Show More
@@ -520,7 +520,7 b' fixes' | |||||
520 | and groups |
|
520 | and groups | |
521 | - fixes #271 rare JSON serialization problem with statistics |
|
521 | - fixes #271 rare JSON serialization problem with statistics | |
522 | - fixes #337 missing validation check for conflicting names of a group with a |
|
522 | - fixes #337 missing validation check for conflicting names of a group with a | |
523 |
repositor |
|
523 | repository group | |
524 | - #340 fixed session problem for mysql and celery tasks |
|
524 | - #340 fixed session problem for mysql and celery tasks | |
525 | - fixed #331 RhodeCode mangles repository names if the a repository group |
|
525 | - fixed #331 RhodeCode mangles repository names if the a repository group | |
526 | contains the "full path" to the repositories |
|
526 | contains the "full path" to the repositories |
@@ -48,7 +48,7 b' def make_map(config):' | |||||
48 |
|
48 | |||
49 | def check_group(environ, match_dict): |
|
49 | def check_group(environ, match_dict): | |
50 | """ |
|
50 | """ | |
51 |
check for valid repositor |
|
51 | check for valid repository group for proper 404 handling | |
52 |
|
52 | |||
53 | :param environ: |
|
53 | :param environ: | |
54 | :param match_dict: |
|
54 | :param match_dict: |
@@ -1378,10 +1378,10 b' class Permission(Base, BaseModel):' | |||||
1378 | ('repository.write', _('Repository write access')), |
|
1378 | ('repository.write', _('Repository write access')), | |
1379 | ('repository.admin', _('Repository admin access')), |
|
1379 | ('repository.admin', _('Repository admin access')), | |
1380 |
|
1380 | |||
1381 |
('group.none', _('Repositor |
|
1381 | ('group.none', _('Repository group no access')), | |
1382 |
('group.read', _('Repositor |
|
1382 | ('group.read', _('Repository group read access')), | |
1383 |
('group.write', _('Repositor |
|
1383 | ('group.write', _('Repository group write access')), | |
1384 |
('group.admin', _('Repositor |
|
1384 | ('group.admin', _('Repository group admin access')), | |
1385 |
|
1385 | |||
1386 | ('hg.admin', _('RhodeCode Administrator')), |
|
1386 | ('hg.admin', _('RhodeCode Administrator')), | |
1387 | ('hg.create.none', _('Repository creation disabled')), |
|
1387 | ('hg.create.none', _('Repository creation disabled')), |
@@ -79,7 +79,7 b' class ReposGroupModel(BaseModel):' | |||||
79 |
|
79 | |||
80 | def __create_group(self, group_name): |
|
80 | def __create_group(self, group_name): | |
81 | """ |
|
81 | """ | |
82 |
makes repositor |
|
82 | makes repository group on filesystem | |
83 |
|
83 | |||
84 | :param repo_name: |
|
84 | :param repo_name: | |
85 | :param parent_id: |
|
85 | :param parent_id: | |
@@ -327,7 +327,7 b' class ReposGroupModel(BaseModel):' | |||||
327 |
|
327 | |||
328 | def grant_user_permission(self, repos_group, user, perm): |
|
328 | def grant_user_permission(self, repos_group, user, perm): | |
329 | """ |
|
329 | """ | |
330 |
Grant permission for user on given repositor |
|
330 | Grant permission for user on given repository group, or update | |
331 | existing one if found |
|
331 | existing one if found | |
332 |
|
332 | |||
333 | :param repos_group: Instance of ReposGroup, repositories_group_id, |
|
333 | :param repos_group: Instance of ReposGroup, repositories_group_id, | |
@@ -356,7 +356,7 b' class ReposGroupModel(BaseModel):' | |||||
356 |
|
356 | |||
357 | def revoke_user_permission(self, repos_group, user): |
|
357 | def revoke_user_permission(self, repos_group, user): | |
358 | """ |
|
358 | """ | |
359 |
Revoke permission for user on given repositor |
|
359 | Revoke permission for user on given repository group | |
360 |
|
360 | |||
361 | :param repos_group: Instance of ReposGroup, repositories_group_id, |
|
361 | :param repos_group: Instance of ReposGroup, repositories_group_id, | |
362 | or repositories_group name |
|
362 | or repositories_group name | |
@@ -376,7 +376,7 b' class ReposGroupModel(BaseModel):' | |||||
376 |
|
376 | |||
377 | def grant_users_group_permission(self, repos_group, group_name, perm): |
|
377 | def grant_users_group_permission(self, repos_group, group_name, perm): | |
378 | """ |
|
378 | """ | |
379 |
Grant permission for user group on given repositor |
|
379 | Grant permission for user group on given repository group, or update | |
380 | existing one if found |
|
380 | existing one if found | |
381 |
|
381 | |||
382 | :param repos_group: Instance of ReposGroup, repositories_group_id, |
|
382 | :param repos_group: Instance of ReposGroup, repositories_group_id, | |
@@ -407,7 +407,7 b' class ReposGroupModel(BaseModel):' | |||||
407 |
|
407 | |||
408 | def revoke_users_group_permission(self, repos_group, group_name): |
|
408 | def revoke_users_group_permission(self, repos_group, group_name): | |
409 | """ |
|
409 | """ | |
410 |
Revoke permission for user group on given repositor |
|
410 | Revoke permission for user group on given repository group | |
411 |
|
411 | |||
412 | :param repos_group: Instance of ReposGroup, repositories_group_id, |
|
412 | :param repos_group: Instance of ReposGroup, repositories_group_id, | |
413 | or repositories_group name |
|
413 | or repositories_group name |
@@ -133,7 +133,7 b' def ValidUsersGroup(edit=False, old_data' | |||||
133 | class _validator(formencode.validators.FancyValidator): |
|
133 | class _validator(formencode.validators.FancyValidator): | |
134 | messages = { |
|
134 | messages = { | |
135 | 'invalid_group': _(u'Invalid user group name'), |
|
135 | 'invalid_group': _(u'Invalid user group name'), | |
136 |
'group_exist': _(u'User |
|
136 | 'group_exist': _(u'User group "%(usersgroup)s" already exists'), | |
137 | 'invalid_usersgroup_name': |
|
137 | 'invalid_usersgroup_name': | |
138 | _(u'user group name may only contain alphanumeric ' |
|
138 | _(u'user group name may only contain alphanumeric ' | |
139 | 'characters underscores, periods or dashes and must begin ' |
|
139 | 'characters underscores, periods or dashes and must begin ' | |
@@ -317,7 +317,7 b' def ValidRepoName(edit=False, old_data={' | |||||
317 | _(u'Repository named %(repo)s already exists'), |
|
317 | _(u'Repository named %(repo)s already exists'), | |
318 | 'repository_in_group_exists': _(u'Repository "%(repo)s" already ' |
|
318 | 'repository_in_group_exists': _(u'Repository "%(repo)s" already ' | |
319 | 'exists in group "%(group)s"'), |
|
319 | 'exists in group "%(group)s"'), | |
320 |
'same_group_exists': _(u'Repositor |
|
320 | 'same_group_exists': _(u'Repository group with name "%(repo)s" ' | |
321 | 'already exists') |
|
321 | 'already exists') | |
322 | } |
|
322 | } | |
323 |
|
323 |
@@ -59,7 +59,7 b'' | |||||
59 | ${h.checkbox('overwrite_default_group','true')} |
|
59 | ${h.checkbox('overwrite_default_group','true')} | |
60 | <label for="overwrite_default_group"> |
|
60 | <label for="overwrite_default_group"> | |
61 | <span class="tooltip" |
|
61 | <span class="tooltip" | |
62 |
title="${h.tooltip(_('All default permissions on each repository group will be reset to choosen permission, note that all custom default permission on repositor |
|
62 | title="${h.tooltip(_('All default permissions on each repository group will be reset to choosen permission, note that all custom default permission on repository groups will be lost'))}"> | |
63 | ${_('overwrite existing settings')}</span> </label> |
|
63 | ${_('overwrite existing settings')}</span> </label> | |
64 |
|
64 | |||
65 | </div> |
|
65 | </div> |
@@ -48,7 +48,7 b'' | |||||
48 | <tr> |
|
48 | <tr> | |
49 | <td> |
|
49 | <td> | |
50 | <div style="white-space: nowrap"> |
|
50 | <div style="white-space: nowrap"> | |
51 |
<img class="icon" alt="${_('Repositor |
|
51 | <img class="icon" alt="${_('Repository group')}" src="${h.url('/images/icons/database_link.png')}"/> | |
52 | ${h.link_to(gr.name,url('repos_group_home',group_name=gr.group_name))} |
|
52 | ${h.link_to(gr.name,url('repos_group_home',group_name=gr.group_name))} | |
53 | </div> |
|
53 | </div> | |
54 | </td> |
|
54 | </td> |
General Comments 0
You need to be logged in to leave comments.
Login now