To configure access demarcation between multiple products, CodeChecker has it's permission system. Each user can be assigned some permissions, and each action on the server requires a certain permission to be present - otherwise the action will fail.
The username and group values that permissions can be delegated to are retrieved via user credentials. For the permission system to work, authentication must be enabled, otherwise, the unauthenticated guest user will only have the default permissions given.
Different scopes of CodeChecker use different permissions. Currently, permissions can be defined on the server level (system/global permission), or on the product level.
- Permission subsystem
- Table of Contents
- The master superuser (root)
- Managing permissions
- Permission concepts
- Available permissions
At the first CodeChecker startup it is recommended that
you set up a single user with SUPERUSER
permission.
Then with this user you will be able to configure additional permissions
for other users in the WEB GUI.
Let's say you want to give SUPERUSER
permission to user admin
.
Then set super_user
field in the server_config.json
configuration file:
"authentication": {
"enabled" : true,
"super_user" : "admin",
...
- Server-wide permissions can be edited by clicking Edit global permissions.
- Product-level permissions can be edited by clicking the edit icon for the product you want to configure the permissions for.
Permissions can be managed on the web interface. From the drop-down, select the permission you want to configure. The two lists show the users and groups known to the system - if a tick is present in its row, the given user or group has the permission directly granted. (Users who only have a certain permission through permission inheritance are not shown with a tick.)
Only the permissions you have rights to manage are shown in the drop-down.
You can edit multiple permissions opening the window only once. Simply tick or un-tick the users/groups you want to give the permission to or revoke from them. Clicking OK will save the changes to the database.
Each permission has a unique name, such as SUPERUSER
or PRODUCT_ADMIN
.
Permissions can either be not granted or granted by default.
If the server is running with authentication – all permissions are default not granted, which means only the users (or LDAP groups) where the permission is explicitly set will have various access rights.
If the server is running without authentication – in this case there are no "users" as everyone is a guest – every permission is automatically granted.
Certain permissions automatically imply other permissions, e.g. a
PRODUCT_ADMIN
is automatically given every product-level permission.
Permissions achieved through inheritance are exempt from the default
behaviour mentioned above. If no user has the PRODUCT_ACCESS
permission,
every user will have it (because it is a default granted permission), despite
an existing PRODUCT_ADMIN
inheriting the permission.
Permissions have a clear "chain of command" set in CodeChecker. Only a user who
has permission A
's manager permission can grant or revoke other users' rights
to A
.
Developer guide: See the API documentation for the list of permissions and which API call requires which permission exactly.
Default |
---|
Not granted |
The SUPERUSER
permission is the highest possible permission available.
Superusers can manage and automatically have every permission in the system.
SUPERUSER
is a dangerous permission to grant, as a superuser can immediately change everything on the server, from demoting other superusers to destroying analysis results!
Default | Managed by | Inherited from |
---|---|---|
Granted | SUPERUSER |
SUPERUSER |
Users with this permission can get information about access controls: which
user or group has global permissions or permissions only for specific products.
For more information check the CodeChecker cmd permissions
command.
Default |
---|
Not granted |
The product administrator is responsible for the management of an individual product. They can edit the product's appearance (displayed name and description) and delegate other product-level permissions to other users.
Product administrators cannot change the URL or the database configuration of the product.
Product admins are automatically given other PRODUCT_
permissions.
Default | Managed by | Inherited from |
---|---|---|
Granted | PRODUCT_ADMIN |
PRODUCT_ADMIN , PRODUCT_STORE |
The basic permission to access analysis results stored in the product. With this permission, the user can browse analysis results, comment, set review status, etc.
Default | Managed by | Inherited from |
---|---|---|
Granted | PRODUCT_ADMIN |
PRODUCT_ADMIN |
Users need the PRODUCT_STORE
permission to store
analysis runs and to
delete existing analysis runs from the server.
Default | Managed by | Inherited from |
---|---|---|
Granted | PRODUCT_ADMIN |
PRODUCT_ADMIN , PRODUCT_STORE , PRODUCT_ACCESS |
Users need the PRODUCT_VIEW
permission to view
analysis runs without modifying any properties of the runs.