[ARVADOS] updated: 2.1.0-301-g855f66401
Git user
git at public.arvados.org
Fri Jan 29 22:16:06 UTC 2021
Summary of changes:
doc/api/permission-model.html.textile.liquid | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
discards fa41bad211d182b3c03b09801ae3e52aab5552e2 (commit)
via 855f6640159c884be776922625a45aeee8f88b10 (commit)
This update added new revisions after undoing existing revisions. That is
to say, the old revision is not a strict subset of the new revision. This
situation occurs when you --force push a change and generate a repository
containing something like this:
* -- * -- B -- O -- O -- O (fa41bad211d182b3c03b09801ae3e52aab5552e2)
\
N -- N -- N (855f6640159c884be776922625a45aeee8f88b10)
When this happens we assume that you've already had alert emails for all
of the O revisions, and so we here report only the revisions in the N
branch from the common base, B.
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
commit 855f6640159c884be776922625a45aeee8f88b10
Author: Ward Vandewege <ward at curii.com>
Date: Fri Jan 29 17:02:57 2021 -0500
17255: Document the "can_login" permission link in the API section.
Arvados-DCO-1.1-Signed-off-by: Ward Vandewege <ward at curii.com>
diff --git a/doc/admin/user-management-cli.html.textile.liquid b/doc/admin/user-management-cli.html.textile.liquid
index 8cebf02cd..e109222b9 100644
--- a/doc/admin/user-management-cli.html.textile.liquid
+++ b/doc/admin/user-management-cli.html.textile.liquid
@@ -133,7 +133,7 @@ $ ARVADOS_API_TOKEN=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx arv api_c
h2. Adding Permissions
-h3. VM login
+h3(#vm-login). VM login
Give @$user_uuid@ permission to log in to @$vm_uuid@ as @$target_username@
diff --git a/doc/api/permission-model.html.textile.liquid b/doc/api/permission-model.html.textile.liquid
index 7f1052129..675626ec2 100644
--- a/doc/api/permission-model.html.textile.liquid
+++ b/doc/api/permission-model.html.textile.liquid
@@ -38,7 +38,7 @@ A permission link is a link object with:
* @owner_uuid@ of the system user.
* @link_class@ "permission"
-* @name@ one of *can_read*, *can_write* or *can_manage*
+* @name@ one of *can_read*, *can_write*, *can_manage* or *can_login*
* @head_uuid@ of some Arvados object
* @tail_uuid@ of a User or Group. For Group, the @group_class@ must be a "role".
@@ -46,6 +46,8 @@ This grants the permission in @name@ for @tail_uuid@ accessing @head_uuid at .
If a User has *can_manage* permission on some object, the user has the ability to read, create, update and delete permission links with @head_uuid@ of the managed object. In other words, the user has the ability to modify the permission grants on the object.
+The *can_login* @name@ is only meaningful on a permission link with with @tail_uuid@ a user UUID and @head_uuid@ a Virtual Machine UUID. A permission link of this type gives the user UUID permission to log into the Virtual Machine UUID. The username for the VM is specified in the @properties@ field. See the "VM login section on the CLI cheat sheet":/install/cheat_sheet.html#vm-login for an example.
+
h3. Transitive permissions
Permissions can be obtained indirectly through nested ownership (*can_manage*) or by following multiple permission links.
-----------------------------------------------------------------------
hooks/post-receive
--
More information about the arvados-commits
mailing list