--
--
To unsubscribe, email repo-discuss+unsubscribe@googlegroups.com
More info at http://groups.google.com/group/repo-discuss?hl=en
---
You received this message because you are subscribed to the Google Groups "Repo and Gerrit Discussion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to repo-discuss+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
This change makes it possible to allow a permission for a specific ref and toblock the same permission for all other refs. For example, it is now possible toallow all users to push changes for review, but to block all direct pushes:
--- [access "refs/*"] push = block group Anonymous Users [access "refs/for/*"] exclusiveGroupPermissions = push push = group Registered Users---On Thu, Jul 6, 2017 at 2:45 AM, lfree <xh.dre...@gmail.com> wrote:For example, userA is both the Project Owner and Change Owner.I add these two rules:
- Project Owner is allowed to Label: Review -2 +2
- Change Owner is blocked(or denied) to Label: Review -2 + 2
Then what if userA push a commit to refs/for/master branch for review? Whether userA can review +2 or not?I tried this, the result is he can. But why? Are there any regulations for this behavior?If BLOCK and ALLOW rule are on the same project, the ALLOW rule wins.A BLOCK rule on a parent project cannot be overwritten by ALLOW rules on child projects.This semantic was changed with 2.14 [1,2]. Before this change ALLOW rules only overruled BLOCK rules on the same project if they were defined on the same ref, or ref pattern.
--
--
To unsubscribe, email repo-discuss...@googlegroups.com
More info at http://groups.google.com/group/repo-discuss?hl=en
---
You received this message because you are subscribed to the Google Groups "Repo and Gerrit Discussion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to repo-discuss...@googlegroups.com.
Hi Edwin, thanks for reply.I have read the 2.14 release notes from the urls you provided. I understand and agree with the change:I think that is reasonable because refs/for/* is more specific then refs/*.This change makes it possible to allow a permission for a specific ref and toblock the same permission for all other refs. For example, it is now possible toallow all users to push changes for review, but to block all direct pushes:---[access "refs/*"]push = block group Anonymous Users[access "refs/for/*"]exclusiveGroupPermissions = pushpush = group Registered Users---But when allow rule and block rule are on the same refs of the same project, does it suitable to simply let allow rule win the conflict?
On Thursday, July 6, 2017 at 2:20:01 PM UTC+8, Edwin Kempin wrote:On Thu, Jul 6, 2017 at 2:45 AM, lfree <xh.dre...@gmail.com> wrote:For example, userA is both the Project Owner and Change Owner.I add these two rules:
- Project Owner is allowed to Label: Review -2 +2
- Change Owner is blocked(or denied) to Label: Review -2 + 2
Then what if userA push a commit to refs/for/master branch for review? Whether userA can review +2 or not?I tried this, the result is he can. But why? Are there any regulations for this behavior?If BLOCK and ALLOW rule are on the same project, the ALLOW rule wins.A BLOCK rule on a parent project cannot be overwritten by ALLOW rules on child projects.This semantic was changed with 2.14 [1,2]. Before this change ALLOW rules only overruled BLOCK rules on the same project if they were defined on the same ref, or ref pattern.--
--
To unsubscribe, email repo-discuss...@googlegroups.com
More info at http://groups.google.com/group/repo-discuss?hl=en
---
You received this message because you are subscribed to the Google Groups "Repo and Gerrit Discussion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to repo-discuss...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
--
--
To unsubscribe, email repo-discuss+unsubscribe@googlegroups.com
More info at http://groups.google.com/group/repo-discuss?hl=en
---
You received this message because you are subscribed to the Google Groups "Repo and Gerrit Discussion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to repo-discuss+unsubscribe@googlegroups.com.
On Thu, Jul 6, 2017 at 10:08 AM, lfree <xh.dre...@gmail.com> wrote:Hi Edwin, thanks for reply.I have read the 2.14 release notes from the urls you provided. I understand and agree with the change:I think that is reasonable because refs/for/* is more specific then refs/*.This change makes it possible to allow a permission for a specific ref and toblock the same permission for all other refs. For example, it is now possible toallow all users to push changes for review, but to block all direct pushes:---[access "refs/*"]push = block group Anonymous Users[access "refs/for/*"]exclusiveGroupPermissions = pushpush = group Registered Users---But when allow rule and block rule are on the same refs of the same project, does it suitable to simply let allow rule win the conflict?Yes, this was always like this. This allows you to define rules like: Permission A is blocked for everyone except for group X, e.g. you can block direct push to refs/meta/config for all users, except for Administrators:[access "refs/meta/config"]push = block group Anonymous Userspush = group Administrators
[access "refs/for/*"] submit = group Developers submit = block group GreenDevelopers"I am both the project owner and change owner to which conflict rules are applied, then which rule should be preferred if a situation which both rules meet happend?"
On Friday, July 07, 2017 07:33:49 AM 'Edwin Kempin' via Repo
and Gerrit Discussion wrote:
> Just put the block rule on a parent project.
This sounds like a design flaw to me.
Since we have a
concept of project owners, it seems that it would be
consistent if we ensured that it were possible to setup
guidelines for a project within a project itself, and that a
project owner would never have to edit a parent project's
ACLs since they might not be project owners on the parent
project, and they might not have the permissions to do so.
In other words, it seems that the presumption is that in
order to define ACL rules now, one needs to be the server
administrator?