Is there some kind of standard configuration for a...
# ask-community
s
Is there some kind of standard configuration for a "Custom Role" that would basically be a "Read Only" user with the additional enhancement of being able to execute flows on an ad hoc basis? I created a custom role that mimicked the standard "Read Only" role, and gave it
Create
access on
Flow > Run
and
Flow > Logs
, but the person whom I gave this role was still unable to actually create a flow run from the prefect UI
it's a little difficult to see, but there are a few flow runs that the person in my org tried to kick off by just clicking "Quick Run", but nothing ever happened โ€“ the flow doesn't appear to have ever started, no logging, etc.
(that one green run there is from me, an admin, going and clicking "Quick Run" myself)
n
Hi @Sean Talia - could you try giving them
update
permissions on runs as well?
๐Ÿ‘ 1
s
okay I think that works! is there any kind of guide somewhere that explains what each of the CRUD actions grants for the various features? it's not intuitive to me that they'd need create + update permissions to deploy a flow
n
Unfortunately we don't have a full guide for that yet but in this case it's because when a run is created we do an immediate lookup for idempotency and update the run accordingly. I'm going to pass this to the Cloud team and see if there's perhaps a better way to handle that
๐Ÿ‘ 1
s
hey @nicholas โ€“ I've got another question on this subject. One of our users is trying to add / update a README to the flow they just published, but the UI is showing the
GraphQL Error: Unauthorized
when they go to save the edits they've made. Is there a certain set of create + update permissions they need for this one as well? I would have thought this was sufficient for editing a flow README:
n
Hm you're correct, that should be sufficient @Sean Talia - let me raise the issue. Can you do me a favor and have the user run this query in the InteractiveAPI and send me the result?
Copy code
query {
  permissions_info {
    user_permissions_filtered_by_license_features
  }
}
s
yep! Here you go: { "data": { "permissions_info": { "user_permissions_filtered_by_license_features": [ "read:key-value", "read:role", "create:flow-sla", "read:project", "read:api-key", "create:key-value", "read:usage", "read:secret-value", "read:agent", "update:log", "create:log", "read:flow-sla", "read:user", "read:log", "create:flow", "delete:message", "read:cloud-hook", "read:service-account", "update:run", "read:membership", "update:message", "update:flow", "create:run", "update:user", "read:message", "read:tenant", "read:concurrency-limit", "read:flow", "read:secret", "read:hook", "read:license", "create:membership", "update:membership", "read:run", "create:hook", "create:message" ] } } }
n
thank you! let me look into this
s
alright my teammate told me itโ€™s working for her now โ€” Iโ€™m wondering if it just takes a little while for the changes to take effect Thatโ€™s my bad, I should have waited more than a few minutes to give her the go-ahead
n
Ahh I was just returning to ask if the issue persisted
Sometimes auth changes take some time to clear the cache
(this is a security feature to prevent abuse by any one user)
๐Ÿ‘ 1