%namespace name="base" file="/base/base.mako"/>
${_('None')} | ${_('Read')} | ${_('Write')} | ${_('Admin')} | ${_('User/User Group')} | ||
---|---|---|---|---|---|---|
${h.radio('admin_perm_%s' % _user.user_id,'repository.none', disabled="disabled")} | ${h.radio('admin_perm_%s' % _user.user_id,'repository.read', disabled="disabled")} | ${h.radio('admin_perm_%s' % _user.user_id,'repository.write', disabled="disabled")} | ${h.radio('admin_perm_%s' % _user.user_id,'repository.admin', 'repository.admin', disabled="disabled")} | ${base.gravatar(_user.email, 16)} ${h.link_to_user(_user.username)} %if getattr(_user, 'admin_row', None): (${_('super admin')}) %endif %if getattr(_user, 'owner_row', None): (${_('owner')}) %endif | % if c.rhodecode_user.is_admin: | % endif|
${_('private repository')} | ${base.gravatar(h.DEFAULT_USER_EMAIL, 16)} ${h.DEFAULT_USER} - ${_('only users/user groups explicitly added here will have access')} | % if c.rhodecode_user.is_admin: | % endif||||
${h.radio('u_perm_%s' % _user.user_id,'repository.none', checked=_user.permission=='repository.none', disabled="disabled" if (used_by_n_rules and _user.username != h.DEFAULT_USER) else None)} | ${h.radio('u_perm_%s' % _user.user_id,'repository.read', checked=_user.permission=='repository.read', disabled="disabled" if (used_by_n_rules and _user.username != h.DEFAULT_USER) else None)} | ${h.radio('u_perm_%s' % _user.user_id,'repository.write', checked=_user.permission=='repository.write')} | ${h.radio('u_perm_%s' % _user.user_id,'repository.admin', checked=_user.permission=='repository.admin')} | ${base.gravatar(_user.email, 16)} % if _user.username == h.DEFAULT_USER: ${h.DEFAULT_USER} - ${_('permission for all other users')} % else: ${h.link_to_user(_user.username)} %if getattr(_user, 'duplicate_perm', None): (${_('inactive duplicate')}) %endif %if getattr(_user, 'branch_rules', None): % if used_by_n_rules == 1: (${_('used by {} branch rule, requires write+ permissions').format(used_by_n_rules)}) % else: (${_('used by {} branch rules, requires write+ permissions').format(used_by_n_rules)}) % endif %endif % endif | %if _user.username != h.DEFAULT_USER and getattr(_user, 'branch_rules', None) is None: ${_('Remove')} %endif | % if c.rhodecode_user.is_admin: | % endif
${h.radio('g_perm_%s' % _user_group.users_group_id,'repository.none', checked=_user_group.permission=='repository.none')} | ${h.radio('g_perm_%s' % _user_group.users_group_id,'repository.read', checked=_user_group.permission=='repository.read')} | ${h.radio('g_perm_%s' % _user_group.users_group_id,'repository.write', checked=_user_group.permission=='repository.write')} | ${h.radio('g_perm_%s' % _user_group.users_group_id,'repository.admin', checked=_user_group.permission=='repository.admin')} | %if h.HasPermissionAny('hg.admin')(): ${_user_group.users_group_name} %else: ${h.link_to_group(_user_group.users_group_name)} %endif (${_('members')}: ${len(_user_group.members)}) | ${_('Remove')} | % if c.rhodecode_user.is_admin: | % endif
${_('Add user/user group')} |