Edgewall Software

Changes between Version 5 and Version 6 of 1.3/TracPermissions


Ignore:
Timestamp:
Oct 15, 2019, 6:28:09 AM (5 years ago)
Author:
trac
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • 1.3/TracPermissions

    v5 v6  
    1313== Graphical Admin Tab
    1414
    15 To access this tab, a user must have one of the following permissions: `TRAC_ADMIN`, `PERMISSION_ADMIN`, `PERMISSION_GRANT`, `PERMISSION_REVOKE`. The permissions can be granted using the `trac-admin` command (more on `trac-admin` below):
     15To access this tab, a user must have one of the following permissions: `TRAC_ADMIN`, `PERMISSION_ADMIN`, `PERMISSION_GRANT`, `PERMISSION_REVOKE`. The permissions can be granted using the `trac-admin` command with a more detailed description [#GrantingPrivileges below]:
    1616{{{#!sh
    1717$ trac-admin /path/to/projenv permission add bob TRAC_ADMIN
     
    3030== Available Privileges
    3131
    32 To enable all privileges for a user, use the `TRAC_ADMIN` permission. Having `TRAC_ADMIN` is like being `root` on a *NIX system: it will allow you to perform any operation.
    33 
    34 Otherwise, individual privileges can be assigned to users for the various different functional areas of Trac ('''note that the privilege names are case-sensitive'''):
     32To enable all privileges for a user, use the `TRAC_ADMIN` permission. This permission is like being `root` on a *NIX system: it will allow you to perform any operation.
     33
     34Otherwise, individual privileges can be assigned to users for the different functional areas of Trac and '''note that the privilege names are uppercase''':
    3535
    3636=== Repository Browser
     
    5252|| `TICKET_EDIT_COMMENT` || Modify another user's comments. Any user can modify their own comments by default. ||
    5353|| `TICKET_BATCH_MODIFY` || [TracBatchModify Batch modify] tickets ||
    54 || `TICKET_ADMIN` || All `TICKET_*` permissions, deletion of ticket attachments and modification of the reporter field, which grants ability to create a ticket on behalf of another user (it will appear that another user created the ticket). It also allows managing ticket properties through the web administration module. ||
     54|| `TICKET_ADMIN` || All `TICKET_*` permissions, deletion of ticket attachments and modification of the reporter field, which grants ability to create a ticket on behalf of another user and it will appear that another user created the ticket. It also allows managing ticket properties through the web administration module. ||
    5555
    5656=== Roadmap
     
    150150Any user who has logged in is also in the //authenticated// group.
    151151The //authenticated// group inherits permissions from the //anonymous// group.
    152 For example, if the //anonymous// group has permission WIKI_MODIFY,
    153 it is not necessary to add the WIKI_MODIFY permission to the //authenticated// group as well.
     152For example, if the //anonymous// group has permission WIKI_MODIFY, it is not necessary to add the WIKI_MODIFY permission to the //authenticated// group as well.
    154153
    155154Custom groups may be defined that inherit permissions from the two built-in groups.
     
    169168Permission groups can be created by assigning a user to a group you wish to create, then assign permissions to that group.
    170169
    171 The following will add ''bob'' to the new group called ''beta_testers'' and then will assign WIKI_ADMIN permissions to that group. (Thus, ''bob'' will inherit the WIKI_ADMIN permission)
     170The following will add ''bob'' to the new group called ''beta_testers'' and then will assign `WIKI_ADMIN` permissions to that group. Thus, ''bob'' will inherit the `WIKI_ADMIN` permission.
    172171{{{#!sh
    173172$ trac-admin /path/to/projenv permission add bob beta_testers
     
    177176== Removing Permissions
    178177
    179 Permissions can be removed using the 'remove' command. For example:
     178Permissions can be removed using the 'remove' command.
    180179
    181180This command will prevent the user ''bob'' from deleting reports:
     
    207206//**anonymous**//
    208207{{{
    209 BROWSER_VIEW 
    210 CHANGESET_VIEW 
    211 FILE_VIEW 
    212 LOG_VIEW 
    213 MILESTONE_VIEW 
    214 REPORT_SQL_VIEW 
    215 REPORT_VIEW 
    216 ROADMAP_VIEW 
    217 SEARCH_VIEW 
    218 TICKET_VIEW 
     208BROWSER_VIEW
     209CHANGESET_VIEW
     210FILE_VIEW
     211LOG_VIEW
     212MILESTONE_VIEW
     213REPORT_SQL_VIEW
     214REPORT_VIEW
     215ROADMAP_VIEW
     216SEARCH_VIEW
     217TICKET_VIEW
    219218TIMELINE_VIEW
    220219WIKI_VIEW
     
    223222//**authenticated**//
    224223{{{
    225 TICKET_CREATE 
    226 TICKET_MODIFY 
    227 WIKI_CREATE 
    228 WIKI_MODIFY 
     224TICKET_CREATE
     225TICKET_MODIFY
     226WIKI_CREATE
     227WIKI_MODIFY
    229228}}}
    230229----