summary | shortlog | log | commit | commitdiff | tree
raw | patch | inline | side by side (parent: dc1f0ec)
raw | patch | inline | side by side (parent: dc1f0ec)
author | richard <richard@57a73879-2fb5-44c3-a270-3262357dd7e2> | |
Mon, 16 Sep 2002 04:30:45 +0000 (04:30 +0000) | ||
committer | richard <richard@57a73879-2fb5-44c3-a270-3262357dd7e2> | |
Mon, 16 Sep 2002 04:30:45 +0000 (04:30 +0000) |
git-svn-id: http://svn.roundup-tracker.org/svnroot/roundup/trunk@1174 57a73879-2fb5-44c3-a270-3262357dd7e2
doc/customizing.txt | patch | blob | history |
diff --git a/doc/customizing.txt b/doc/customizing.txt
index 0958c48d4b107e876e26c6ab2c8e5dec4fc099d3..05958a8b0b178c7014d83032d91cb0bc7304ec27 100644 (file)
--- a/doc/customizing.txt
+++ b/doc/customizing.txt
Customising Roundup
===================
-:Version: $Revision: 1.38 $
+:Version: $Revision: 1.39 $
.. This document borrows from the ZopeBook section on ZPT. The original is at:
http://www.zope.org/Documentation/Books/ZopeBook/current/ZPT.stx
Restricting the list of users that are assignable to a task
-----------------------------------------------------------
-1. create a new Role, say "Developer"::
+1. In your tracker's "dbinit.py", create a new Role, say "Developer"::
db.security.addRole(name='Developer', description='A developer')
-2. create a new Permission, say "Fixer", specific to "issue"::
+2. Just after that, create a new Permission, say "Fixer", specific to "issue"::
p = db.security.addPermission(name='Fixer', klass='issue',
description='User is allowed to be assigned to fix issues')
-3. assign the new Permission to your "Developer" Role::
+3. Then assign the new Permission to your "Developer" Role::
db.security.addPermissionToRole('Developer', p)
-4. use the new Permission in restricting the "assignedto" list in the issue
- item edit page::
+4. In the issue item edit page ("html/issue.item" in your tracker dir), use
+ the new Permission in restricting the "assignedto" list::
<select name="assignedto">
<option value="-1">- no selection -</option>
</select>
For extra security, you may wish to set up an auditor to enforce the
-Permission requirement::
+Permission requirement (install this as "assignedtoFixer.py" in your tracker
+"detectors" directory)::
def assignedtoMustBeFixer(db, cl, nodeid, newvalues):
''' Ensure the assignedto value in newvalues is a used with the Fixer