blob: e2feb81a1ab1e2aae2a87a1ccb02936ddb3f1bde [file] [log] [blame]
Shawn O. Pearcee31d02c2009-12-08 12:21:37 -08001Gerrit Code Review - Access Controls
2====================================
Shawn O. Pearce4b122b82009-02-18 18:22:14 -08003
4Access controls in Gerrit are group based. Every user account is a
5member of one or more groups, and access and privileges are granted
Matt Fischer620255a2011-03-22 14:28:23 -05006to those groups. Access rights cannot be granted to individual
7users.
Shawn O. Pearce4b122b82009-02-18 18:22:14 -08008
9
10System Groups
11-------------
12
Edwin Kempind2605ed2010-10-11 08:02:24 +020013Gerrit comes with 4 system groups, with special access privileges
Shawn O. Pearce4b122b82009-02-18 18:22:14 -080014and membership management. The identity of these groups is set
15in the `system_config` table within the database, so the groups
16can be renamed after installation if desired.
17
Edwin Kempin913eab12011-05-06 08:18:24 +020018[[administrators]]
Shawn O. Pearce4b122b82009-02-18 18:22:14 -080019Administrators
20~~~~~~~~~~~~~~
21
22This is the Gerrit "root" identity.
23
24Users in the 'Administrators' group can perform any action under
25the Admin menu, to any group or project, without further validation
David Pursehouse221d4f62012-06-08 17:38:08 +090026or any other access controls. In most installations only those
Shawn O. Pearce4b122b82009-02-18 18:22:14 -080027users who have direct filesystem and database access would be
28placed into this group.
29
30Membership in the 'Administrators' group does not imply any other
31access rights. Administrators do not automatically get code review
32approval or submit rights in projects. This is a feature designed
Nico Sallembienee6eaf02010-02-01 13:24:49 -080033to permit administrative users to otherwise access Gerrit as any
Shawn O. Pearce4b122b82009-02-18 18:22:14 -080034other normal user would, without needing two different accounts.
35
Fredrik Luthander8fa3d262011-11-07 17:04:01 +010036[[anonymous_users]]
Shawn O. Pearce4b122b82009-02-18 18:22:14 -080037Anonymous Users
38~~~~~~~~~~~~~~~
39
40All users are automatically a member of this group. Users who are
41not signed in are a member of only this group, and no others.
42
43Any access rights assigned to this group are inherited by all users.
44
45Administrators and project owners can grant access rights to this
46group in order to permit anonymous users to view project changes,
47without requiring sign in first. Currently it is only worthwhile
Fredrik Luthander5e1b51b2012-01-20 13:06:06 +010048to grant `Read` access to this group as Gerrit requires an account
Shawn O. Pearce4b122b82009-02-18 18:22:14 -080049identity for all other operations.
50
Fredrik Luthander8fa3d262011-11-07 17:04:01 +010051[[non-interactive_users]]
52Non-Interactive Users
53~~~~~~~~~~~~~~~~~~~~~
54
55This is an internal user group, members of this group are not expected
56to perform interactive operations on the Gerrit web frontend.
57
58However, sometimes such a user may need a separate thread pool in
59order to prevent it from grabbing threads from the interactive users.
60
61These users live in a second thread pool, which separates operations
62made by the non-interactive users from the ones made by the interactive
63users. This ensures that the interactive users can keep working when
64resources are tight.
65
66[[project_owners]]
67Project Owners
68~~~~~~~~~~~~~~
69
70Access rights assigned to this group are always evaluated within the
71context of a project to which the access rights apply. These rights
72therefore apply to all the users who are owners of this project.
73
74By assigning access rights to this group on a parent project Gerrit
75administrators can define a set of default access rights for
Fredrik Luthanderea13ca52011-12-29 11:36:48 +010076<<category_owner,project owners>>. Child projects inherit these
Fredrik Luthander8fa3d262011-11-07 17:04:01 +010077access rights where they are resolved to the users that own the child
78project. Having default access rights for
Fredrik Luthanderea13ca52011-12-29 11:36:48 +010079<<category_owner,project owners>> assigned on a parent project may
Fredrik Luthander8fa3d262011-11-07 17:04:01 +010080avoid the need to initially configure access rights for
81newly created child projects.
82
83[[registered_users]]
Shawn O. Pearce4b122b82009-02-18 18:22:14 -080084Registered Users
85~~~~~~~~~~~~~~~~
86
87All signed-in users are automatically a member of this group (and
Fredrik Luthander54abc352012-01-20 16:18:41 +010088also <<anonymous_users,'Anonymous Users'>>, see above).
Shawn O. Pearce4b122b82009-02-18 18:22:14 -080089
90Any access rights assigned to this group are inherited by all
91users as soon as they sign-in to Gerrit. If OpenID authentication
92is being employed, moving from only 'Anonymous Users' into this
93group is very easy. Caution should be taken when assigning any
94permissions to this group.
95
Dave Borowitz01c1b1f2013-02-27 13:49:04 -080096It is typical to assign `Code-Review -1..+1` to this group,
Shawn O. Pearce4b122b82009-02-18 18:22:14 -080097allowing signed-in users to vote on a change, but not actually
98cause it to become approved or rejected.
99
100Registered users are always permitted to make and publish comments
Fredrik Luthander5e1b51b2012-01-20 13:06:06 +0100101on any change in any project they have `Read` access to.
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800102
103
104Account Groups
105--------------
106
107Account groups contain a list of zero or more user account members,
108added individually by a group owner. Any user account listed as
109a group member is given any access rights granted to the group.
110
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800111Every group has one other group designated as its owner. Users who
112are members of the owner group can:
113
Fredrik Luthander8fa3d262011-11-07 17:04:01 +0100114* Add users and other groups to this group
115* Remove users and other groups from this group
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800116* Change the name of this group
117* Change the description of this group
118* Change the owner of this group, to another group
119
120It is permissible for a group to own itself, allowing the group
121members to directly manage who their peers are.
122
123Newly created groups are automatically created as owning themselves,
124with the creating user as the only member. This permits the group
125creator to add additional members, and change the owner to another
126group if desired.
127
128It is somewhat common to create two groups at the same time,
129for example `Foo` and `Foo-admin`, where the latter group
130`Foo-admin` owns both itself and also group `Foo`. Users who
131are members of `Foo-admin` can thus control the membership of
132`Foo`, without actually having the access rights granted to `Foo`.
133This configuration can help prevent accidental submits when the
134members of `Foo` have submit rights on a project, and the members of
135`Foo-admin` typically do not need to have such rights.
136
137
138Project Access Control Lists
139----------------------------
140
lincolnfa7bdd32010-04-22 14:23:05 -0300141A system wide access control list affecting all projects is stored in
Shawn O. Pearcea0631822011-06-14 11:18:18 -0700142project "`All-Projects`". This inheritance can be configured
lincolnfa7bdd32010-04-22 14:23:05 -0300143through link:cmd-set-project-parent.html[gerrit set-project-parent].
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800144
145Per-project access control lists are also supported.
146
147Users are permitted to use the maximum range granted to any of their
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800148groups on a label. For example, a user is a member of `Foo Leads`, and
149the following ACLs are granted on a project:
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800150
Karsten Dambekalnsa7f72a22011-03-25 14:21:59 +0100151[options="header"]
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800152|===================================================
153|Group |Reference Name |Label |Range
154|Anonymous Users |refs/heads/* |Code-Review|-1..+1
155|Registered Users|refs/heads/* |Code-Review|-1..+2
156|Foo Leads |refs/heads/* |Code-Review|-2..0
157|===================================================
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800158
159Then the effective range permitted to be used by the user is
160`-2..+2`, as the user is a member of all three groups (see above
161about the system groups) and the maximum range is chosen (so the
162lowest value granted to any group, and the highest value granted
163to any group).
164
Nico Sallembienee6eaf02010-02-01 13:24:49 -0800165Reference-level access control is also possible.
166
167Permissions can be set on a single reference name to match one
168branch (e.g. `refs/heads/master`), or on a reference namespace
Edwin Kempina2bf0832011-09-08 14:23:30 +0200169(e.g. `refs/heads/*`) to match any branch starting with that
170prefix. So a permission with `refs/heads/*` will match
Nico Sallembienee6eaf02010-02-01 13:24:49 -0800171`refs/heads/master` and `refs/heads/experimental`, etc.
172
Shawn O. Pearce6d6d4512010-07-15 11:42:34 -0700173Reference names can also be described with a regular expression
Edwin Kempina2bf0832011-09-08 14:23:30 +0200174by prefixing the reference name with `^`. For example
175`^refs/heads/[a-z]{1,8}` matches all lower case branch names
Shawn O. Pearce6d6d4512010-07-15 11:42:34 -0700176between 1 and 8 characters long. Within a regular expression `.`
177is a wildcard matching any character, but may be escaped as `\.`.
Magnus Bäcke5611832011-02-02 08:57:15 +0100178The link:http://www.brics.dk/automaton/[dk.brics.automaton library]
179is used for evaluation of regular expression access control
180rules. See the library documentation for details on this
181particular regular expression flavor.
Shawn O. Pearce6d6d4512010-07-15 11:42:34 -0700182
183References can have the current user name automatically included,
184creating dynamic access controls that change to match the currently
185logged in user. For example to provide a personal sandbox space
Edwin Kempina2bf0832011-09-08 14:23:30 +0200186to all developers, `refs/heads/sandbox/${username}/*` allowing
Shawn O. Pearce6d6d4512010-07-15 11:42:34 -0700187the user 'joe' to use 'refs/heads/sandbox/joe/foo'.
188
Nico Sallembienee6eaf02010-02-01 13:24:49 -0800189When evaluating a reference-level access right, Gerrit will use
Nico Sallembiena78a37c2010-05-04 11:49:12 -0700190the full set of access rights to determine if the user
191is allowed to perform a given action. For example, if a user is a
192member of `Foo Leads`, they are reviewing a change destined for
193the `refs/heads/qa` branch, and the following ACLs are granted
194on the project:
Nico Sallembienee6eaf02010-02-01 13:24:49 -0800195
Karsten Dambekalnsa7f72a22011-03-25 14:21:59 +0100196[options="header"]
Fredrik Luthander54abc352012-01-20 16:18:41 +0100197|===============================================================
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800198|Group |Reference Name|Label |Range |Exclusive
199|Registered Users |refs/heads/* |Code-Review| -1..+1 |
200|Foo Leads |refs/heads/* |Code-Review| -2..+2 |
201|QA Leads |refs/heads/qa |Code-Review| -2..+2 |
Fredrik Luthander54abc352012-01-20 16:18:41 +0100202|===============================================================
Nico Sallembienee6eaf02010-02-01 13:24:49 -0800203
Nico Sallembiena78a37c2010-05-04 11:49:12 -0700204Then the effective range permitted to be used by the user is
205`-2..+2`, as the user's membership of `Foo Leads` effectively grant
206them access to the entire reference space, thanks to the wildcard.
207
208Gerrit also supports exclusive reference-level access control.
209
210It is possible to configure Gerrit to grant an exclusive ref level
211access control so that only users of a specific group can perform
Fredrik Luthander54abc352012-01-20 16:18:41 +0100212an operation on a project/reference pair. This is done by ticking
213the exclusive flag when setting the permission for the
214`refs/heads/qa` branch.
Nico Sallembiena78a37c2010-05-04 11:49:12 -0700215
216For example, if a user who is a member of `Foo Leads` tries to
217review a change destined for branch `refs/heads/qa` in a project,
218and the following ACLs are granted:
219
Karsten Dambekalnsa7f72a22011-03-25 14:21:59 +0100220[options="header"]
Fredrik Luthander54abc352012-01-20 16:18:41 +0100221|==============================================================
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800222|Group |Reference Name|Label |Range |Exclusive
223|Registered Users|refs/heads/* |Code-Review| -1..+1 |
224|Foo Leads |refs/heads/* |Code-Review| -2..+2 |
225|QA Leads |refs/heads/qa |Code-Review| -2..+2 |X
Fredrik Luthander54abc352012-01-20 16:18:41 +0100226|==============================================================
Nico Sallembiena78a37c2010-05-04 11:49:12 -0700227
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800228Then this user will not have `Code-Review` rights on that change,
Nico Sallembiena78a37c2010-05-04 11:49:12 -0700229since there is an exclusive access right in place for the
230`refs/heads/qa` branch. This allows locking down access for a
231particular branch to a limited set of users, bypassing inherited
232rights and wildcards.
233
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800234In order to grant the ability to `Code-Review` to the members of
Nico Sallembiena78a37c2010-05-04 11:49:12 -0700235`Foo Leads`, in `refs/heads/qa` then the following access rights
236would be needed:
237
Karsten Dambekalnsa7f72a22011-03-25 14:21:59 +0100238[options="header"]
Fredrik Luthander54abc352012-01-20 16:18:41 +0100239|==============================================================
240|Group |Reference Name|Category |Range |Exclusive
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800241|Registered Users|refs/heads/* |Code-Review| -1..+1 |
242|Foo Leads |refs/heads/* |Code-Review| -2..+2 |
243|QA Leads |refs/heads/qa |Code-Review| -2..+2 |X
244|Foo Leads |refs/heads/qa |Code-Review| -2..+2 |
Fredrik Luthander54abc352012-01-20 16:18:41 +0100245|==============================================================
Nico Sallembiena78a37c2010-05-04 11:49:12 -0700246
Shawn O. Pearcea2299662009-02-25 14:34:40 -0800247OpenID Authentication
248~~~~~~~~~~~~~~~~~~~~~
249
250If the Gerrit instance is configured to use OpenID authentication,
251an account's effective group membership will be restricted to only
252the `Anonymous Users` and `Registered Users` groups, unless *all*
253of its OpenID identities match one or more of the patterns listed
Shawn O. Pearced7c026d2009-08-05 20:11:22 -0700254in the `auth.trustedOpenID` list from `gerrit.config`.
Shawn O. Pearcea2299662009-02-25 14:34:40 -0800255
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800256All Projects
257~~~~~~~~~~~~
258
Shawn O. Pearcea0631822011-06-14 11:18:18 -0700259Any access right granted to a group within `All-Projects`
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800260is automatically inherited by every other project in the same
261Gerrit instance. These rights can be seen, but not modified,
262in any other project's `Access` administration tab.
263
Fredrik Luthanderd9960882011-11-08 01:42:19 +0100264Only members of the groups with the `Administrate Server` capability
265may edit the access control list for `All-Projects`. By default this
266capability is given to the group `Administrators`, but can be given
267to more groups.
Shawn O. Pearcee2c2a222010-05-11 13:43:45 -0700268
269Ownership of this project cannot be delegated to another group.
270This restriction is by design. Granting ownership to another
271group gives nearly the same level of access as membership in
272`Administrators` does, as group members would be able to alter
Fredrik Luthanderd9960882011-11-08 01:42:19 +0100273permissions for every managed project including global capabilities.
Shawn O. Pearcee2c2a222010-05-11 13:43:45 -0700274
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800275Per-Project
276~~~~~~~~~~~
277
Fredrik Luthanderda867882011-12-21 18:28:40 +0100278The per-project ACL is evaluated before the global `All-Projects` ACL,
279permitting some limited override capability to project owners. This
Fredrik Luthander5e1b51b2012-01-20 13:06:06 +0100280behavior is generally only useful on the `Read` category when
281granting 'DENY' within a specific project to deny a group access.
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800282
283
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800284[[access_labels]]
285Review Labels
286-------------
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800287
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800288For every configured label `My-Name` in the project, there is a
289corresponding permission `label-My-Name` with a range corresponding to
290the defined values.
291
292Gerrit comes pre-configured with several default labels that can be
293granted to groups within projects, enabling functionality for that
294group's members. link:config-labels.html[Custom labels] may also be
295defined globally or on a per-project basis.
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800296
Fredrik Luthander71267062011-12-21 18:38:45 +0100297With the release of the Gerrit 2.2.x series, the web GUI for ACL
298configuration was rewritten from scratch. Use this
299<<conversion_table,table>> to better understand the access rights
300conversions from the Gerrit 2.1.x to the Gerrit 2.2.x series.
301
Chad Horohoe029c85a2012-06-07 16:10:14 -0400302[[category_abandon]]
303Abandon
Edwin Kempin3ff05112012-07-19 14:43:25 +0200304~~~~~~~
Chad Horohoe029c85a2012-06-07 16:10:14 -0400305
306This category controls whether users are allowed to abandon changes
307to projects in Gerrit. It can give permission to abandon a specific
308change to a given ref.
309
Chad Horohoe35ced0a2012-06-27 19:20:34 -0400310This also grants the permission to restore a change if the change
311can be uploaded.
312
Fredrik Luthandere9eeeea2011-12-08 16:45:32 +0100313[[category_create]]
314Create reference
315~~~~~~~~~~~~~~~~
316
317The create reference category controls whether it is possible to
318create new references, branches or tags. This implies that the
319reference must not already exist, it's not a destructive permission
David Pursehouse221d4f62012-06-08 17:38:08 +0900320in that you can't overwrite or remove any previously existing
Fredrik Luthandere9eeeea2011-12-08 16:45:32 +0100321references (and also discard any commits in the process).
322
323It's probably most common to either permit the creation of a single
324branch in many gits (by granting permission on a parent project), or
325to grant this permission to a name pattern of branches.
326
327This permission is often given in conjunction with regular push
328branch permissions, allowing the holder of both to create new branches
329as well as bypass review for new commits on that branch.
330
David Pursehouse221d4f62012-06-08 17:38:08 +0900331To push lightweight (non-annotated) tags, grant
Fredrik Luthandere9eeeea2011-12-08 16:45:32 +0100332`Create Reference` for reference name `refs/tags/*`, as lightweight
333tags are implemented just like branches in Git.
334
335For example, to grant the possibility to create new branches under the
336namespace `foo`, you have to grant this permission on
337`refs/heads/foo/*` for the group that should have it.
338Finally, if you plan to grant each user a personal namespace in
339where they are free to create as many branches as they wish, you
340should grant the create reference permission so it's possible
341to create new branches. This is done by using the special
342`${username}` keyword in the reference pattern, e.g.
343`refs/heads/sandbox/${username}/*`. If you do, it's also recommended
344you grant the users the push force permission to be able to clean up
345stale branches.
346
347
Fredrik Luthander8f430f12011-12-27 13:40:43 +0100348[[category_forge_author]]
349Forge Author
350~~~~~~~~~~~~
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100351
352Normally Gerrit requires the author and the committer identity
353lines in a Git commit object (or tagger line in an annotated tag) to
354match one of the registered email addresses of the uploading user.
Fredrik Luthander8f430f12011-12-27 13:40:43 +0100355This permission allows users to bypass parts of that validation, which
356may be necessary when mirroring changes from an upstream project.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100357
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100358Permits the use of an unverified author line in commit objects.
359This can be useful when applying patches received by email from
3603rd parties, when cherry-picking changes written by others across
361branches, or when amending someone else's commit to fix up a minor
362problem before submitting.
Fredrik Luthander8f430f12011-12-27 13:40:43 +0100363
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100364By default this is granted to `Registered Users` in all projects,
365but a site administrator may disable it if verified authorship
366is required.
367
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100368
Fredrik Luthander8f430f12011-12-27 13:40:43 +0100369[[category_forge_committer]]
370Forge Committer
371~~~~~~~~~~~~~~~
372
373Normally Gerrit requires the author and the committer identity
374lines in a Git commit object (or tagger line in an annotated tag) to
375match one of the registered email addresses of the uploading user.
376This permission allows users to bypass parts of that validation, which
377may be necessary when mirroring changes from an upstream project.
378
379Allows the use of an unverified committer line in commit objects, or an
380unverified tagger line in annotated tag objects. Typically this is only
381required when mirroring commits from an upstream project repository.
382
383
384[[category_forge_server]]
385Forge Server
386~~~~~~~~~~~~
387
388Normally Gerrit requires the author and the committer identity
389lines in a Git commit object (or tagger line in an annotated tag) to
390match one of the registered email addresses of the uploading user.
391This permission allows users to bypass parts of that validation, which
392may be necessary when mirroring changes from an upstream project.
393
394Allows the use of the server's own name and email on the committer
395line of a new commit object. This should only be necessary when force
396pushing a commit history which has been rewritten by 'git filter-branch'
397and that contains merge commits previously created by this Gerrit Code
398Review server.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100399
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100400
401[[category_owner]]
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100402Owner
403~~~~~
404
405The `Owner` category controls which groups can modify the project's
406configuration. Users who are members of an owner group can:
407
408* Change the project description
409* Create/delete a branch through the web UI (not SSH)
410* Grant/revoke any access rights, including `Owner`
411
412Note that project owners implicitly have branch creation or deletion
413through the web UI, but not through SSH. To get SSH branch access
414project owners must grant an access right to a group they are a
415member of, just like for any other user.
416
417Ownership over a particular branch subspace may be delegated by
418entering a branch pattern. To delegate control over all branches
419that begin with `qa/` to the QA group, add `Owner` category
Fredrik Luthandera8b9d212012-10-10 16:05:59 +0200420for reference `refs/heads/qa/*`. Members of the QA group can
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100421further refine access, but only for references that begin with
Fredrik Luthander8fa3d262011-11-07 17:04:01 +0100422`refs/heads/qa/`. See <<project_owners,project owners>> to find
423out more about this role.
424
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100425
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100426[[category_push]]
427Push
428~~~~
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100429
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100430This category controls how users are allowed to upload new commits
431to projects in Gerrit. It can either give permission to push
432directly into a branch, bypassing any code review process
433that would otherwise be used. Or it may give permission to upload
434new changes for code review, this depends on which namespace the
435permission is granted to.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100436
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100437
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100438[[category_push_direct]]
439Direct Push
440^^^^^^^^^^^
441
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100442Any existing branch can be fast-forwarded to a new commit.
Robin Rosenberg524a3032012-10-14 14:24:36 +0200443Creation of new branches is controlled by the
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100444link:access-control.html#category_create['Create Reference']
445category. Deletion of existing branches is rejected. This is the
446safest mode as commits cannot be discarded.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100447
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100448* Force option
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100449+
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100450Allows an existing branch to be deleted. Since a force push is
451effectively a delete immediately followed by a create, but performed
452atomically on the server and logged, this option also permits forced
453push updates to branches. Enabling this option allows existing commits
454to be discarded from a project history.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100455
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100456The push category is primarily useful for projects that only want to
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100457take advantage of Gerrit's access control features and do not need
458its code review functionality. Projects that need to require code
459reviews should not grant this category.
460
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100461
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100462[[category_push_review]]
463Upload To Code Review
464^^^^^^^^^^^^^^^^^^^^^
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100465
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100466The `Push` access right granted on the namespace
467`refs/for/refs/heads/BRANCH` permits the user to upload a non-merge
468commit to the project's `refs/for/BRANCH` namespace, creating a new
469change for code review.
470
471A user must be able to clone or fetch the project in order to create
472a new commit on their local system, so in practice they must also
473have the `Read` access granted to upload a change.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100474
475For an open source, public Gerrit installation, it is common to
Fredrik Luthanderea13ca52011-12-29 11:36:48 +0100476grant `Read` and `Push` for `refs/for/refs/heads/*`
477to `Registered Users` in the `All-Projects` ACL. For more
478private installations, its common to simply grant `Read` and
479`Push` for `refs/for/refs/heads/*` to all users of a project.
480
481* Force option
482+
483The force option has no function when granted to a branch in the
484`refs/for/refs/heads/*` namespace.
485
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100486
Fredrik Luthanderbf568572012-01-18 11:17:00 +0100487[[category_push_merge]]
Edwin Kempinaef5d6e2012-01-24 09:04:54 +0100488Push Merge Commits
Fredrik Luthanderbf568572012-01-18 11:17:00 +0100489~~~~~~~~~~~~~~~~~~~~
490
Magnus Bäck282c1022012-04-18 15:39:17 -0400491The `Push Merge Commit` access right permits the user to upload merge
492commits. It's an addon to the <<category_push,Push>> access right, and
493so it won't be sufficient with only `Push Merge Commit` granted for a
494push to happen. Some projects wish to restrict merges to being created
495by Gerrit. By granting `Push` without `Push Merge Commit`, the only
Edwin Kempinaef5d6e2012-01-24 09:04:54 +0100496merges that enter the system will be those created by Gerrit.
Fredrik Luthanderbf568572012-01-18 11:17:00 +0100497
Magnus Bäck282c1022012-04-18 15:39:17 -0400498The reference name connected to a `Push Merge Commit` entry must always
499be prefixed with `refs/for/`, for example `refs/for/refs/heads/BRANCH`.
500This applies even for an entry that complements a `Push` entry for
501`refs/heads/BRANCH` that allows direct pushes of non-merge commits, and
502the intention of the `Push Merge Commit` entry is to allow direct pushes
503of merge commits.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100504
Fredrik Luthanderd7749862012-01-20 07:29:43 +0100505[[category_push_annotated]]
506Push Annotated Tag
507~~~~~~~~~~~~~~~~~~
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100508
David Pursehouse690cebe2012-12-12 19:22:45 +0900509This category permits users to push an annotated tag object into the
510project's repository. Typically this would be done with a command line
511such as:
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100512
513====
514 git push ssh://USER@HOST:PORT/PROJECT tag v1.0
515====
516
David Pursehouse690cebe2012-12-12 19:22:45 +0900517Or:
518
519====
520 git push https://HOST/PROJECT tag v1.0
521====
522
David Pursehouseb429ce12012-12-12 11:04:40 +0900523Tags must be annotated (created with `git tag -a`), should exist in
524the `refs/tags/` namespace, and should be new.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100525
526This category is intended to be used to publish tags when a project
527reaches a stable release point worth remembering in history.
528
Fredrik Luthanderd7749862012-01-20 07:29:43 +0100529It allows for a new annotated (unsigned) tag to be created. The
530tagger email address must be verified for the current user.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100531
532To push tags created by users other than the current user (such
Fredrik Luthanderd7749862012-01-20 07:29:43 +0100533as tags mirrored from an upstream project), `Forge Committer Identity`
534must be also granted in addition to `Push Annotated Tag`.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100535
Fredrik Luthanderd7749862012-01-20 07:29:43 +0100536To push lightweight (non annotated) tags, grant
537<<category_create,`Create Reference`>> for reference name
538`refs/tags/*`, as lightweight tags are implemented just like
539branches in Git.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100540
Fredrik Luthanderd7749862012-01-20 07:29:43 +0100541To delete or overwrite an existing tag, grant `Push` with the force
542option enabled for reference name `refs/tags/*`, as deleting a tag
543requires the same permission as deleting a branch.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100544
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100545
David Pursehouseb429ce12012-12-12 11:04:40 +0900546[[category_push_signed]]
547Push Signed Tag
548~~~~~~~~~~~~~~~
549
David Pursehouse690cebe2012-12-12 19:22:45 +0900550This category permits users to push a PGP signed tag object into the
551project's repository. Typically this would be done with a command
552line such as:
David Pursehouseb429ce12012-12-12 11:04:40 +0900553
554====
555 git push ssh://USER@HOST:PORT/PROJECT tag v1.0
556====
557
David Pursehouse690cebe2012-12-12 19:22:45 +0900558Or:
559
560====
561 git push https://HOST/PROJECT tag v1.0
562====
563
David Pursehouseb429ce12012-12-12 11:04:40 +0900564Tags must be signed (created with `git tag -s`), should exist in the
565`refs/tags/` namespace, and should be new.
566
567
Fredrik Luthander5e1b51b2012-01-20 13:06:06 +0100568[[category_read]]
569Read
570~~~~
571
572The `Read` category controls visibility to the project's
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100573changes, comments, code diffs, and Git access over SSH or HTTP.
Fredrik Luthander5e1b51b2012-01-20 13:06:06 +0100574A user must have this access granted in order to see a project, its
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100575changes, or any of its data.
576
577This category has a special behavior, where the per-project ACL is
578evaluated before the global all projects ACL. If the per-project
Fredrik Luthander5e1b51b2012-01-20 13:06:06 +0100579ACL has granted `Read` with 'DENY', and does not otherwise grant
580`Read` with 'ALLOW', then a `Read` in the all projects ACL
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100581is ignored. This behavior is useful to hide a handful of projects
582on an otherwise public server.
583
584For an open source, public Gerrit installation it is common to grant
Fredrik Luthander5e1b51b2012-01-20 13:06:06 +0100585`Read` to `Anonymous Users` in the `All-Projects` ACL, enabling
586casual browsing of any project's changes, as well as fetching any
587project's repository over SSH or HTTP. New projects can be
588temporarily hidden from public view by granting `Read` with 'DENY'
589to `Anonymous Users` and granting `Read` to the project owner's
590group within the per-project ACL.
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100591
592For a private Gerrit installation using a trusted HTTP authentication
Fredrik Luthander5e1b51b2012-01-20 13:06:06 +0100593source, granting `Read` to `Registered Users` may be more
Fredrik Luthanderdb7679a2011-11-03 08:52:56 +0100594typical, enabling read access only to those users who have been
595able to authenticate through the HTTP access controls. This may
596be suitable in a corporate deployment if the HTTP access control
597is already restricted to the correct set of users.
598
Fredrik Luthander5e1b51b2012-01-20 13:06:06 +0100599
Edwin Kempinfd330fc2012-05-09 21:09:55 +0200600[[category_rebase]]
601Rebase
602~~~~~~
603
604This category permits users to rebase changes via the web UI by pushing
605the `Rebase Change` button.
606
607The change owner and submitters can always rebase changes in the web UI
608(even without having the `Rebase` access right assigned).
609
610Users without this access right who are able to upload new patch sets
611can still do the rebase locally and upload the rebased commit as a new
612patch set.
613
Chad Horohoec626f3c2012-09-13 11:04:20 -0700614[[category_remove_reviewer]]
615Remove Reviewer
616~~~~~~~~~~~~~~~
617
618This category permits users to remove other users from the list of
619reviewers on a change.
620
621The change owner, project owner and site administrator can always
622remove reviewers (even without having the `Remove Reviewer` access
623right assigned).
624
625Users without this access right can only remove themselves from the
626reviewer list on a change.
627
Edwin Kempinfd330fc2012-05-09 21:09:55 +0200628
Fredrik Luthander5e1b51b2012-01-20 13:06:06 +0100629[[category_submit]]
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800630Submit
631~~~~~~
632
633This category permits users to push the `Submit Patch Set n` button
634on the web UI.
635
636Submitting a change causes it to be merged into the destination
637branch as soon as possible, making it a permanent part of the
638project's history.
639
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800640In order to submit, all labels (such as `Verified` and `Code-Review`,
641above) must enable submit, and also must not block it. See above for
642details on each label.
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800643
Fredrik Luthanderbc75ef72012-01-26 15:57:08 +0100644
David Pursehouse5ae73002012-11-01 15:22:26 +0900645[[category_view_drafts]]
646View Drafts
647~~~~~~~~~~~
648
649This category permits users to view draft changes uploaded by other
650users.
651
652The change owner and any explicitly added reviewers can always see
653draft changes (even without having the `View Drafts` access right
654assigned).
655
656
David Pursehousebe7f4582012-12-12 11:21:29 +0900657[[category_publish_drafts]]
658Publish Drafts
659~~~~~~~~~~~~~~
660
661This category permits users to publish draft changes uploaded by other
662users.
663
664The change owner can always publish draft changes (even without having
665the `Publish Drafts` access right assigned).
666
667
668[[category_delete_drafts]]
669Delete Drafts
670~~~~~~~~~~~~~
671
672This category permits users to delete draft changes uploaded by other
673users.
674
675The change owner can always delete draft changes (even without having
676the `Delete Drafts` access right assigned).
677
678
David Pursehouse59aee362012-11-15 17:25:17 +0900679[[category_edit_topic_name]]
680Edit Topic Name
681~~~~~~~~~~~~~~~
682
683This category permits users to edit the topic name of a change that
684is uploaded for review.
685
686The change owner, branch owners, project owners, and site administrators
687can always edit the topic name (even without having the `Edit Topic Name`
688access right assigned).
689
690
Fredrik Luthanderbc75ef72012-01-26 15:57:08 +0100691Examples of typical roles in a project
692--------------------------------------
693
694Below follows a set of typical roles on a server and which access
695rights these roles typically should be granted. You may see them as
David Pursehouse221d4f62012-06-08 17:38:08 +0900696general guidelines for a typical way to set up your project on a
Fredrik Luthanderbc75ef72012-01-26 15:57:08 +0100697brand new Gerrit instance.
698
699[[examples_contributor]]
700Contributor
701~~~~~~~~~~~
702
703This is the typical user on a public server. They are able to read
704your project and upload new changes to it. They are able to give
705feedback on other changes as well, but are unable to block or approve
706any changes.
707
708Suggested access rights to grant:
709
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800710* xref:category_read[`Read`] on 'refs/heads/\*' and 'refs/tags/*'
711* xref:category_push[`Push`] to 'refs/for/refs/heads/*'
712* link:config-labels.html#label_Code-Review[`Code-Review`] with range '-1' to '+1' for 'refs/heads/*'
Fredrik Luthanderbc75ef72012-01-26 15:57:08 +0100713
714
Fredrik Luthander654161c2012-01-31 14:42:36 +0100715[[examples_developer]]
716Developer
717~~~~~~~~~
718
719This is the typical core developer on a public server. They are able
720to read the project, upload changes to a branch. They are allowed to
721push merge commits to merge branches together. Also, they are allowed
722to forge author identity, thus handling commits belonging to others
723than themselves, effectively allowing them to transfer commits
724between different branches.
725
726They are furthermore able to code review and verify commits, and
727eventually submit them. If you have an automated CI system that
728builds all uploaded patch sets you might want to skip the
729verification rights for the developer and let the CI system do that
730exclusively.
731
732Suggested access rights to grant:
733
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800734* xref:category_read[`Read`] on 'refs/heads/\*' and 'refs/tags/*'
735* xref:category_push[`Push`] to 'refs/for/refs/heads/*'
736* xref:category_push_merge[`Push merge commit`] to 'refs/for/refs/heads/*'
737* xref:category_forge_author[`Forge Author Identity`] to 'refs/heads/*'
738* link:config-labels.html#label_Code-Review[`Label: Code-Review`] with range '-2' to '+2' for 'refs/heads/*'
739* link:config-labels.html#label_Verified[`Label: Verify`] with range '-1' to '+1' for 'refs/heads/*'
740* xref:category_submit[`Submit`]
Fredrik Luthander654161c2012-01-31 14:42:36 +0100741
742If the project is small or the developers are seasoned it might make
743sense to give them the freedom to push commits directly to a branch.
744
745Optional access rights to grant:
746
747* <<category_push,`Push`>> to 'refs/heads/*'
748* <<category_push_merge,`Push merge commit`>> to 'refs/heads/*'
749
750
Fredrik Luthanderf2105be2012-01-27 12:44:05 +0100751[[examples_cisystem]]
752CI system
753~~~~~~~~~
754
755A typical Continous Integration system should be able to download new changes
756to build and then leave a verdict somehow.
757
758As an example, the popular
759link:https://wiki.jenkins-ci.org/display/JENKINS/Gerrit+Trigger[gerrit-trigger plugin]
760for Jenkins/Hudson can set labels at:
761
762* The start of a build
763* A successful build
764* An unstable build (tests fails)
765* A failed build
766
767Usually the range chosen for this verdict is the verify label. Depending on
768the size of your project and discipline of involved developers you might want
769to limit access right to the +1 `Verify` label to the CI system only. That
770way it's guaranteed that submitted commits always get built and pass tests
771successfully.
772
773If the build doesn't complete successfully the CI system can set the
774`Verify` label to -1. However that means that a failed build will block
775submit of the change even if someone else sets `Verify` +1. Depending on the
776project and how much the CI system can be trusted for accurate results, a
777blocking label might not be feasible. A recommended alternative is to set the
778label `Code-review` to -1 instead, as it isn't a blocking label but still
David Pursehouse221d4f62012-06-08 17:38:08 +0900779shows a red label in the Gerrit UI. Optionally, to enable the possibility to
780deliver different results (build error vs unstable for instance), it's also
Fredrik Luthanderf2105be2012-01-27 12:44:05 +0100781possible to set `Code-review` +1 as well.
782
Edwin Kempina2e13cf2012-03-30 09:02:36 +0200783If pushing new changes is granted, it's possible to automate cherry-pick of
Fredrik Luthanderf2105be2012-01-27 12:44:05 +0100784submitted changes for upload to other branches under certain conditions. This
785is probably not the first step of what a project wants to automate however,
786and so the push right can be found under the optional section.
787
788Suggested access rights to grant, that won't block changes:
789
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800790* xref:category_read[`Read`] on 'refs/heads/\*' and 'refs/tags/*'
791* link:config-labels.html#label_Code-Review[`Label: Code-Review`] with range '-1' to '0' for 'refs/heads/*'
792* link:config-labels.html#label_Verified[`Label: Verify`] with range '0' to '+1' for 'refs/heads/*'
Fredrik Luthanderf2105be2012-01-27 12:44:05 +0100793
794Optional access rights to grant:
795
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800796* link:config-labels.html#label_Code-Review[`Label: Code-Review`] with range '-1' to '+1' for 'refs/heads/*'
797* xref:category_push[`Push`] to 'refs/for/refs/heads/*'
Fredrik Luthanderf2105be2012-01-27 12:44:05 +0100798
799
Fredrik Luthanderfe720022012-03-22 17:29:39 +0100800[[examples_integrator]]
801Integrator
802~~~~~~~~~~
803
804Integrators are like developers but with some additional rights granted due
805to their administrative role in a project. They can upload or push any commit
806with any committer email (not just their own) and they can also create new
807tags and branches.
808
809Suggested access rights to grant:
810
811* <<examples_developer,Developer rights>>
812* <<category_push,`Push`>> to 'refs/heads/*'
813* <<category_push_merge,`Push merge commit`>> to 'refs/heads/*'
Fredrik Luthander404a2852012-10-10 08:51:22 +0200814* <<category_forge_committer,`Forge Committer Identity`>> to 'refs/for/refs/heads/*'
Fredrik Luthanderfe720022012-03-22 17:29:39 +0100815* <<category_create,`Create Reference`>> to 'refs/heads/*'
816* <<category_push_annotated,`Push Annotated Tag`>> to 'refs/tags/*'
817
818
Fredrik Luthander9c645362012-03-22 18:10:42 +0100819[[examples_project-owner]]
820Project owner
821~~~~~~~~~~~~~
822
823The project owner is almost like an integrator but with additional destructive
824power in the form of being able to delete branches. Optionally these users
825also have the power to configure access rights in gits assigned to them.
826
827[WARNING]
828These users should be really knowledgable about git, for instance knowing why
829tags never should be removed from a server. This role is granted potentially
830destructive access rights and cleaning up after such a mishap could be time
831consuming!
832
833Suggested access rights to grant:
834
835* <<examples_integrator,Integrator rights>>
836* <<category_push,`Push`>> with the force option to 'refs/heads/\*' and 'refs/tags/*'
837
838Optional access right to grant:
839
840* <<category_owner,`Owner`>> in the gits they mostly work with.
841
Fredrik Luthander5a8e7d82012-03-22 17:29:39 +0100842[[examples_administrator]]
843Administrator
844~~~~~~~~~~~~~
845
846The administrator role is the most powerful role known in the Gerrit universe.
847This role may grant itself (or others) any access right, and it already has
848all capabilities granted as well. By default the
849<<administrators,`Administrators` group>> is the group that has this role.
850
851Mandatory access rights:
852
853* <<capability_administrateServer,The `Administrate Server` capability>>
854
855Suggested access rights to grant:
856
857* <<examples_project-owner,Project owner rights>>
858
Sasa Zivkovd589f462013-02-12 14:27:09 +0100859Enforcing site wide access policies
860-----------------------------------
861
862By granting the <<category_owner,`Owner`>> access right on the `refs/*` to a
863group, Gerrit administrators can delegate the responsibility of maintaining
864access rights for that project to that group.
865
866In a corporate deployment it is often necessary to enforce some access
867policies. An example could be that no-one can update or delete a tag, not even
868the project owners. The 'ALLOW' and 'DENY' rules are not enough for this
869purpose as project owners can grant themselves any access right they wish and,
870thus, effectively override any inherited access rights from the
871"`All-Projects`" or some other common parent project.
872
873What is needed is a mechanism to block a permission in a parent project so
874that even project owners cannot allow a blocked permission in their child
875project. Still, project owners should retain the possibility to manage all
876non-blocked rules as they wish. This gives best of both worlds:
877
878* Gerrit administrators can concentrate on enforcing site wide policies
879 and providing a meaningful set of default access permissions
880* Project owners can manage access rights of their projects without a danger
881 of violating a site wide policy
882
883'BLOCK' access rule
884~~~~~~~~~~~~~~~~~~~
885
886The 'BLOCK' rule blocks a permission globally. An inherited 'BLOCK' rule cannot
Sasa Zivkovcff084b2013-01-15 18:52:32 +0100887be overridden in the inheriting project. Any 'ALLOW' rule, from a different
888access section or from an inheriting project, which conflicts with an
889inherited 'BLOCK' rule will not be honored. Searching for 'BLOCK' rules, in
Sasa Zivkovd589f462013-02-12 14:27:09 +0100890the chain of parent projects, ignores the Exclusive flag that is normally
891applied to access sections.
892
893A 'BLOCK' rule that blocks the 'push' permission blocks any type of push,
894force or not. A blocking force push rule blocks only force pushes, but
895allows non-forced pushes if an 'ALLOW' rule would have permitted it.
896
897It is also possible to block label ranges. To block a group 'X' from voting
898'-2' and '+2', but keep their existing voting permissions for the '-1..+1'
899range intact we would define:
900
901====
902 [access "refs/heads/*"]
903 label-Code-Review = block -2..+2 group X
904====
905
906The interpretation of the 'min..max' range in case of a blocking rule is: block
907every vote from '-INFINITE..min' and 'max..INFINITE'. For the example above it
908means that the range '-1..+1' is not affected by this block.
909
Sasa Zivkovcff084b2013-01-15 18:52:32 +0100910'BLOCK' and 'ALLOW' rules in the same access section
911~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
912
913When an access section of a project contains a 'BLOCK' and an 'ALLOW' rule for
914the same permission then this 'ALLOW' rule overrides the 'BLOCK' rule:
915
916====
917 [access "refs/heads/*"]
918 push = block group X
919 push = group Y
920====
921
922In this case a user which is a member of the group 'Y' will still be allowed to
923push to 'refs/heads/*' even if it is a member of the group 'X'.
924
925NOTE: An 'ALLOW' rule overrides a 'BLOCK' rule only when both of them are
926inside the same access section of the same project. An 'ALLOW' rule in a
927different access section of the same project or in any access section in an
928inheriting project cannot override a 'BLOCK' rule.
929
Sasa Zivkovd589f462013-02-12 14:27:09 +0100930Examples
931~~~~~~~~
932
933The following examples show some possible use cases for the 'BLOCK' rules.
934
935Make sure no one can update or delete a tag
936^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
937
938This requirement is quite common in a corporate deployment where
939reproducibility of a build must be guaranteed. To achieve that we block 'push'
940permission for the <<anonymous_users,'Anonymous Users'>> in "`All-Projects`":
941
942====
943 [access "refs/tags/*"]
944 push = block group Anonymous Users
945====
946
947By blocking the <<anonymous_users,'Anonymous Users'>> we effectively block
948everyone as everyone is a member of that group. Note that the permission to
949create a tag is still necessary. Assuming that only <<category_owner,project
950owners>> are allowed to create tags, we would extend the example above:
951
952====
953 [access "refs/tags/*"]
954 push = block group Anonymous Users
955 create = group Project Owners
956 pushTag = group Project Owners
957====
Fredrik Luthander9c645362012-03-22 18:10:42 +0100958
Sasa Zivkovcff084b2013-01-15 18:52:32 +0100959Let only a dedicated group vote in a special category
960^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
961
962Assume there is a more restrictive process for submitting changes in stable
963release branches which is manifested as a new voting category
964'Release-Process'. Assume we want to make sure that only a 'Release Engineers'
965group can vote in this category and that even project owners cannot approve
966this category. We have to block everyone except the 'Release Engineers' to vote
967in this category and, of course, allow 'Release Engineers' to vote in that
968category. In the "`All-Projects`" we define the following rules:
969
970====
971 [access "refs/heads/stable*"]
972 label-Release-Proces = block -1..+1 group Anonymous Users
973 label-Release-Proces = -1..+1 group Release Engineers
974====
975
Fredrik Luthander71267062011-12-21 18:38:45 +0100976[[conversion_table]]
977Conversion table from 2.1.x series to 2.2.x series
978--------------------------------------------------
979
980[options="header"]
981|=================================================================================
982|Gerrit 2.1.x |Gerrit 2.2.x
Dave Borowitz01c1b1f2013-02-27 13:49:04 -0800983|Code review |link:config-labels.html#label_Code-Review[Label: Code-Review]
984|Verify |link:config-labels.html#label_Verified[Label: Verify]
Fredrik Luthanderb7bd7e42012-01-23 16:01:37 +0100985|Forge Identity +1 |Forge <<category_forge_author,author>> identity
986|Forge Identity +2 |Forge <<category_forge_committer,committer>> & <<category_forge_author,author>> identity
987|Forge Identity +3 |Forge <<category_forge_server,server>> & <<category_forge_committer,committer>> & <<category_forge_author,author>> identity
988|Owner |<<category_owner,Owner>>
989|Push branch +1 |<<category_push_direct,Push>>
990|Push branch +2 |<<category_create,Create reference>> & <<category_push_direct,Push>>
991|Push branch +3 |<<category_push_direct,Push>> (with force) & <<category_create,Create reference>>
Fredrik Luthander71267062011-12-21 18:38:45 +0100992|Push tag +1 & Push Branch +2 |No support to limit to push signed tag
Fredrik Luthanderb7bd7e42012-01-23 16:01:37 +0100993|Push tag +2 & Push Branch +2 |<<category_push_annotated,Push annotated tag>>
994|Push Branch +2 (refs/tags/*) |<<category_create,Create reference>> (refs/tags/...)
995|Push Branch +3 (refs/tags/*) |<<category_push_direct,Push>> (with force on refs/tags/...)
996|Read +1 |<<category_read,Read>>
997|Read +2 |<<category_read,Read>> & <<category_push_review,Push>> (refs/for/refs/...)
Edwin Kempinaef5d6e2012-01-24 09:04:54 +0100998|Read +3 |<<category_read,Read>> & <<category_push_review,Push>> (refs/for/refs/...) & <<category_push_merge,Push Merge Commit>>
Fredrik Luthanderb7bd7e42012-01-23 16:01:37 +0100999|Submit |<<category_submit,Submit>>
Fredrik Luthander71267062011-12-21 18:38:45 +01001000|=================================================================================
1001
Fredrik Luthanderb7bd7e42012-01-23 16:01:37 +01001002
Fredrik Luthander71267062011-12-21 18:38:45 +01001003[NOTE]
1004In Gerrit 2.2.x, the way to set permissions for upload has changed entirely.
1005To upload a change for review is no longer a separate permission type,
1006instead you grant ordinary push permissions to the actual
1007recieving reference. In practice this means that you set push permissions
1008on `refs/for/refs/heads/<branch>` rather than permissions to upload changes
1009on `refs/heads/<branch>`.
1010
Fredrik Luthander80ebf9d2012-02-13 09:32:43 +01001011
1012System capabilities
1013-------------------
1014
1015The system capabilities control actions that the administrators of
1016the server can perform which usually affect the entire
1017server in some way. The administrators may delegate these
1018capabilities to trusted groups of users.
1019
1020Delegation of capabilities allows groups to be granted a subset of
1021administrative capabilities without being given complete
1022administrative control of the server. This makes it possible to
1023keep fewer users in the administrators group, even while spreading
1024much of the server administration burden out to more users.
1025
1026Below you find a list of capabilities available:
1027
1028
Fredrik Luthander426885f2012-02-13 09:56:57 +01001029[[capability_administrateServer]]
1030Administrate Server
1031~~~~~~~~~~~~~~~~~~~
1032
1033This is in effect the owner and administrator role of the Gerrit
1034instance. Any members of a group granted this capability will be
1035able to grant any access right to any group. They will also have all
1036capabilities granted to them automatically.
1037
1038
Fredrik Luthanderb02afca2012-02-13 09:59:48 +01001039[[capability_createAccount]]
1040Create Account
1041~~~~~~~~~~~~~~
1042
Fredrik Luthander79d38152012-03-13 09:52:22 +01001043Allow link:cmd-create-account.html[account creation over the ssh prompt].
Fredrik Luthanderb02afca2012-02-13 09:59:48 +01001044This capability allows the granted group members to create non-interactive
1045service accounts. These service accounts are generally used for automation
1046and made to be members of the
1047link:access-control.html#non-interactive_users['Non-Interactive users'] group.
1048
1049
Fredrik Luthander79d38152012-03-13 09:52:22 +01001050[[capability_createGroup]]
1051Create Group
1052~~~~~~~~~~~~
1053
1054Allow group creation. Groups are used to grant users access to different
1055actions in projects. This capability allows the granted group members to
1056either link:cmd-create-group.html[create new groups via ssh] or via the web UI.
1057
1058
1059[[capability_createProject]]
1060Create Project
1061~~~~~~~~~~~~~~
1062
1063Allow project creation. This capability allows the granted group to
1064either link:cmd-create-project.html[create new git projects via ssh]
1065or via the web UI.
1066
Sasa Zivkov812f4892012-06-21 16:25:21 +02001067[[capability_emailReviewers]]
1068Email Reviewers
1069~~~~~~~~~~~~~~~
1070
1071Allow or deny sending email to change reviewers and watchers. This can be used
1072to deny build bots from emailing reviewers and people who watch the change.
1073Instead, only the authors of the change and those who starred it will be
1074emailed. The allow rules are evaluated before deny rules, however the default
1075is to allow emailing, if no explicit rule is matched.
Fredrik Luthander79d38152012-03-13 09:52:22 +01001076
Fredrik Luthander74ad0d02012-03-13 13:06:30 +01001077[[capability_flushCaches]]
1078Flush Caches
1079~~~~~~~~~~~~
1080
Fredrik Luthander48603002012-03-21 18:17:17 +01001081Allow the flushing of Gerrit's caches. This capability allows the granted
Fredrik Luthander74ad0d02012-03-13 13:06:30 +01001082group to link:cmd-flush-caches.html[flush some or all Gerrit caches via ssh].
1083
1084[NOTE]
1085This capability doesn't imply permissions to the show-caches command. For that
1086you need the <<capability_viewCaches,view caches capability>>.
1087
1088
Fredrik Luthander46843022012-03-13 16:11:02 +01001089[[capability_kill]]
1090Kill Task
1091~~~~~~~~~
1092
1093Allow the operation of the link:cmd-kill.html[kill command over ssh]. The
1094kill command ends tasks that currently occupy the Gerrit server, usually
1095a replication task or a user initiated task such as an upload-pack or
1096recieve-pack.
1097
1098
1099[[capability_priority]]
1100Priority
1101~~~~~~~~
1102
1103This capability allows users to use
1104link:config-gerrit.html#sshd.batchThreads[the thread pool reserved] for
1105link:access-control.html#non-interactive_users['Non-Interactive Users'].
1106It's a binary value in that granted users either have access to the thread
1107pool, or they don't.
1108
1109There are three modes for this capability and they're listed by rising
1110priority:
1111
1112No capability configured.::
1113The user isn't a member of a group with any priority capability granted. By
1114default the user is then in the 'INTERACTIVE' thread pool.
1115
1116'BATCH'::
1117If there's a thread pool configured for 'Non-Interactive Users' and a user is
1118granted the priority capability with the 'BATCH' mode selected, the user ends
1119up in the separate batch user thread pool. This is true unless the user is
1120also granted the below 'INTERACTIVE' option.
1121
1122'INTERACTIVE'::
1123If a user is granted the priority capability with the 'INTERACTIVE' option,
1124regardless if they also have the 'BATCH' option or not, they are in the
1125'INTERACTIVE' thread pool.
1126
1127
Fredrik Luthander80ebf9d2012-02-13 09:32:43 +01001128[[capability_queryLimit]]
1129Query Limit
1130~~~~~~~~~~~
1131
1132Allow site administrators to configure the query limit for users to
1133be above the default hard-coded value of 500. Administrators can add
1134a global block to `All-Projects` with group(s) that
1135should have different limits:
1136
1137When applying a query limit to a user the largest value granted by
1138any of their groups is used.
1139
1140This limit applies not only to the link:cmd-query.html[`gerrit query`]
1141command, but also to the web UI results pagination size.
1142
1143
Chad Horohoeabd6d4e2013-02-14 16:27:34 -05001144[[capability_accessDatabase]]
1145Access Database
1146~~~~~~~~~~~~~~~
1147
1148Allow users to access the database using the `gsql` command.
1149
1150
Fredrik Luthander9c7da662012-03-13 17:49:27 +01001151[[capability_startReplication]]
1152Start Replication
1153~~~~~~~~~~~~~~~~~
1154
Shawn O. Pearce7d2cb042012-05-10 19:12:09 -07001155Allow access to execute `replication start` command, if the
1156replication plugin is installed on the server.
Fredrik Luthander9c7da662012-03-13 17:49:27 +01001157
1158
1159[[capability_viewCaches]]
1160View Caches
1161~~~~~~~~~~~
1162
Fredrik Luthander48603002012-03-21 18:17:17 +01001163Allow querying for status of Gerrit's internal caches. This capability allows
Fredrik Luthander9c7da662012-03-13 17:49:27 +01001164the granted group to
1165link:cmd-show-caches.html[look at some or all Gerrit caches via ssh].
1166
1167
Fredrik Luthander48603002012-03-21 18:17:17 +01001168[[capability_viewConnections]]
1169View Connections
1170~~~~~~~~~~~~~~~~
1171
1172Allow querying for status of Gerrit's current client connections. This
1173capability allows the granted group to
1174link:cmd-show-connections.html[look at Gerrit's current connections via ssh].
1175
1176
1177[[capability_viewQueue]]
1178View Queue
1179~~~~~~~~~~
1180
1181Allow querying for status of Gerrit's internal task queue. This capability
1182allows the granted group to
1183link:cmd-show-queue.html[look at the Gerrit task queue via ssh].
1184
1185
Shawn O. Pearce5500e692009-05-28 15:55:01 -07001186GERRIT
1187------
1188Part of link:index.html[Gerrit Code Review]