You need to keep them around when copying files, and you need to check if they are available on the target file system, and if not, need to warn the user about losing them. When creating archives, you need to check if the chosen archive format supports them, and if not, need to warn the user about the information loss.
Comment 28 uno 2004-11-07 15:29:09 UTC
True, ACL is more than a change dialog. Perhaps we should start with creating warnings when ACLs are destroyed due to copying to non ACL-aware locations and then focus on what the change dialog should look like. The current situation where people may unknowingly loose ACL information is a much more serious problem than not being able to change them from the GUI.

The fact that we can't see or change ACLs in KDE doesn't mean they doesn't exist.
Comment 29 mk 2004-11-12 12:49:47 UTC
In Bug #80973, which has been marked a duplicate of this bug, the enhancement request is extended not only to ACLs, but also to Extended Attributes.
The cleanest solution would be to make the "Meta Info" tab of the current Konqueror "Properties" Dialog automatically determine if the underlying filesystem supports extended attributes. If it does, the information shown there should include the information found in the extended attributes, and the user should have the option to add, delete or edit those attributes, if ACL or filesystem permissions entitle him/her to do so. Most extended attribute implementations (I recall XFS and ReiserFS) support at least two namespaces of extended attributes: the "root" and "user" layers. Konqueror should respect this fact, too.
Comment 30 mk 2004-11-12 12:58:55 UTC
http://wiki.kdenews.org/tiki-print.php?page=Ideas+for+saving+and+using+file+metadata

gives a nice introduction and some interesting thougths about this topic
Comment 31 Jens 2004-11-17 13:21:25 UTC
Thank you. I wrote it :-)

So, after fiddling with getfacl and setfacl for about an hour to fix the permissions for a Samba shared directory for ALL clients that we use (Linux, Windows, OSX), I am REALLY hungry for this feature.

Please tell me what needs to be done. I have the impression there is a somewhat-functional implementation in KDE CVS already. Where is it?

Thanks!
Comment 32 Calum 2004-11-17 13:30:43 UTC
Couldn't the first step be just to have a nice GUI for editting them?

Once that was working, and bugs and usability issues ironed out, people could then look at the problems raised in comment 27.
Comment 33 David Faure 2004-11-17 15:20:37 UTC
On Wednesday 17 November 2004 13:21, Jens B.Benecke wrote:
> I have the impression there is a somewhat-functional implementation in KDE CVS already. Where is it?

There isn't.
[There was one a few years ago but it had to be removed due to licensing problems].

Comment 34 Sean Harmer 2005-02-14 19:01:10 UTC
Created attachment 9624 [details]
acl dialog prototype
Comment 35 Sean Harmer 2005-02-14 19:02:15 UTC
Created attachment 9625 [details]
acl dialog prototype
Comment 36 Sean Harmer 2005-02-14 19:08:25 UTC
Created attachment 9627 [details]
file acl dialog prototype
Comment 37 Sean Harmer 2005-02-14 19:09:59 UTC
Created attachment 9629 [details]
dir/file acl dialog prototype
Comment 38 Sean Harmer 2005-02-14 19:11:43 UTC
OK I've started implementing support for ACLs in KDE. So far I've got code to detect support for ACLs under linux and a prototype KFileProperties dialog plugin to display/edit them (see attached screen shots above). I'll post again when I get some more done, hopefully at the weekend.

Sorry for the multiple posts of screen shots - I didn't think konqy was responding and clicked on submit twice by mistake.
Comment 39 Gary Greene 2005-02-14 20:21:50 UTC
The only issue I have with the UI is that this should _replace_ the UI for permissions if ACLs are enabled. The user should never see two spots to manage the perms of a file.
Comment 40 Sean Harmer 2005-02-14 20:32:22 UTC
>The only issue I have with the UI is that this should _replace_ the UI for permissions if ACLs are enabled. The user should never see two spots to manage the perms of a file.

Agreed, I just haven't removed the original permissions plugin yet while I'm developing the ACL aware replacement.
Comment 41 Michael Nottebrock 2005-02-14 20:46:56 UTC
That's not consistent with the way POSIX ACLs are implemented though. They *do* exist side by side with traditional permissions.
Comment 42 Gary Greene 2005-02-14 20:56:28 UTC
That's well and good for command line, Michael, but that just confuses users from a usability stand point with GUIs. Granted, the POSIX acl standard sucks in that regard, since it allows for that kind of over-engineering, but it doesn't mean that KDE should follow suite.
Comment 43 Sigmund Scheinbar 2005-02-14 21:13:16 UTC
IMHO is Gery Greene is really right, there really should ony be one place of handling acl! Have a look an M$ Win there is also only one place for ACL's. 

Btw. what about the ACL's on Solaris? It supports a *little* more than Linux. (Just an idea for the future :). 

I would be _really_ glad if kde 3.4 came with this ACL manager! 
Comment 44 Michael Nottebrock 2005-02-14 21:18:02 UTC
Please, don't state highly subjective opinions about "confusing" UIs and pretend it's about usability. 

Disabling traditional the UI for traditional permissions would be the actual usability bug, since you can't just infer from the availibility of ACLs that the user of the filesystem wants to use them at all. Or do you delete chmod and chown on machines with set/getfacl available? (*)

* That comparison isn't as ridiculous as it may sound - the difference in complexity and difficulty of usage of set/getfacl and chmod/chown reflects quite nicely in the ACL UI vs the tradional permissions UI
Comment 45 Gary Greene 2005-02-14 21:34:55 UTC
First, in reply to comment 43, this likely won't make it until KDE 4.

Second, in reply to comment 44:
IIRC, ACLs (at least on Linux, I'm uncertain about other *NIXs) require that the ACL aspect be enabled as a mount option to the FS volume I see this as a moot point. If the user wants to use ACLs they enable it, if not, then they don't and shouldn't see the ACL configuration page at all.
Comment 46 Michael Nottebrock 2005-02-14 21:54:42 UTC
It's quite common for users (we're talking multiuser OS after all) to have their home directories on a filesystem they don't have control over. :-)
Comment 47 Gary Greene 2005-02-14 22:09:11 UTC
In those cases, if the admin doesn't want to enable their users and teach them about ACLs (which users are getting accustomed to ACLs under Windows anyway...), the admin should have their /home volume mounted WITHOUT ACL support. I still cannot see a reason to keep the permissions page enabled if the ACL one is active.
Comment 48 Michael Nottebrock 2005-02-14 22:42:56 UTC
I believe you really just proved my point, with the "teach them about ACLs" bit, allowing me to go silent again on this topic:

Requiring user re-training surely can't be anyone's idea, yours included, of good UI design (and the implementation of ACLs as a superset of traditional unix file permissions/ownership avoids exactly that issue).
Comment 49 Sean Harmer 2005-02-14 23:12:33 UTC
As of now I actually check for the existence of the acl mount parameter in determining if a filesystem supports ACLs or not.

I am intending to show the ACL plugin dialog if the fs on which a file/files resides supports ACLs. Else if the fs does not support ACLs just display the existing perms plugin dialog.

It is true that POSIX ACLs extend the normal permissions but the basic ACL has a one-to-one mapping with the usual permission model (not including the special flags sticky etc). Thus the ACL plugin dialog can be used as a replacement for the usual permission plugin diaog in the case that ACLs are supported by the underlying fs.

As for time scales, this will have to wait for KDE 4 I suspect as I think it will include binary incompatible changes to the 3.x series w.r.t. the KFileItem class - although I need to investigate this more closely. If I can do it in time for 3.5 (if it happens at all) then I will, but 3.4 is already in feature freeze.
Comment 50 Gary Greene 2005-02-14 23:17:54 UTC
Sometimes, especially with as far reaching as ACLs are, when you have new features, you cannot just ignore the fact that there will be retraining involved irregardless. If the admin enables ACLs and the two seperate pages, one for UNIX permissions and the other for POSIX ACLs, are shown, do you think support calls will go down? As a person who works helpdesk at a local university I can tell you that this is simply not true. It wil be the reverse. Why? Because most users will be confused about the fact there is this extra page that LOOKS a lot like an extra permissions setting page. Which do they use? Answer me that after looking through the eyes of the common user.
Comment 51 Jens 2005-02-15 08:27:02 UTC
Hi,

first, I love the fact that somebody is actually implementing ACL support in KDE. Thank you!!!

However, I have to say I too, would not like the idea of two seperate tabs for UNIX permissions and ACLs. Consider the "network sharing" problem: At some point, KDE had *three* different tabs that allowed you to share files over the network. One was kpf, which had to be enabled in KControl by root before being useable (why was it there at all, then?). The other was Samba, which would have been the "default" idea of sharing folders (it being the de facto standard everywhere else). Then there was a third option, which I forgot.

This just bloats the properties. If you want to seperate ACLs and UNIX permissions, put a button "Advanced permissions ..." in the Permissions tab, and merge the existing file permissions with the ACLs (just like setfacl/getfacl do it).

Just putting in more and more options does not really help. If you publish the UI file for the dialog here, I will send you a patch with my ideas.


But anyway, thanks again for actually starting this :-)


Ciao

Jens
Comment 52 Moritz Bunkus 2005-02-15 08:56:03 UTC
In reply to <a href="http://bugs.kde.org/show_bug.cgi?id=6976#c45">comment 45</a>:
Please note that XFS does not require a special mount option for ACLs. I think there's not even an option for turning them off. You can only turn support off in the Kernel itself.
Comment 53 Sean Harmer 2005-02-15 09:19:52 UTC
Thanks for the heads up w.r.t. XFS Moritz, I wasn't aware of this. Do you know if this is this also the case for any other fs's?

Just to reiterate I am *NOT* intending to show two tabs for editing permissions. If the underlying fs supports ACL then *only* the ACL tab will be shown. Otherwise, if the fs does not support ACL then the usual permissions tab will be shown. At least this is the plan for the moment and is subject to change better ideas etc.
Comment 54 Moritz Bunkus 2005-02-15 09:31:36 UTC
Unfortunately not. At work we use XFS on all machines. For remote access we use NFS with ACL patches included. NFS doesn't need a special option either as long as you use nfsvers=3. NFS does know a flag for turning ACL off, though (no_acl).

So it looks like relying on special mount options having been given will not work very reliably.
Comment 55 Tim Edwards 2005-02-15 12:19:31 UTC
Maybe you've already thought of this but a good way of handling the traditional ugo permissions would be to have them as always-there entries in your ACL dialog that can't be deleted, ie. they can only be modified. Maybe they could be greyed out a bit or something to inforce in the user's mind their non-deletable status.

Also I think it might be a better idea if we kept the existing tabs on the properties dialog and just made your ACL dialog replace the 'Advanced Permissions' dialog from the existing permissions tab. That way you'd still have the simple 'Can View Content', 'Can Read' etc. dropdowns with all the configurability of the ACLs in the Advanced dialog.

Just 'cause ACL is enabled on the filesystem doesn't mean users want to use it for every directory, and it doesn't mean we have to lose the simple and very user friendly permissions dialog we have now. 

ACLs on Linux werent designed as an all-or-nothing approach. Its not a case of if you enable them on the file system you have to use them for every directory. The great thing about them is you can pick and choose which files/directories you use them on and use the simpler standard permissions for the rest.
Comment 56 Stefan Briesenick 2005-02-15 13:10:07 UTC
I agree with Comment 51. We need ACLs and do *not* need two setting-dialogs for it. Less is more! The legacy unix permissions dialog changed in the past already. So I don't see a problem to change it again.

If one has no ACLs enabled, then only the legacy unix permissions are available in this dialog, otherwise you can also change ACLs.

But: when implementing ACLs, please don't forget EAs! One could store keywords, icons, annotations, etc. in EAs. I remember my old OS/2 days, where EAs where omnipresent. But you shouldn't mix ACLs with EAs. For EAs, we need a seperate property dialog. For this, the "Meta-Info" dialog could be extended (so reducing the number of TABs).
Comment 57 Stefan Briesenick 2005-02-15 13:16:15 UTC
@Sean (Comment 53): then we still have 2 kind of dialogs. That's odd from the user's point of view. Because depending on the FS you see different dialogs. That's confusing! The new ACL-Dialog should *replace* the old Unix-Permissions-Dialog completely!
Comment 58 Jens 2005-02-15 13:19:03 UTC
Hi,

to comment 56: EAs are fine, however they only make sense if there is some definite application support for it. See my write-up on the KDE wiki, also mentioned earlier on this bugreport's comment list:
http://wiki.kdenews.org/tiki-print.php?page=Ideas+for+saving+and+using+file+metadata

I think this bug should really concentrate about *permission* attributes, not *metadata* attributes. Otherwise we'd open a wholely different can of worms and never finish. Been there, done that. :-)

Jens
Comment 59 Stefan Briesenick 2005-02-15 13:22:44 UTC
@Comment 54: I'm not aware of the ACL-API (should read the man pages). But: to display the ACL-Dialog, you have to read the ACLs. And the API *should* give you an error like "no ACL support". The other case, ACLs supported but not set, should give you an empty list. So, when using only one dialog, we should have no problems at all.

Display the ACL-Dialog, try to read the ACLs. Then, depending on the error-code, display only Unix-Permissions or all ACLs.

Trying to identify ACL support via mount-options is stupid!
Comment 60 Stefan Briesenick 2005-02-15 13:27:04 UTC
@Comment 56: I agree, EAs should go into an own "Bug".

But: If you implement EA-Handling just as the old Metadata-Handling, you're finished. EAs are basically meta-informations stored along the file in the FS, not *IN* the file. But the handling should be really the same. So you have key=value pairs, no matter if they're stored in or along the file.
Comment 61 Stefan Briesenick 2005-02-15 13:36:14 UTC
I was right! The ACL-API gives you an error, if ACLs are not supported:

man (3) acl_get_file:

[ENOTSUP]   The file system on which the file identified by path_p
            is located does not support ACLs, or ACLs are disabled.

So this is the way to go!
Comment 62 Calum 2005-02-15 13:49:27 UTC
From comment 57:

"That's confusing! The new ACL-Dialog should *replace* the old Unix-Permissions-Dialog completely!"

I didn't think ACLs were meant to replace the old permissions. They work with them, and extend them.
Comment 63 Stefan Briesenick 2005-02-15 14:07:16 UTC
no, but the new ACL-Dialog can handle also the old-style permissions as well.

But there was another idea, I like:

1. Using the old-style dialog
2. include a button "ACLs" in this dialog
3. grey it out if there's no ACL-support

then the ACL-Dialog should only handle the new-style permissions and not the old-style. But this way we can use the old dialog and don't have a seperate TAB page for it and all things are kept together. Greying out the ACL button is better than not displaying it, since you can use a tooltip then "no ACLs available on this file/directory" which is less confusing than the newbie-question "where is that damn ACL button gone?" ;-)
Comment 64 Sean Harmer 2005-02-15 14:37:54 UTC
A problem that I can see with the idea in comment 63 is that there will then be 3 places which need to be synchronised to show the same permissions information

1. The old-style permissions dialog
2. The advanced permissions dialog that can be launched from 1.
3. The new ACL dialog that would also be launched from 1.

Which of these three solutions would be preferable (a little vote???):

A. Totally replace the old-style permissions dialog with a new ACL dialog. This can work because of the 1-to-1 mapping of permissions to a non-extended ACL. In the case that ACLs are supported the dialog can highlight the fact that extra ACL entries can be added by enabling the "Add Entry" button. Then, regardless of whether ACLs are supported or not the dialog would always show the ACL_USER_OBJ, ACL_GROUP_OBJ and ACL_OTHER ACL entries as these are the ones which correspond to the usual permissions. These entries can be shown with a different icon or in a different colour to differentiate them from ACL_USER and ACL_GROUP entries. The user will never be allowed to delete the ACL_USER_OBJ, ACL_GROUP_OBJ and ACL_OTHER entries only modify them.


B. Use the existing permissions dialog, but replace the Advanced permissions dialog with an ACL dialog.

C. Something else?

Thinking about it, either of these solutions would appear to be acceptable. Comments/new suggestions?
Comment 65 Jens 2005-02-15 15:07:15 UTC
I would totally vote for solution A - replace the dialog and integrate normal UNIX permissions into the new dialog.
Comment 66 Biro Arpad 2005-02-15 15:39:15 UTC
One more vote for A.
Comment 67 Timo Springmann 2005-02-15 15:54:18 UTC
I think solution B is the way to go. Comment #44 and #48 are showing good reasons for this solution.
Comment 68 David Vogt 2005-02-15 17:25:56 UTC
I would vote for version A as well - Why have two dialogs if we can display the same thing in a single one? It sounds logical to me to have some fixed entries there which represent the traditional permission model. 
Comment 69 Rodrigo Severo 2005-02-15 17:33:19 UTC
Here is another vote for B.

As already mentioned, comment #44 and comment #48 stake good reasons to go for B but there is also the issues mentioned in comment #55.
Comment 70 Stefan Briesenick 2005-02-15 17:58:08 UTC
Well, I like A but I would have no problem with B. But as mentioned, B means *replacing* the "advanced" dialog. So you have a simple dialog for standard permissions and the "advanced" with for the expert + ACLs.

What we really NOT want is a new TAB for ACLs.

btw: do we have some dialog for quotas already? Is this a different topic or would it make sense to incorporate it into the permissions dialog? How do Windows handles this?
Comment 71 Stefan Briesenick 2005-02-15 18:08:58 UTC
oh, btw: Windows also has two dialogs for "ordinary" Flags like "Archive", "Readonly" and "Hidden" ("System" is hidden from the user at all) and for ACLs.

So B would be the way to go.
Comment 72 Gary Greene 2005-02-15 18:18:43 UTC
responding to comment 70:
Quotas on Win32 are handled on a seperate tab and only at the drive root properties.

responding to comment 71:
The "ordinary" flags are useless under Windows 5.x and above. The only one that actually does ANYTHING is the hidden flag. The Archive flag doesn't get used for anything anymore and the Read-only flag stopped working when they moved to NTFS, since the FS has ACLs.
Comment 73 kris 2005-02-15 18:29:19 UTC
#70: In UNIX, Quotas can be set by root only, and are per User or per Group and per Filesystem. So Quotas are a read-only ressource for users, but cannot be edited.
Comment 74 Leo Spalteholz 2005-02-15 19:15:21 UTC
I'd vote for A.  The acl property page shown in the mockup is very straightforward and clear.  

If there is no ACL support, there would just be three entries in that list (user/group/world) that cannot be deleted.  If there is ACL support, you can add new rules to the first 3.

I'm not a huge fan of the traditional property page anyway.  I don't think that a 3 by 3 grid of checkboxes is either pretty or more usable than a list like in the mockup.
Comment 75 Stefan Briesenick 2005-02-15 19:43:21 UTC
@Comment #73: Hi Kristian! What are you doing here? ;-)

Quotas may be set only by root. But the same applies to NFS-Shares and ACLs which where set by root and where the user has no access. You need an "administrator mode" button for this purpose. 

Nonetheless, quotas are part of the filesystem access policy and so there should be some kind of GUI for it, when we also support ACLs and Shares.
Comment 76 Tim Edwards 2005-02-17 08:21:47 UTC
I vote for B definately. I think its a mistake to assume that if its enabled on the file system that all users will want to use ACLs for every file and directory. 

They're often (in my experience) only used for special directories (eg. a GNU Arch repository) while you use the normal UNIX permissions for the rest since they're simpler and easier.
Comment 77 Jens 2005-02-17 11:13:26 UTC
I'm still for A: I think it's confusing to show people two different concepts of assigning rights to files if they can be presented in a way so that one is a subset of each other.

However, if the FS supports ACLs but is also shared via Samba or NFS, the ACLs will be respected (at least by Samba) *but* will not (always - depending on mount options?) be visible on the client (so far, at least). But I guess we don't have to care about that, because eventually the network filesystems will have to catch up.

Cheers, and thank you for the hard work!


Jens
Comment 78 Rene Horn 2005-02-18 06:04:55 UTC
You can count this as a vote for option A since I completely agree with Comment 74.

Also, did everyone just skim over my comment, Comment 12?

I fear that the resolution to this bug will create a permissions dialog that's only useful to POSIX ACLs, particularly when there are other ACL paradigms out there.  For example, NDS and AFS aren't well known for conforming to POSIX ACLs, and it would be a shame if the new dialog couldn't handle them.

Also, with a plugin system for ACLs, we can have a default dialog box that works for most ACL systems, but if, like above, some filesystem uses something other than POSIX ACLs, or perhaps the administrator doesn't like the default, she change it.

I would really like to see this happen, but I'd be disappointed if it could only handle POSIX ACLs.
Comment 79 Sean Harmer 2005-02-18 09:13:44 UTC
At comment #78: Yes I have been thinking about different plugins fo rthe ACL dialog as we use Novell servers at work and it would be nice to be able to change access rights from within konqy for these file systems.

My long term plan of action is to get a working implementation of a dialog for POSIX ACLs. Then whenI'm happy with this look at converting it to an "ACL plugin" (even though all tab pages are plugins themselves to KProperties dialog). Or if it doesn't make sense to have plugins to a plugin, then to develop more plugins for other types of ACL and then decide at run time which of the ACL tab pages to show depending on which fs the selected files reside on. This could be tricky though since you can mount fs's anywhere, not sure how you would handlean NDS fs mounted in a dir on a reiserfs fs for e.g. Any ideas?

All this is a way off yet though. I'll do some more on the POSIX ACL dialog this weekend.
Comment 80 uno 2005-02-18 11:21:05 UTC
I vote for Sean Harmers version  A:

To have more than one place to look for file permissions will only lead to misstakes. Posix ACLs is just more of the same thing, so I can't see any
reason to separate them from the rest. It will only lead to support questions, from people not aware of the extra dialog, wondering why permissioins doesn't work.

People, could also make mistakes like writing personal things in files that they by mistake think is readable by them and only them if they don't know of a separate Posix ACL dialog.
Comment 81 Lee Braiden 2005-02-18 21:54:44 UTC
One more vote for exactly what Comment 74 describes.  That's the way I've always imagined it working, and I've been imagining and thinking about this in GNOME, KDE, and E-17 for a few years now :)

Great to see someone working on this :D   Any sort of ETA on this?  I guess it hasn't made 3.4?
Comment 82 lorenzo 2005-02-18 23:27:56 UTC
<AOL-me-too-mode> Just one more vote for A </AOL-me-too-mode>
Consistency rocks!
Comment 83 soloturn99 2005-02-23 03:36:51 UTC
A
Comment 84 Alex Hermann 2005-03-07 21:44:03 UTC
Please just use one dialog for all permissions, my vote goes to option A.
Comment 85 mathias dufresne 2005-03-08 23:24:49 UTC
Yes of course one dialog box is better than 36, so I vote A :)
Comment 86 Silviu Marin-Caea 2005-05-15 10:32:21 UTC
tnagy256@yahoo.fr, your ACL viewer seems like duplicate effort for ACLs in KDE.

Maybe you guys can split the programming load between you.

http://www.kde-apps.org/content/show.php?content=24097

Description:
A small ACL viewer/editor. Editing the Posix Access Control Lists (ACL) is usually done with obscure command-lines (ie: setfacl -m u::7,u:34:4,u:35:6,g:2:1,g:0:7,g:3:4 file.txt). This ACL viewer/editor offers a better visualization.
Comment 87 Sean Harmer 2005-05-19 21:59:31 UTC
OK - sorry for the delay, been moving house. Anyway I've checked in some code to trunk/playground/base/acldlg. It's not particularly pretty code, although I think that the dialog looks OK. It's just a very simple app that displays the access ACLs on a list of files passed in on the command line. 

You can alter the existing ACL entries in the dialog, but you can't apply any changes that you make yet. Also, you can't add new entries yet.

Launch the app with "acldlg file1 file2 ... filen".

I'll add some more features this weekend.
Comment 88 tnagy 2005-05-19 23:46:48 UTC
oki, good luck :)

Regards,
Thomas

--- Sean Harmer <sean.harmer1@ntlworld.com> a 
Comment 89 Till Adam 2005-06-13 10:06:46 UTC
SVN commit 424803 by tilladam:

First batch of changes largely extracted from patches by 
György Szombathelyi <gyurco@freemail.hu>, sent to the lists sometime
before 3.2 but sadly ignored, for various reasons. We're not entirely
sure yet that shipping the acls themselves via slave metadata is the
right way to go about things, but we'll start out from here and see
where it takes us. We being KDAB, namely David, Steffen and myself. If
you are actively working on anything related to POSIX ACLs atm, please
get in touch with me/us.

CCMAIL: gyurco@freemail.hu
CCMAIL: 6976@bugs.kde.org


 M  +12 -0     configure.in.in  
 M  +4 -1      kio/kio/global.h  
 M  +36 -0     kio/tests/kioslavetest.cpp  
 M  +1 -0      kio/tests/kioslavetest.h  
 M  +1 -1      kioslave/file/Makefile.am  
 M  +518 -205  kioslave/file/file.cc   [POSSIBLY UNSAFE: system]
 M  +6 -0      kioslave/file/file.h  
Comment 90 Till Adam 2005-08-07 12:14:07 UTC
Heya folks,

please find attached two patches, one against kdelibs/kioslave/file and one 
against kdelibs/kio, which together implement support for managing POSIX ACLs 
on filesystems that support it. Please review, I'll then merge this into 3.5.

The backend is based off of patches by Gy
Comment 91 Jens 2005-08-07 12:34:48 UTC
This is fantastic! Thank you for doing this! Where do I send the pizza? ;-)

Do you have a screenshot how the dialog looks? Or an UI file?
Comment 92 Biro Arpad 2005-08-07 15:33:31 UTC
Thank you for implementing it. It was badly needed.
Comment 93 Till Adam 2005-08-07 15:42:59 UTC
Looks like this: http://kdab.net/~till/kacl-dialog.png
Comment 94 David Faure 2005-08-07 22:27:07 UTC
The "special" checkboxes should probably be laid out horizontally now that they are
the only ones left, to give more room to the listview below.
Comment 95 Till Adam 2005-08-07 23:03:50 UTC
Yep, I'm currently cheating and simply hiding the others, but I guess I need to lay them out myself.
Comment 96 Maksim Orlovich 2005-08-08 20:33:07 UTC
*** Bug 110411 has been marked as a duplicate of this bug. ***
Comment 97 Till Adam 2005-09-01 21:24:52 UTC
SVN commit 455966 by tilladam:

Finally merge the acl editing from the working branch. Please test, I'll
polish it over the coming days, now that I finally have some time for
it. Yes, binner, I know there are style guide violations, I will fix
them. The other pending issue is making the icons themeable.

Coordinated with coolo.

BUG: 6976


 M  +8 -0      configure.in.bot  
 M  +13 -0     configure.in.in  
 M  +1 -1      kio/Makefile.am  
 M  +2 -2      kio/kfile/Makefile.am  
 A             kio/kfile/images.h   [License: no copyright GENERATED FILE]
 A             kio/kfile/kacleditwidget.cpp   [License: GPL (v2+) (wrong address)]
 A             kio/kfile/kacleditwidget.h   [License: GPL (v2+) (wrong address)]
 A             kio/kfile/kacleditwidget_p.h   [License: GPL (v2+) (wrong address)]
 M  +111 -37   kio/kfile/kpropertiesdialog.cpp  
 M  +8 -2      kio/kio/Makefile.am  
 M  +7 -0      kio/kio/chmodjob.cpp  
 M  +12 -2     kio/kio/global.h  
 A             kio/kio/kacl.cpp   [License: LGPL (v2+) (wrong address)]
 A             kio/kio/kacl.h   [License: LGPL (v2+) (wrong address)]
 M  +49 -10    kio/kio/kfileitem.cpp  
 M  +22 -0     kio/kio/kfileitem.h  
 A             kio/tests/kacltest.cpp   [License: LGPL (v2+) (wrong address)]
 A             kio/tests/kacltest.h   [License: LGPL (v2+) (wrong address)]
 M  +226 -35   kioslave/file/file.cc  
 M  +6 -1      kioslave/file/file.h  
Comment 98 Till Adam 2005-09-16 19:42:57 UTC
Out of curiosity, has anyone tested it yet? It's in the 3.5 beta1, so I'd appreciate any feedback you guys can give me, so I have a chance to resolve outstanding issues in time for 3.5 final. Thanks.
Comment 99 Jens 2006-01-02 16:58:09 UTC
Hello,
I just upgraded to KDE 3.5 (OpenSuSE 10.0 supplementary update) and the ACL dialog seems to work fine. Great work! :-)

However, since KDE 3.5 uses its own IO protocols heavily (ie. for the /boot directory Konqueror shows "system:/media/hda1/boot", for the home directory it shows "system:/home", etc) it should also work on those kinds of URLs. Is it possible / easy to implement this?

Jens
Comment 100 Till Adam 2006-02-04 15:56:13 UTC
Can you please file a new wish for this, Jens? I'll have a look for KDE 4.