6 | | Permission privileges are managed using the [TracAdmin trac-admin] tool or (new in version 0.11) the ''General / Permissions'' panel in the ''Admin'' tab of the web interface. |
7 | | |
8 | | In addition to the default permission policy described in this page, it is possible to activate additional permission policies by enabling plugins and listing them in the `[trac] permission_policies` configuration entry in the TracIni. See TracFineGrainedPermissions for more details. |
9 | | |
10 | | Non-authenticated users accessing the system are assigned the name "anonymous". Assign permissions to the "anonymous" user to set privileges for anonymous/guest users. The parts of Trac that a user does not have the privileges for will not be displayed in the navigation. |
11 | | In addition to these privileges, users can be granted additional individual rights in effect when authenticated and logged into the system. All logged in users belong to the virtual group "authenticated", which inherits permissions from "anonymous". |
12 | | |
13 | | == Graphical Admin Tab == |
14 | | ''This feature is new in version 0.11.'' |
15 | | |
16 | | To access this tab, a user must have `TRAC_ADMIN privileges`. This can be performed as follows (more on the trac-admin script below): |
17 | | {{{ |
18 | | $ trac-admin /path/to/projenv permission add bob TRAC_ADMIN |
19 | | }}} |
20 | | |
21 | | Then, the user `bob` will be able to see the Admin tab, and can then access the permissions menu. This menu will allow you to perform all the following actions, but from the browser without requiring root access to the server (just the correct permissions for your user account). '''Use at least one lowercase character in user names, as all-uppercase names are reserved for permissions.''' |
22 | | |
23 | | 1. [[Image(htdocs:../common/guide/admin.png)]] |
24 | | 1. [[Image(htdocs:../common/guide/admin-permissions.png)]] |
25 | | 1. [[Image(htdocs:../common/guide/admin-permissions-TICKET_ADMIN.png)]] |
26 | | |
27 | | An easy way to quickly secure a new Trac install is to run the above command on the anonymous user, install the [http://trac-hacks.org/wiki/AccountManagerPlugin AccountManagerPlugin], create a new admin account graphically and then remove the TRAC_ADMIN permission from the anonymous user. |
28 | | |
29 | | == Available Privileges == |
30 | | |
31 | | To enable all privileges for a user, use the `TRAC_ADMIN` permission. Having `TRAC_ADMIN` is like being `root` on a *NIX system: it will allow you to perform any operation. |
32 | | |
33 | | Otherwise, individual privileges can be assigned to users for the various different functional areas of Trac ('''note that the privilege names are case-sensitive'''): |
34 | | |
35 | | === Repository Browser === |
36 | | |
37 | | || `BROWSER_VIEW` || View directory listings in the [wiki:TracBrowser repository browser] || |
38 | | || `LOG_VIEW` || View revision logs of files and directories in the [wiki:TracBrowser repository browser] || |
39 | | || `FILE_VIEW` || View files in the [wiki:TracBrowser repository browser] || |
40 | | || `CHANGESET_VIEW` || View [wiki:TracChangeset repository check-ins] || |
41 | | |
42 | | === Ticket System === |
43 | | |
44 | | || `TICKET_VIEW` || View existing [wiki:TracTickets tickets] and perform [wiki:TracQuery ticket queries] || |
45 | | || `TICKET_CREATE` || Create new [wiki:TracTickets tickets] || |
46 | | || `TICKET_APPEND` || Add comments or attachments to [wiki:TracTickets tickets] || |
47 | | || `TICKET_CHGPROP` || Modify [wiki:TracTickets ticket] properties (priority, assignment, keywords, etc.) with the following exceptions: edit description field, add/remove other users from cc field when logged in, and set email to pref || |
48 | | || `TICKET_MODIFY` || Includes both `TICKET_APPEND` and `TICKET_CHGPROP`, and in addition allows resolving [wiki:TracTickets tickets]. Tickets can be assigned to users through a [TracTickets#Assign-toasDrop-DownList drop-down list] when the list of possible owners has been restricted. || |
| 6 | Permissions are managed using the [TracAdmin trac-admin] tool or the ''General / Permissions'' panel in the ''Admin'' tab of the web interface. |
| 7 | |
| 8 | In addition to the default permission policy described in this page, it is possible to activate additional permission policies by enabling plugins and listing them in [TracIni#trac-permission_policies-option "[trac] permission_policies"]. See TracFineGrainedPermissions for more details. |
| 9 | |
| 10 | Non-authenticated users accessing the system are assigned the name //anonymous//. Assign permissions to the //anonymous// user to set privileges for anonymous/guest users. The parts of Trac that a user does not have privilege for will not be displayed in the navigation. |
| 11 | In addition to these privileges, users can be granted additional individual rights in effect when authenticated and logged into the system. All logged in users belong to the virtual group //authenticated//, which inherits permissions from //anonymous//. |
| 12 | |
| 13 | == Graphical Admin Tab |
| 14 | |
| 15 | To access this tab, a user must have one of the following permissions: `TRAC_ADMIN`, `PERMISSION_ADMIN`, `PERMISSION_GRANT`, `PERMISSION_REVOKE`. The permissions can be granted using the `trac-admin` command with a more detailed description [#GrantingPrivileges below]: |
| 16 | {{{#!sh |
| 17 | $ trac-admin /path/to/projenv permission add bob TRAC_ADMIN |
| 18 | }}} |
| 19 | |
| 20 | Then, the user `bob` will be able to see the Admin tab, and can access the permissions menu. This menu will allow you to perform all the following actions, but from the browser rather than requiring root access to the server. '''Use at least one lowercase character in user names, as all-uppercase names are reserved for permissions.''' |
| 21 | |
| 22 | [[Image(htdocs:../common/guide/admin.png)]] |
| 23 | |
| 24 | [[Image(htdocs:../common/guide/admin-permissions.png)]] |
| 25 | |
| 26 | [[Image(htdocs:../common/guide/admin-permissions-TICKET_ADMIN.png)]] |
| 27 | |
| 28 | From the graphical admin tab, users with `PERMISSION_GRANT` will only be allowed to grant permissions that they possess, and users with `PERMISSION_REVOKE` will only be allowed to revoke permissions that they possess. For example, a user cannot grant `MILESTONE_ADMIN` unless they have `PERMISSION_GRANT` and `MILESTONE_ADMIN`, and they cannot revoke `MILESTONE_ADMIN` unless they have `PERMISSION_REVOKE` and `MILESTONE_ADMIN`. `PERMISSION_ADMIN` just grants the user both `PERMISSION_GRANT` and `PERMISSION_REVOKE`, and users with `TRAC_ADMIN` can grant or revoke any permission. |
| 29 | |
| 30 | == Available Privileges |
| 31 | |
| 32 | To enable all privileges for a user, use the `TRAC_ADMIN` permission. This permission is like being `root` on a *NIX system: it will allow you to perform any operation. |
| 33 | |
| 34 | Otherwise, individual privileges can be assigned to users for the different functional areas of Trac and '''note that the privilege names are uppercase''': |
| 35 | |
| 36 | === Repository Browser |
| 37 | |
| 38 | || `BROWSER_VIEW` || View directory listings in the [TracBrowser repository browser] || |
| 39 | || `FILE_VIEW` || View files in the [TracBrowser repository browser] || |
| 40 | || `CHANGESET_VIEW` || View [TracChangeset repository check-ins] || |
| 41 | || `LOG_VIEW` || View revision logs of files and directories in the [TracBrowser repository browser] || |
| 42 | |
| 43 | === Ticket System |
| 44 | |
| 45 | || `TICKET_VIEW` || View existing [TracTickets tickets] and perform [TracQuery ticket queries] || |
| 46 | || `TICKET_CREATE` || Create new [TracTickets tickets] || |
| 47 | || `TICKET_APPEND` || Add comments and attachments to [TracTickets tickets], and edit description of ticket the user created || |
| 48 | || `TICKET_CHGPROP` || Modify [TracTickets ticket] properties (priority, assignment, keywords, etc.) with the following exceptions: edit description of tickets created by others, add/remove other users from cc field when logged in || |
| 49 | || `TICKET_MODIFY` || Includes both `TICKET_APPEND` and `TICKET_CHGPROP`, and in addition allows resolving [TracTickets tickets] in the [TracWorkflow default workflow]. Tickets can be assigned to users through a [TracTickets#Assign-toasDrop-DownList drop-down list] when the list of possible owners has been restricted. || |
90 | | === Others === |
91 | | |
92 | | || `TIMELINE_VIEW` || View the [wiki:TracTimeline timeline] page || |
93 | | || `SEARCH_VIEW` || View and execute [wiki:TracSearch search] queries || |
94 | | || `CONFIG_VIEW` || Enables additional pages on ''About Trac'' that show the current configuration or the list of installed plugins || |
95 | | || `EMAIL_VIEW` || Shows email addresses even if [trac:wiki:0.11/TracIni trac show_email_addresses configuration option is false] || |
96 | | |
97 | | == Creating New Privileges == |
98 | | |
99 | | To create custom permissions, for example to be used in a custom workflow, enable the optional `tracopt.perm.config_perm_provider.ExtraPermissionsProvider` component in the "Plugins" admin panel, and add the desired permissions to the `[extra-permissions]` section in your [wiki:TracIni#extra-permissions-section trac.ini]. For more information, please refer to the documentation of the component in the admin panel. |
100 | | |
101 | | == Granting Privileges == |
102 | | |
103 | | You grant privileges to users using [wiki:TracAdmin trac-admin]. The current set of privileges can be listed with the following command: |
| 90 | === Others |
| 91 | |
| 92 | || `TIMELINE_VIEW` || View the [TracTimeline timeline] page || |
| 93 | || `SEARCH_VIEW` || View and execute [TracSearch search] queries || |
| 94 | || `CONFIG_VIEW` || Enables additional sections on ''About Trac'' that show the current configuration and the list of installed plugins || |
| 95 | || `EMAIL_VIEW` || Shows email addresses even if [TracIni#trac-section trac show_email_addresses] configuration option is false || |
| 96 | |
| 97 | == Attachment Permissions |
| 98 | |
| 99 | Attachment permissions are handled by `LegacyAttachmentPolicy`, and unlike the permissions discussed so far, the permissions provided by `LegacyAttachmentPolicy` are not directly granted. Rather, the ability to create, view and delete attachments is determined by the attachment's parent realm and permissions the user possesses for that realm. |
| 100 | |
| 101 | The attachment actions are determined by the following |
| 102 | permissions in the ticket, wiki and milestone realms: |
| 103 | {{{#!table class="listing" |
| 104 | ||= Granted By: =||= Ticket =||= Wiki =||= Milestone =|| |
| 105 | || `ATTACHMENT_CREATE` || `TICKET_APPEND` || `WIKI_MODIFY` || `MILESTONE_MODIFY` || |
| 106 | || `ATTACHMENT_VIEW` || `TICKET_VIEW` || `WIKI_VIEW` || `MILESTONE_VIEW` || |
| 107 | || `ATTACHMENT_DELETE` || `TICKET_ADMIN` || `WIKI_DELETE` || `MILESTONE_DELETE` || |
| 108 | }}} |
| 109 | |
| 110 | An authenticated user can delete an attachment //they added// without possessing the permission |
| 111 | that grants `ATTACHMENT_DELETE`. |
| 112 | |
| 113 | If explicit attachment permissions are preferred, `ATTACHMENT_CREATE`, `ATTACHMENT_DELETE` and `ATTACHMENT_VIEW` can be created using the [trac:ExtraPermissionsProvider]. The simplest implementation is to simply define the actions. |
| 114 | {{{#!ini |
| 115 | [extra-permissions] |
| 116 | _perms = ATTACHMENT_CREATE, ATTACHMENT_DELETE, ATTACHMENT_VIEW |
| 117 | }}} |
| 118 | |
| 119 | An alternative configuration adds an `ATTACHMENT_ADMIN` meta-permission that grants the other 3 permission. |
| 120 | {{{#!ini |
| 121 | [extra-permissions] |
| 122 | ATTACHMENT_ADMIN = ATTACHMENT_CREATE, ATTACHMENT_DELETE, ATTACHMENT_VIEW |
| 123 | }}} |
| 124 | |
| 125 | The explicit permissions can be used in concert with `LegacyAttachmentPolicy`, or `LegacyAttachmentPolicy` can be removed from `permission_policies`, in which case only users that have been explicitly granted the corresponding attachment actions will be able to create, delete and view attachments. |
| 126 | |
| 127 | == Granting Privileges |
| 128 | |
| 129 | You grant privileges to users using [TracAdmin trac-admin]. The current set of privileges can be listed with the following command: |
| 130 | {{{#!sh |
| 131 | $ trac-admin /path/to/projenv permission list |
| 132 | }}} |
| 133 | |
| 134 | This command will allow the user ''bob'' to delete reports: |
| 135 | {{{#!sh |
| 136 | $ trac-admin /path/to/projenv permission add bob REPORT_DELETE |
| 137 | }}} |
| 138 | |
| 139 | The `permission add` command also accepts multiple privilege names: |
| 140 | {{{#!sh |
| 141 | $ trac-admin /path/to/projenv permission add bob REPORT_DELETE WIKI_CREATE |
| 142 | }}} |
| 143 | |
| 144 | Or add all privileges: |
| 145 | {{{#!sh |
| 146 | $ trac-admin /path/to/projenv permission add bob TRAC_ADMIN |
| 147 | }}} |
| 148 | |
| 149 | == Permission Groups |
| 150 | |
| 151 | There are two built-in groups, //authenticated// and //anonymous//. |
| 152 | Any user who has not logged in is automatically in the //anonymous// group. |
| 153 | Any user who has logged in is also in the //authenticated// group. |
| 154 | The //authenticated// group inherits permissions from the //anonymous// group. |
| 155 | For example, if the //anonymous// group has permission WIKI_MODIFY, it is not necessary to add the WIKI_MODIFY permission to the //authenticated// group as well. |
| 156 | |
| 157 | Custom groups may be defined that inherit permissions from the two built-in groups. |
| 158 | |
| 159 | Permissions can be grouped together to form roles such as ''developer'', ''admin'', etc. |
| 160 | {{{#!sh |
| 161 | $ trac-admin /path/to/projenv permission add developer WIKI_ADMIN |
| 162 | $ trac-admin /path/to/projenv permission add developer REPORT_ADMIN |
| 163 | $ trac-admin /path/to/projenv permission add developer TICKET_MODIFY |
| 164 | $ trac-admin /path/to/projenv permission add bob developer |
| 165 | $ trac-admin /path/to/projenv permission add john developer |
| 166 | }}} |
| 167 | |
| 168 | Group membership can be checked by doing a {{{permission list}}} with no further arguments; the resulting output will include group memberships. '''Use at least one lowercase character in group names, as all-uppercase names are reserved for permissions'''. |
| 169 | |
| 170 | == Adding a New Group and Permissions |
| 171 | Permission groups can be created by assigning a user to a group you wish to create, then assign permissions to that group. |
| 172 | |
| 173 | The following will add ''bob'' to the new group called ''beta_testers'' and then will assign `WIKI_ADMIN` permissions to that group. Thus, ''bob'' will inherit the `WIKI_ADMIN` permission. |
| 174 | {{{#!sh |
| 175 | $ trac-admin /path/to/projenv permission add bob beta_testers |
| 176 | $ trac-admin /path/to/projenv permission add beta_testers WIKI_ADMIN |
| 177 | }}} |
| 178 | |
| 179 | == Removing Permissions |
| 180 | |
| 181 | Permissions can be removed using the 'remove' command. |
| 182 | |
| 183 | This command will prevent the user ''bob'' from deleting reports: |
| 184 | {{{#!sh |
| 185 | $ trac-admin /path/to/projenv permission remove bob REPORT_DELETE |
| 186 | }}} |
| 187 | |
| 188 | Just like `permission add`, this command accepts multiple privilege names. |
| 189 | |
| 190 | You can also remove all privileges for a specific user: |
| 191 | {{{#!sh |
| 192 | $ trac-admin /path/to/projenv permission remove bob '*' |
| 193 | }}} |
| 194 | |
| 195 | Or one privilege for all users: |
| 196 | {{{#!sh |
| 197 | $ trac-admin /path/to/projenv permission remove '*' REPORT_ADMIN |
| 198 | }}} |
| 199 | |
| 200 | == Creating New Privileges |
| 201 | |
| 202 | To create custom permissions, for example to be used in a custom workflow, enable the optional [trac:ExtraPermissionsProvider tracopt.perm.config_perm_provider.ExtraPermissionsProvider] component in the "Plugins" admin panel, and add the desired permissions to the `[extra-permissions]` section in your [TracIni#extra-permissions-section trac.ini]. For more information, please refer to the documentation on the [TracIni#extra-permissions-section TracIni] page after enabling the component. |
| 203 | |
| 204 | == Default Permissions |
| 205 | |
| 206 | By default on a new Trac installation, the //anonymous// user will have ''view'' access to everything in Trac, but will not be able to create or modify anything. |
| 207 | On the other hand, the //authenticated// users will have the permissions to ''create and modify tickets and wiki pages''. |
| 208 | |
| 209 | //**anonymous**// |
110 | | $ trac-admin /path/to/projenv permission add bob REPORT_DELETE |
111 | | }}} |
112 | | |
113 | | The `permission add` command also accepts multiple privilege names: |
114 | | {{{ |
115 | | $ trac-admin /path/to/projenv permission add bob REPORT_DELETE WIKI_CREATE |
116 | | }}} |
117 | | |
118 | | Or add all privileges: |
119 | | {{{ |
120 | | $ trac-admin /path/to/projenv permission add bob TRAC_ADMIN |
121 | | }}} |
122 | | |
123 | | == Permission Groups == |
124 | | |
125 | | There are two built-in groups, "authenticated" and "anonymous". |
126 | | Any user who has not logged in is automatically in the "anonymous" group. |
127 | | Any user who has logged in is also in the "authenticated" group. |
128 | | The "authenticated" group inherits permissions from the "anonymous" group. |
129 | | For example, if the "anonymous" group has permission WIKI_MODIFY, |
130 | | it is not necessary to add the WIKI_MODIFY permission to the "authenticated" group as well. |
131 | | |
132 | | Custom groups may be defined that inherit permissions from the two built-in groups. |
133 | | |
134 | | Permissions can be grouped together to form roles such as ''developer'', ''admin'', etc. |
135 | | {{{ |
136 | | $ trac-admin /path/to/projenv permission add developer WIKI_ADMIN |
137 | | $ trac-admin /path/to/projenv permission add developer REPORT_ADMIN |
138 | | $ trac-admin /path/to/projenv permission add developer TICKET_MODIFY |
139 | | $ trac-admin /path/to/projenv permission add bob developer |
140 | | $ trac-admin /path/to/projenv permission add john developer |
141 | | }}} |
142 | | |
143 | | Group membership can be checked by doing a {{{permission list}}} with no further arguments; the resulting output will include group memberships. '''Use at least one lowercase character in group names, as all-uppercase names are reserved for permissions'''. |
144 | | |
145 | | == Adding a New Group and Permissions == |
146 | | Permission groups can be created by assigning a user to a group you wish to create, then assign permissions to that group. |
147 | | |
148 | | The following will add ''bob'' to the new group called ''beta_testers'' and then will assign WIKI_ADMIN permissions to that group. (Thus, ''bob'' will inherit the WIKI_ADMIN permission) |
149 | | {{{ |
150 | | $ trac-admin /path/to/projenv permission add bob beta_testers |
151 | | $ trac-admin /path/to/projenv permission add beta_testers WIKI_ADMIN |
152 | | |
153 | | }}} |
154 | | |
155 | | == Removing Permissions == |
156 | | |
157 | | Permissions can be removed using the 'remove' command. For example: |
158 | | |
159 | | This command will prevent the user ''bob'' from deleting reports: |
160 | | {{{ |
161 | | $ trac-admin /path/to/projenv permission remove bob REPORT_DELETE |
162 | | }}} |
163 | | |
164 | | Just like `permission add`, this command accepts multiple privilege names. |
165 | | |
166 | | You can also remove all privileges for a specific user: |
167 | | {{{ |
168 | | $ trac-admin /path/to/projenv permission remove bob '*' |
169 | | }}} |
170 | | |
171 | | Or one privilege for all users: |
172 | | {{{ |
173 | | $ trac-admin /path/to/projenv permission remove '*' REPORT_ADMIN |
174 | | }}} |
175 | | |
176 | | == Default Permissions == |
177 | | |
178 | | By default on a new Trac installation, the `anonymous` user will have ''view'' access to everything in Trac, but will not be able to create or modify anything. |
179 | | On the other hand, the `authenticated` users will have the permissions to ''create and modify tickets and wiki pages''. |
180 | | |
181 | | '''anonymous''' |
182 | | {{{ |
183 | | BROWSER_VIEW |
184 | | CHANGESET_VIEW |
185 | | FILE_VIEW |
186 | | LOG_VIEW |
187 | | MILESTONE_VIEW |
188 | | REPORT_SQL_VIEW |
189 | | REPORT_VIEW |
190 | | ROADMAP_VIEW |
191 | | SEARCH_VIEW |
192 | | TICKET_VIEW |
193 | | TIMELINE_VIEW |
194 | | WIKI_VIEW |
195 | | }}} |
196 | | |
197 | | '''authenticated''' |
198 | | {{{ |
199 | | TICKET_CREATE |
200 | | TICKET_MODIFY |
201 | | WIKI_CREATE |
202 | | WIKI_MODIFY |
| 227 | TICKET_CREATE |
| 228 | TICKET_MODIFY |
| 229 | WIKI_CREATE |
| 230 | WIKI_MODIFY |