Fossil SCM
An extension of [3941824d] to remove all mention of 'd' capability from the code, not just ifdef or comment it out. Also removes it from the docs and from the default capability set for Developer, dei -> ei.
Commit
55a76439382ffc5df495a610392f222fff567463a915abc4b75bcd374babebda
Parent
3941824d8547d8c…
6 files changed
+1
-1
-1
+1
-3
-1
+4
-4
-8
M
src/db.c
+1
-1
| --- src/db.c | ||
| +++ src/db.c | ||
| @@ -2074,11 +2074,11 @@ | ||
| 2074 | 2074 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2075 | 2075 | " VALUES('anonymous',hex(randomblob(8)),'hmnc','Anon');" |
| 2076 | 2076 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2077 | 2077 | " VALUES('nobody','','gjorz','Nobody');" |
| 2078 | 2078 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2079 | - " VALUES('developer','','dei','Dev');" | |
| 2079 | + " VALUES('developer','','ei','Dev');" | |
| 2080 | 2080 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2081 | 2081 | " VALUES('reader','','kptw','Reader');" |
| 2082 | 2082 | ); |
| 2083 | 2083 | } |
| 2084 | 2084 | } |
| 2085 | 2085 |
| --- src/db.c | |
| +++ src/db.c | |
| @@ -2074,11 +2074,11 @@ | |
| 2074 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2075 | " VALUES('anonymous',hex(randomblob(8)),'hmnc','Anon');" |
| 2076 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2077 | " VALUES('nobody','','gjorz','Nobody');" |
| 2078 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2079 | " VALUES('developer','','dei','Dev');" |
| 2080 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2081 | " VALUES('reader','','kptw','Reader');" |
| 2082 | ); |
| 2083 | } |
| 2084 | } |
| 2085 |
| --- src/db.c | |
| +++ src/db.c | |
| @@ -2074,11 +2074,11 @@ | |
| 2074 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2075 | " VALUES('anonymous',hex(randomblob(8)),'hmnc','Anon');" |
| 2076 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2077 | " VALUES('nobody','','gjorz','Nobody');" |
| 2078 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2079 | " VALUES('developer','','ei','Dev');" |
| 2080 | "INSERT OR IGNORE INTO user(login,pw,cap,info)" |
| 2081 | " VALUES('reader','','kptw','Reader');" |
| 2082 | ); |
| 2083 | } |
| 2084 | } |
| 2085 |
-1
| --- src/json.c | ||
| +++ src/json.c | ||
| @@ -1898,11 +1898,10 @@ | ||
| 1898 | 1898 | obj = cson_value_get_object(sub); |
| 1899 | 1899 | |
| 1900 | 1900 | #define ADD(X,K) cson_object_set(obj, K, cson_value_new_bool(g.perm.X)) |
| 1901 | 1901 | ADD(Setup,"setup"); |
| 1902 | 1902 | ADD(Admin,"admin"); |
| 1903 | - ADD(Delete,"delete"); | |
| 1904 | 1903 | ADD(Password,"password"); |
| 1905 | 1904 | ADD(Query,"query"); /* don't think this one is actually used */ |
| 1906 | 1905 | ADD(Write,"checkin"); |
| 1907 | 1906 | ADD(Read,"checkout"); |
| 1908 | 1907 | ADD(Hyperlink,"history"); |
| 1909 | 1908 |
| --- src/json.c | |
| +++ src/json.c | |
| @@ -1898,11 +1898,10 @@ | |
| 1898 | obj = cson_value_get_object(sub); |
| 1899 | |
| 1900 | #define ADD(X,K) cson_object_set(obj, K, cson_value_new_bool(g.perm.X)) |
| 1901 | ADD(Setup,"setup"); |
| 1902 | ADD(Admin,"admin"); |
| 1903 | ADD(Delete,"delete"); |
| 1904 | ADD(Password,"password"); |
| 1905 | ADD(Query,"query"); /* don't think this one is actually used */ |
| 1906 | ADD(Write,"checkin"); |
| 1907 | ADD(Read,"checkout"); |
| 1908 | ADD(Hyperlink,"history"); |
| 1909 |
| --- src/json.c | |
| +++ src/json.c | |
| @@ -1898,11 +1898,10 @@ | |
| 1898 | obj = cson_value_get_object(sub); |
| 1899 | |
| 1900 | #define ADD(X,K) cson_object_set(obj, K, cson_value_new_bool(g.perm.X)) |
| 1901 | ADD(Setup,"setup"); |
| 1902 | ADD(Admin,"admin"); |
| 1903 | ADD(Password,"password"); |
| 1904 | ADD(Query,"query"); /* don't think this one is actually used */ |
| 1905 | ADD(Write,"checkin"); |
| 1906 | ADD(Read,"checkout"); |
| 1907 | ADD(Hyperlink,"history"); |
| 1908 |
+1
-3
| --- src/login.c | ||
| +++ src/login.c | ||
| @@ -1227,20 +1227,19 @@ | ||
| 1227 | 1227 | case 'a': p->Admin = p->RdTkt = p->WrTkt = p->Zip = |
| 1228 | 1228 | p->RdWiki = p->WrWiki = p->NewWiki = |
| 1229 | 1229 | p->ApndWiki = p->Hyperlink = p->Clone = |
| 1230 | 1230 | p->NewTkt = p->Password = p->RdAddr = |
| 1231 | 1231 | p->TktFmt = p->Attach = p->ApndTkt = |
| 1232 | - p->ModWiki = p->ModTkt = p->Delete = | |
| 1232 | + p->ModWiki = p->ModTkt = | |
| 1233 | 1233 | p->RdForum = p->WrForum = p->ModForum = |
| 1234 | 1234 | p->WrTForum = p->AdminForum = |
| 1235 | 1235 | p->EmailAlert = p->Announce = p->Debug = 1; |
| 1236 | 1236 | /* Fall thru into Read/Write */ |
| 1237 | 1237 | case 'i': p->Read = p->Write = 1; break; |
| 1238 | 1238 | case 'o': p->Read = 1; break; |
| 1239 | 1239 | case 'z': p->Zip = 1; break; |
| 1240 | 1240 | |
| 1241 | - case 'd': p->Delete = 1; /* Not Used */ break; | |
| 1242 | 1241 | case 'h': p->Hyperlink = 1; break; |
| 1243 | 1242 | case 'g': p->Clone = 1; break; |
| 1244 | 1243 | case 'p': p->Password = 1; break; |
| 1245 | 1244 | |
| 1246 | 1245 | case 'j': p->RdWiki = 1; break; |
| @@ -1320,11 +1319,10 @@ | ||
| 1320 | 1319 | for(i=0; i<nCap && rc && zCap[i]; i++){ |
| 1321 | 1320 | switch( zCap[i] ){ |
| 1322 | 1321 | case 'a': rc = p->Admin; break; |
| 1323 | 1322 | case 'b': rc = p->Attach; break; |
| 1324 | 1323 | case 'c': rc = p->ApndTkt; break; |
| 1325 | - case 'd': rc = p->Delete; break; /* Not used */ | |
| 1326 | 1324 | case 'e': rc = p->RdAddr; break; |
| 1327 | 1325 | case 'f': rc = p->NewWiki; break; |
| 1328 | 1326 | case 'g': rc = p->Clone; break; |
| 1329 | 1327 | case 'h': rc = p->Hyperlink; break; |
| 1330 | 1328 | case 'i': rc = p->Write; break; |
| 1331 | 1329 |
| --- src/login.c | |
| +++ src/login.c | |
| @@ -1227,20 +1227,19 @@ | |
| 1227 | case 'a': p->Admin = p->RdTkt = p->WrTkt = p->Zip = |
| 1228 | p->RdWiki = p->WrWiki = p->NewWiki = |
| 1229 | p->ApndWiki = p->Hyperlink = p->Clone = |
| 1230 | p->NewTkt = p->Password = p->RdAddr = |
| 1231 | p->TktFmt = p->Attach = p->ApndTkt = |
| 1232 | p->ModWiki = p->ModTkt = p->Delete = |
| 1233 | p->RdForum = p->WrForum = p->ModForum = |
| 1234 | p->WrTForum = p->AdminForum = |
| 1235 | p->EmailAlert = p->Announce = p->Debug = 1; |
| 1236 | /* Fall thru into Read/Write */ |
| 1237 | case 'i': p->Read = p->Write = 1; break; |
| 1238 | case 'o': p->Read = 1; break; |
| 1239 | case 'z': p->Zip = 1; break; |
| 1240 | |
| 1241 | case 'd': p->Delete = 1; /* Not Used */ break; |
| 1242 | case 'h': p->Hyperlink = 1; break; |
| 1243 | case 'g': p->Clone = 1; break; |
| 1244 | case 'p': p->Password = 1; break; |
| 1245 | |
| 1246 | case 'j': p->RdWiki = 1; break; |
| @@ -1320,11 +1319,10 @@ | |
| 1320 | for(i=0; i<nCap && rc && zCap[i]; i++){ |
| 1321 | switch( zCap[i] ){ |
| 1322 | case 'a': rc = p->Admin; break; |
| 1323 | case 'b': rc = p->Attach; break; |
| 1324 | case 'c': rc = p->ApndTkt; break; |
| 1325 | case 'd': rc = p->Delete; break; /* Not used */ |
| 1326 | case 'e': rc = p->RdAddr; break; |
| 1327 | case 'f': rc = p->NewWiki; break; |
| 1328 | case 'g': rc = p->Clone; break; |
| 1329 | case 'h': rc = p->Hyperlink; break; |
| 1330 | case 'i': rc = p->Write; break; |
| 1331 |
| --- src/login.c | |
| +++ src/login.c | |
| @@ -1227,20 +1227,19 @@ | |
| 1227 | case 'a': p->Admin = p->RdTkt = p->WrTkt = p->Zip = |
| 1228 | p->RdWiki = p->WrWiki = p->NewWiki = |
| 1229 | p->ApndWiki = p->Hyperlink = p->Clone = |
| 1230 | p->NewTkt = p->Password = p->RdAddr = |
| 1231 | p->TktFmt = p->Attach = p->ApndTkt = |
| 1232 | p->ModWiki = p->ModTkt = |
| 1233 | p->RdForum = p->WrForum = p->ModForum = |
| 1234 | p->WrTForum = p->AdminForum = |
| 1235 | p->EmailAlert = p->Announce = p->Debug = 1; |
| 1236 | /* Fall thru into Read/Write */ |
| 1237 | case 'i': p->Read = p->Write = 1; break; |
| 1238 | case 'o': p->Read = 1; break; |
| 1239 | case 'z': p->Zip = 1; break; |
| 1240 | |
| 1241 | case 'h': p->Hyperlink = 1; break; |
| 1242 | case 'g': p->Clone = 1; break; |
| 1243 | case 'p': p->Password = 1; break; |
| 1244 | |
| 1245 | case 'j': p->RdWiki = 1; break; |
| @@ -1320,11 +1319,10 @@ | |
| 1319 | for(i=0; i<nCap && rc && zCap[i]; i++){ |
| 1320 | switch( zCap[i] ){ |
| 1321 | case 'a': rc = p->Admin; break; |
| 1322 | case 'b': rc = p->Attach; break; |
| 1323 | case 'c': rc = p->ApndTkt; break; |
| 1324 | case 'e': rc = p->RdAddr; break; |
| 1325 | case 'f': rc = p->NewWiki; break; |
| 1326 | case 'g': rc = p->Clone; break; |
| 1327 | case 'h': rc = p->Hyperlink; break; |
| 1328 | case 'i': rc = p->Write; break; |
| 1329 |
-1
| --- src/main.c | ||
| +++ src/main.c | ||
| @@ -78,11 +78,10 @@ | ||
| 78 | 78 | ** Holds flags for fossil user permissions. |
| 79 | 79 | */ |
| 80 | 80 | struct FossilUserPerms { |
| 81 | 81 | char Setup; /* s: use Setup screens on web interface */ |
| 82 | 82 | char Admin; /* a: administrative permission */ |
| 83 | - char Delete; /* d: delete wiki or tickets - Not Used */ | |
| 84 | 83 | char Password; /* p: change password */ |
| 85 | 84 | char Query; /* q: create new reports */ |
| 86 | 85 | char Write; /* i: xfer inbound. check-in */ |
| 87 | 86 | char Read; /* o: xfer outbound. check-out */ |
| 88 | 87 | char Hyperlink; /* h: enable the display of hyperlinks */ |
| 89 | 88 |
| --- src/main.c | |
| +++ src/main.c | |
| @@ -78,11 +78,10 @@ | |
| 78 | ** Holds flags for fossil user permissions. |
| 79 | */ |
| 80 | struct FossilUserPerms { |
| 81 | char Setup; /* s: use Setup screens on web interface */ |
| 82 | char Admin; /* a: administrative permission */ |
| 83 | char Delete; /* d: delete wiki or tickets - Not Used */ |
| 84 | char Password; /* p: change password */ |
| 85 | char Query; /* q: create new reports */ |
| 86 | char Write; /* i: xfer inbound. check-in */ |
| 87 | char Read; /* o: xfer outbound. check-out */ |
| 88 | char Hyperlink; /* h: enable the display of hyperlinks */ |
| 89 |
| --- src/main.c | |
| +++ src/main.c | |
| @@ -78,11 +78,10 @@ | |
| 78 | ** Holds flags for fossil user permissions. |
| 79 | */ |
| 80 | struct FossilUserPerms { |
| 81 | char Setup; /* s: use Setup screens on web interface */ |
| 82 | char Admin; /* a: administrative permission */ |
| 83 | char Password; /* p: change password */ |
| 84 | char Query; /* q: create new reports */ |
| 85 | char Write; /* i: xfer inbound. check-in */ |
| 86 | char Read; /* o: xfer outbound. check-out */ |
| 87 | char Hyperlink; /* h: enable the display of hyperlinks */ |
| 88 |
+4
-4
| --- www/caps/index.md | ||
| +++ www/caps/index.md | ||
| @@ -65,12 +65,12 @@ | ||
| 65 | 65 | Fossil shows how these capabilities apply hierarchically in the user |
| 66 | 66 | editing screen (Admin → Users → name) with the `[N]` `[A]` `[D]` `[R]` |
| 67 | 67 | tags next to each capability check box. If a user gets a capability from |
| 68 | 68 | one of the user categories already assigned to it, there is no value in |
| 69 | 69 | redundantly assigning that same cap to the user explicitly. For example, |
| 70 | -with the default **dei** cap set for the “developer” category, the cap | |
| 71 | -set **ve** is redundant because **v** grants **dei**, which includes | |
| 70 | +with the default **ei** cap set for the “developer” category, the cap | |
| 71 | +set **ve** is redundant because **v** grants **ei**, which includes | |
| 72 | 72 | **e**. |
| 73 | 73 | |
| 74 | 74 | We suggest that you lean heavily on these fixed user categories when |
| 75 | 75 | setting up new users. Ideally, your users will group neatly into one of |
| 76 | 76 | the predefined categories, but if not, you might be able to shoehorn |
| @@ -151,12 +151,12 @@ | ||
| 151 | 151 | are all about modifying repository content: edit existing wiki pages, |
| 152 | 152 | change one’s own password, create new ticket report formats, and modify |
| 153 | 153 | existing tickets. This category would be better named “participant”. |
| 154 | 154 | |
| 155 | 155 | Those in the “developer” category get the “nobody” and “anonymous” cap |
| 156 | -sets plus **[d][d][e][e][i][i]**: delete wiki articles and tickets, view | |
| 157 | -sensitive user material, and check in changes. | |
| 156 | +sets plus **[e][e][i][i]**: view | |
| 157 | +sensitive user material and check in changes. | |
| 158 | 158 | |
| 159 | 159 | [bot]: ../antibot.wiki |
| 160 | 160 | |
| 161 | 161 | |
| 162 | 162 | ## <a name="pvt"></a>Consequences of Taking a Repository Private |
| 163 | 163 |
| --- www/caps/index.md | |
| +++ www/caps/index.md | |
| @@ -65,12 +65,12 @@ | |
| 65 | Fossil shows how these capabilities apply hierarchically in the user |
| 66 | editing screen (Admin → Users → name) with the `[N]` `[A]` `[D]` `[R]` |
| 67 | tags next to each capability check box. If a user gets a capability from |
| 68 | one of the user categories already assigned to it, there is no value in |
| 69 | redundantly assigning that same cap to the user explicitly. For example, |
| 70 | with the default **dei** cap set for the “developer” category, the cap |
| 71 | set **ve** is redundant because **v** grants **dei**, which includes |
| 72 | **e**. |
| 73 | |
| 74 | We suggest that you lean heavily on these fixed user categories when |
| 75 | setting up new users. Ideally, your users will group neatly into one of |
| 76 | the predefined categories, but if not, you might be able to shoehorn |
| @@ -151,12 +151,12 @@ | |
| 151 | are all about modifying repository content: edit existing wiki pages, |
| 152 | change one’s own password, create new ticket report formats, and modify |
| 153 | existing tickets. This category would be better named “participant”. |
| 154 | |
| 155 | Those in the “developer” category get the “nobody” and “anonymous” cap |
| 156 | sets plus **[d][d][e][e][i][i]**: delete wiki articles and tickets, view |
| 157 | sensitive user material, and check in changes. |
| 158 | |
| 159 | [bot]: ../antibot.wiki |
| 160 | |
| 161 | |
| 162 | ## <a name="pvt"></a>Consequences of Taking a Repository Private |
| 163 |
| --- www/caps/index.md | |
| +++ www/caps/index.md | |
| @@ -65,12 +65,12 @@ | |
| 65 | Fossil shows how these capabilities apply hierarchically in the user |
| 66 | editing screen (Admin → Users → name) with the `[N]` `[A]` `[D]` `[R]` |
| 67 | tags next to each capability check box. If a user gets a capability from |
| 68 | one of the user categories already assigned to it, there is no value in |
| 69 | redundantly assigning that same cap to the user explicitly. For example, |
| 70 | with the default **ei** cap set for the “developer” category, the cap |
| 71 | set **ve** is redundant because **v** grants **ei**, which includes |
| 72 | **e**. |
| 73 | |
| 74 | We suggest that you lean heavily on these fixed user categories when |
| 75 | setting up new users. Ideally, your users will group neatly into one of |
| 76 | the predefined categories, but if not, you might be able to shoehorn |
| @@ -151,12 +151,12 @@ | |
| 151 | are all about modifying repository content: edit existing wiki pages, |
| 152 | change one’s own password, create new ticket report formats, and modify |
| 153 | existing tickets. This category would be better named “participant”. |
| 154 | |
| 155 | Those in the “developer” category get the “nobody” and “anonymous” cap |
| 156 | sets plus **[e][e][i][i]**: view |
| 157 | sensitive user material and check in changes. |
| 158 | |
| 159 | [bot]: ../antibot.wiki |
| 160 | |
| 161 | |
| 162 | ## <a name="pvt"></a>Consequences of Taking a Repository Private |
| 163 |
-8
| --- www/caps/ref.html | ||
| +++ www/caps/ref.html | ||
| @@ -71,18 +71,10 @@ | ||
| 71 | 71 | <td> |
| 72 | 72 | Append comments to existing tickets. Mnemonic: <b>c</b>omment. |
| 73 | 73 | </td> |
| 74 | 74 | </tr> |
| 75 | 75 | |
| 76 | - <tr id="d"> | |
| 77 | - <th>d</th> | |
| 78 | - <th>Delete</th> | |
| 79 | - <td> | |
| 80 | - Delete wiki articles or tickets. Mnemonic: <b>d</b>elete. | |
| 81 | - </td> | |
| 82 | - </tr> | |
| 83 | - | |
| 84 | 76 | <tr id="e"> |
| 85 | 77 | <th>e</th> |
| 86 | 78 | <th>RdAddr</th> |
| 87 | 79 | <td> |
| 88 | 80 | View <a |
| 89 | 81 |
| --- www/caps/ref.html | |
| +++ www/caps/ref.html | |
| @@ -71,18 +71,10 @@ | |
| 71 | <td> |
| 72 | Append comments to existing tickets. Mnemonic: <b>c</b>omment. |
| 73 | </td> |
| 74 | </tr> |
| 75 | |
| 76 | <tr id="d"> |
| 77 | <th>d</th> |
| 78 | <th>Delete</th> |
| 79 | <td> |
| 80 | Delete wiki articles or tickets. Mnemonic: <b>d</b>elete. |
| 81 | </td> |
| 82 | </tr> |
| 83 | |
| 84 | <tr id="e"> |
| 85 | <th>e</th> |
| 86 | <th>RdAddr</th> |
| 87 | <td> |
| 88 | View <a |
| 89 |
| --- www/caps/ref.html | |
| +++ www/caps/ref.html | |
| @@ -71,18 +71,10 @@ | |
| 71 | <td> |
| 72 | Append comments to existing tickets. Mnemonic: <b>c</b>omment. |
| 73 | </td> |
| 74 | </tr> |
| 75 | |
| 76 | <tr id="e"> |
| 77 | <th>e</th> |
| 78 | <th>RdAddr</th> |
| 79 | <td> |
| 80 | View <a |
| 81 |