On 2013-11-12 21:41, Olemis Lang wrote:
Unless I missed something or a regression has been introduced in /trunk
that's exactly the case . This is enforced by the multi-product
permission
policy [1]_

I join you a screenshot that shows that it's not.
And to my understanding it is because of not returning the handler if "not req.perm.has_permission('TRAC_ADMIN')" in the product admin. By removing this check product panel admin becomes available to the owner _without_ giving access to other admin panels. At least that's what my tests are showing :)

Nevertheless there's a difference between Trac and product admin role . The former are site admins , i.e. they have access to the file system , sudo etc ... whereas the later only manage product resources e.g. tickets , wiki , ... If you could list all the instances we fail at doing so we'll be
looking forward to improve them asap

I see the repositories as a product ressource

they can ...

Not really they can only link to a globally available repository... which beats the product isolation.

... but yes , there is a reason and it's due to the Trac vs product admin roles mentioned above . Trac repository connectors operate on repos cloned in the local file systems (or equivalent ;) therefore adding a new one happens outside the web site boundaries is more like a task of site admins

I don't think this matters much. Even if the product owner doesn't have access to filesystem this shouldn't prevent him to enter a path given to him by the "bloodhound server admin"

Regards,
Olivier

Reply via email to