-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Permissions handling for network-level commands #23
Comments
Thanks for bringing up this issue Xe. I feel that Arata permissions should be stored per Arata account and should not rely on, nor be affected by, a user's network operator status. I'd like the permissions system to be more generic. This may have been what you were going for but I'd like to outline what I'm thinking for absolute clarity. DefinitionsA A A
An
A An account contains a list of zero or more |
I agree with those group and experssion ideas. As far as storing the permissions for users, I think a field should be added to the Account record representing the group name they are in (or Nothing). For the groups themselves, they should be stored in the database as well. By default Arata should create one group called Groups should be managed using a command in How does that look? |
I was thinking that an account would just have a list of permissions associated with it rather than a single group. This would still allow a group to be added as a permission but would also mean that the first account could simply be given the permission I agree that groups should be stored within the database, separately from users, and also that they should be managed using the Arata management service, however I don't know yet if the name of that service will be |
Ah, that makes sense. |
Currently I'm resolving the mess that has been given the name |
Arata needs a common definition of how to restrict commands from other users at the staff level. This is to (for instance) prevent an helper level staff member from forcibly dropping others accounts or killing off Arata.
I propose the following system for permissions handling:
As for permissions I propose the following:
$serv:snoop
$serv:manage
$serv:administer
Additionally, a command or subcommand may be allowed by the following:
OperServ:AKILL:ADD
Wildcard matching may also be used.
By default the following groups should be defined:
ChanServ:snoop NickServ:snoop OperServ:snoop OperServ:AKILL:ADD
helper, ChanServ:manage NickServ:manage OperServ:manage
oper *:administer
Groups may inherit from other groups and may not contain ":" in their name or contain a capital letter.
Possibly replaces #22 and #21.
The text was updated successfully, but these errors were encountered: