blob: 5485994447e875202df972adc4584f15e5f72ea2 [file] [log] [blame]
Shawn O. Pearce4b122b82009-02-18 18:22:14 -08001Gerrit2 - Access Controls
2=========================
3
4Access controls in Gerrit are group based. Every user account is a
5member of one or more groups, and access and privileges are granted
6to those groups. Groups cannot be nested, and access rights cannot
7be granted to individual users.
8
9
10System Groups
11-------------
12
13Gerrit comes with 3 system groups, with special access privileges
14and membership management. The identity of these groups is set
15in the `system_config` table within the database, so the groups
16can be renamed after installation if desired.
17
18Administrators
19~~~~~~~~~~~~~~
20
21This is the Gerrit "root" identity.
22
23Users in the 'Administrators' group can perform any action under
24the Admin menu, to any group or project, without further validation
25of any other access controls. In most installations only those
26users who have direct filesystem and database access would be
27placed into this group.
28
29Membership in the 'Administrators' group does not imply any other
30access rights. Administrators do not automatically get code review
31approval or submit rights in projects. This is a feature designed
32to permit adminstrative users to otherwise access Gerrit as any
33other normal user would, without needing two different accounts.
34
35Anonymous Users
36~~~~~~~~~~~~~~~
37
38All users are automatically a member of this group. Users who are
39not signed in are a member of only this group, and no others.
40
41Any access rights assigned to this group are inherited by all users.
42
43Administrators and project owners can grant access rights to this
44group in order to permit anonymous users to view project changes,
45without requiring sign in first. Currently it is only worthwhile
46to grant `Read Access` to this group as Gerrit requires an account
47identity for all other operations.
48
49Registered Users
50~~~~~~~~~~~~~~~~
51
52All signed-in users are automatically a member of this group (and
53also 'Anonymous Users', see above).
54
55Any access rights assigned to this group are inherited by all
56users as soon as they sign-in to Gerrit. If OpenID authentication
57is being employed, moving from only 'Anonymous Users' into this
58group is very easy. Caution should be taken when assigning any
59permissions to this group.
60
61It is typical to assign `Code Review -1..+1` to this group,
62allowing signed-in users to vote on a change, but not actually
63cause it to become approved or rejected.
64
65Registered users are always permitted to make and publish comments
66on any change in any project they have `Read Access` to.
67
68
69Account Groups
70--------------
71
72Account groups contain a list of zero or more user account members,
73added individually by a group owner. Any user account listed as
74a group member is given any access rights granted to the group.
75
76To keep the schema simple to manage, groups cannot be nested.
77Only individual user accounts can be added as a member.
78
79Every group has one other group designated as its owner. Users who
80are members of the owner group can:
81
82* Add users to this group
83* Remove users from this group
84* Change the name of this group
85* Change the description of this group
86* Change the owner of this group, to another group
87
88It is permissible for a group to own itself, allowing the group
89members to directly manage who their peers are.
90
91Newly created groups are automatically created as owning themselves,
92with the creating user as the only member. This permits the group
93creator to add additional members, and change the owner to another
94group if desired.
95
96It is somewhat common to create two groups at the same time,
97for example `Foo` and `Foo-admin`, where the latter group
98`Foo-admin` owns both itself and also group `Foo`. Users who
99are members of `Foo-admin` can thus control the membership of
100`Foo`, without actually having the access rights granted to `Foo`.
101This configuration can help prevent accidental submits when the
102members of `Foo` have submit rights on a project, and the members of
103`Foo-admin` typically do not need to have such rights.
104
105
106Project Access Control Lists
107----------------------------
108
109A system wide access control list affecting all projects is stored
110in project id 0 (named "`\-- All Projects \--`" in a default
111installation). Only the id is recognized as special by Gerrit.
112
113Per-project access control lists are also supported.
114
115Users are permitted to use the maximum range granted to any of their
116groups in an approval category. For example, a user is a member of
117`Foo Leads`, and the following ACLs are granted on a project:
118
119[grid="all"]
120`----------------`-------------`-------
121Group Category Range
122---------------------------------------
123Anonymous Users Code Review -1..+1
124Registered Users Code Review -1..+2
125Foo Leads Code Review -2..0
126---------------------------------------
127
128Then the effective range permitted to be used by the user is
129`-2..+2`, as the user is a member of all three groups (see above
130about the system groups) and the maximum range is chosen (so the
131lowest value granted to any group, and the highest value granted
132to any group).
133
Shawn O. Pearcea2299662009-02-25 14:34:40 -0800134OpenID Authentication
135~~~~~~~~~~~~~~~~~~~~~
136
137If the Gerrit instance is configured to use OpenID authentication,
138an account's effective group membership will be restricted to only
139the `Anonymous Users` and `Registered Users` groups, unless *all*
140of its OpenID identities match one or more of the patterns listed
141in the `trusted_external_ids` table.
142
Shawn O. Pearce4b122b82009-02-18 18:22:14 -0800143All Projects
144~~~~~~~~~~~~
145
146Only members of the group `Administrators` may edit the access
147control list for `\-- All Projects \--`.
148
149Ownership of this project cannot be delegated to another group.
150
151Any access right granted to a group within `\-- All Projects \--`
152is automatically inherited by every other project in the same
153Gerrit instance. These rights can be seen, but not modified,
154in any other project's `Access` administration tab.
155
156Per-Project
157~~~~~~~~~~~
158
159Every project has a group designated as its owner. Users who are
160members of the owner group can:
161
162* Change the project description
163* Change the owner of the project to another group
164* Create/delete a branch through the web UI (not SSH)
165* Grant/revoke access rights
166
167Note that project owners implicitly have branch creation or deletion
168through the web UI, but not through SSH. To get SSH access project
169owners must grant an access right to their own group, just like
170for any other user.
171
172The per-project ACL is evaluated before the global
173`\-- All Projects \--` ACL, permitting some limited override
174capability to project owners. This behavior is generally only
175useful on the `Read Access` category when granting `-1 No Access`
176within a specific project to deny access to a group.
177
178
179Categories
180----------
181
182Gerrit comes pre-configured with several default categories that
183can be granted to groups within projects, enabling functionality
184for that group's members.
185
186[[category_READ]]
187Read Access
188~~~~~~~~~~~
189
190The `Read Access` category controls visibility to the project's
191changes, comments, code diffs, and Git access over SSH. A user must
192have `Read Access +1` in order to see a project or any of its data.
193
194This category has a special behavior, where the per-project ACL is
195evaluated before the global all projects ACL. If the per-project
196ACL has granted `Read Access -1`, and does not otherwise grant
197`Read Access \+1`, then a `Read Access +1` in the all projects ACL
198is ignored. This behavior is useful to hide a handful of projects
199on an otherwise public server.
200
201For an open source, public Gerrit installation it is common to grant
202`Read Access +1` to `Anonymous Users` in the `\-- All Projects \--`
203ACL, enabling casual browsing of any project's changes, as well as
204fetching any project's repository over SSH. New projects can be
205temporarily hidden from public view by granting `Read Access -1`
206to `Anonymous Users` and granting `Read Access +1` to the project
207owner's group within the per-project ACL.
208
209For a private Gerrit installation using a trusted HTTP authentication
210source, granting `Read Access +1` to `Registered Users` may be more
211typical, enabling read access only to those users who have been
212able to authenticate through the HTTP access controls. This may
213be suitable in a corporate deployment if the HTTP access control
214is already restricted to the correct set of users.
215
216[[category_pTAG]]
217Push Annotated Tag
218~~~~~~~~~~~~~~~~~~
219
220This category permits users to push an annotated tag object over
221SSH into the project's repository. Typically this would be done
222with a command line such as:
223
224====
225 git push ssh://USER@HOST:PORT/PROJECT tag v1.0
226====
227
228Tags must be annotated (created with `git tag -a` or `git tag -s`),
229must exist in the `refs/tags/` namespace, and must be new. Deleting
230and overwriting existing tags is not permitted. Lightweight tags
231are not permitted.
232
233This category is intended to be used to publish tags when a project
234reaches a stable release point worth remembering in history.
235
236[[category_pHD]]
237Push Branch
238~~~~~~~~~~~
239
240This category permits users to push directly into a branch over SSH,
241bypassing any code review process that would otherwise be used.
242
243This category has several possible values:
244
245* Update Branch
246+
247Any existing branch can be fast-forwarded to a new commit.
248Creation of new branches is rejected. Deletion of existing branches
249is rejected. This is the safest mode as commits cannot be discarded.
250
251* Create Branch
252+
253Implies 'Update Branch', but also allows the creation of a new branch
254if the name does not not already designate an existing branch name.
255Like update branch, existing commits cannot be discarded.
256
257* Force Push Branch; Delete Branch
258+
259Implies both 'Update Branch' and 'Create Branch', but also allows an
260existing branch to be deleted. Since a force push is effectively a
261delete immediately followed by a create, but performed atomically on
262the server and logged, this also level permits forced push updates
263to branches. This level may allow existing commits to be discarded
264from a project history.
265
266This category is primarily useful for projects that only want to
267take advantage of Gerrit's access control features and do not need
268its code review functionality. Projects that need to require code
269reviews should not grant this category.
270
271[[category_VRIF]]
272Verified
273~~~~~~~~
274
275The verified category can have any meaning the project desires.
276It was originally invented by the Android Open Source Project to
277mean 'compiles, passes basic unit tests'.
278
279The range of values is:
280
281* -1 Fails
282+
283Tried to compile, but got a compile error, or tried to run tests,
284but one or more tests did not pass.
285+
286*Any -1 blocks submit.*
287
288* 0 No score
289+
290Didn't try to perform the verification tasks.
291
292* +1 Verified
293+
294Compiled (and ran tests) successfully.
295+
296*Any +1 enables submit.*
297
298In order to submit a change, the change must have a `+1 Verified` in
299this category from at least one authorized user, and no `-1 Fails`
300from an authorized user. Thus, `-1 Fails` can block a submit,
301while `+1 Verified` enables a submit.
302
303If a Gerrit installation does not wish to use this category in any
304project, it can be deleted from the database:
305
306====
307 DELETE FROM approval_categories WHERE category_id = 'VRIF';
308 DELETE FROM approval_category_values WHERE category_id = 'VRIF';
309====
310
311If a Gerrit installation wants to modify the description text
312associated with these category values, the text can be updated
313in the `name` column of the `category_id = \'VRIF'` rows in the
314`approval_category_values` table.
315
316Additional values could also be added to this category, to allow it
317to behave more like `Code Review` (below). Insert -2 and +2 value
318rows into the `approval_category_values` with `category_id` set to
319`VRIF` to get the same behavior.
320
321[NOTE]
322A restart is required after making database changes.
323See <<restart_changes,below>>.
324
325[[category_CVRW]]
326Code Review
327~~~~~~~~~~~
328
329The code review category can have any meaning the project desires.
330It was originally invented by the Android Open Source Project to
331mean 'I read the code and it seems reasonably correct'.
332
333The range of values is:
334
335* -2 Do not submit
336+
337The code is so horribly incorrect/buggy/broken that it must not be
338submitted to this project, or to this branch.
339+
340*Any -2 blocks submit.*
341
342* -1 I would prefer that you didn't submit this
343+
344The code doesn't look right, or could be done differently, but
345the reviewer is willing to live with it as-is if another reviewer
346accepts it, perhaps because it is better than what is currently in
347the project. Often this is also used by contributors who don't like
348the change, but also aren't responsible for the project long-term
349and thus don't have final say on change submission.
350+
351Does not block submit.
352
353* 0 No score
354+
355Didn't try to perform the code review task, or glanced over it but
356don't have an informed opinion yet.
357
358* +1 Looks good to me, but someone else must approve
359+
360The code looks right to this reviewer, but the reviewer doesn't
361have access to the `+2` value for this category. Often this is
362used by contributors to a project who were able to review the change
363and like what it is doing, but don't have final approval over what
364gets submitted.
365
366* +2 Looks good to me, approved
367+
368Basically the same as `+1`, but for those who have final say over
369how the project will develop.
370+
371*Any +2 enables submit.*
372
373In order to submit a change, the change must have a `+2 Looks good to
374me, approved` in this category from at least one authorized user,
375and no `-2 Do not submit` from an authorized user. Thus `-2`
376can block a submit, while `+2` can enable it.
377
378If a Gerrit installation does not wish to use this category in any
379project, it can be deleted from the database:
380
381====
382 DELETE FROM approval_categories WHERE category_id = 'CRVW';
383 DELETE FROM approval_category_values WHERE category_id = 'CRVW';
384====
385
386If a Gerrit installation wants to modify the description text
387associated with these category values, the text can be updated
388in the `name` column of the `category_id = \'CRVW'` rows in the
389`approval_category_values` table.
390
391Additional values could be inserted into `approval_category_values`
392to further extend the negative and positive range, but there is
393likely little value in doing so as this only expands the middle
394region. This category is a `MaxWithBlock` type, which means that
395the lowest negative value if present blocks a submit, while the
396highest positive value is required to enable submit.
397
398[NOTE]
399A restart is required after making database changes.
400See <<restart_changes,below>>.
401
402[[category_SUBM]]
403Submit
404~~~~~~
405
406This category permits users to push the `Submit Patch Set n` button
407on the web UI.
408
409Submitting a change causes it to be merged into the destination
410branch as soon as possible, making it a permanent part of the
411project's history.
412
413In order to submit, all approval categories (such as `Verified` and
414`Code Review`, above) must enable submit, and also must not block it.
415See above for details on each category.
416
417[[category_makeoneup]]
418Your Category Here
419~~~~~~~~~~~~~~~~~~
420
421Gerrit administrators can also make up their own categories.
422
423See above for descriptions of how `Verified` and `Code Review` work,
424and insert your own category with `function_name = \'MaxWithBlock'`
425to get the same behavior over your own range of values, in any
426category you desire.
427
428Ensure `category_id` is unique within your `approval_categories`
429table. The default values `VRIF` and `CVRF` used for the categories
430described above are simply that, defaults, and have no special
431meaning to Gerrit. The other standard category_id values like
432`READ`, `SUBM`, `pTAG` and `pHD` have special meaning and should
433not be modified or reused.
434
435The `position` column of `approval_categories` controls which column
436of the 'Approvals' table the category appears in, providing some
437layout control to the administrator.
438
439All `MaxWithBlock` categories must have at least one positive value
440in the `approval_category_values` table, or else submit will never
441be enabled.
442
443To permit blocking submits, ensure a negative value is defined for
444your new category. If you do not wish to have a blocking submit
445level for your category, do not define values less than 0.
446
447Keep in mind that category definitions are currently global to
448the entire Gerrit instance, and affect all projects hosted on it.
449Any change to a category definition affects everyone.
450
451For example, to define a new 3-valued category that behaves exactly
452like `Verified`, but has different names/labels:
453
454====
455 INSERT INTO approval_categories
456 (name
457 ,position
458 ,function_name
459 ,category_id)
460 VALUES
461 ('Copyright Check'
462 ,3
463 'MaxWithBlock'
464 ,'copy');
465
466 INSERT INTO approval_category_values
467 (category_id,value,name)
468 VALUES
469 ('copy', -1, 'Do not have copyright');
470
471 INSERT INTO approval_category_values
472 (category_id,value,name)
473 VALUES
474 ('copy', 0, 'No score');
475
476 INSERT INTO approval_category_values
477 (category_id,value,name)
478 VALUES
479 ('copy', 1, 'Copyright clear');
480====
481
482The new column will appear at the end of the table (in position 3),
483and `-1 Do not have copyright` will block submit, while `+1 Copyright
484clear` is required to enable submit.
485
486[[restart_changes]]
487[NOTE]
488Restart the Gerrit web application and reload all browsers after
489making any database changes to approval categories. Category data
490is aggressively cached by every corner of Gerrit, as it does not
491change often. Browser may need more than 5 minutes to flush the
492old category data out of their local disk caches.