# HG changeset patch # User Paul Crowley # Date 1255603806 -3600 # Node ID aa57f48c758580c009a8cb967ffa5bcc8057e893 # Parent f4688940fe15e288d849cba50cc67b7948388888 replace generalities with specific examples diff -r f4688940fe15 -r aa57f48c7585 doc/manual.docbook --- a/doc/manual.docbook Thu Oct 15 11:23:38 2009 +0100 +++ b/doc/manual.docbook Thu Oct 15 11:50:06 2009 +0100 @@ -222,39 +222,42 @@ that no other users can access the hgadmin repository, and that those with keys in keys/users can read or write to any repository -but not create repositories. If these are the only rules in effect, they -have the following consequences: +but not create repositories. Some examples of how these rules work: -Any request from a user with a key under keys/root will match the first rule; since -this rule is init the request will always be allowed. +User root/jay creates a repository +foo/bar/baz. This matches the first +rule and so will be allowed. -Any request to access the hgadmin by any other user will -not match the first rule, but will match the second rule, and so will be -denied. +User root/jay changes repository +hgadmin. Again, this matches the +first rule and so will be allowed; later rules have no effect. + + +User users/sam tries to read +repository hgadmin. This does not +match the first rule, but matches the second, and so will be denied. -Any request to create a repository from a user with a key in keys/users will not match the first or second -rules, but will match the third rule. This is a write -rule, which doesn't grant the privilege to create repositories, so the -request will be denied. +User users/sam tries to create +repository sams-project. This does +not match the first two rules, but matches the third; this is a +write rule, which doesn't grant the privilege to create +repositories, so the request will be denied. -Any request to access an existing repository from a user with a key in -keys/users will not match the first -or second rules, but will match the third rule, which grants -write privilege, so the request will be allowed. +User users/sam writes to existing +repository projects/main. Again, +this matches the third rule, which allows the request. -Any request from any user whose key is in neither keys/root nor keys/users will not match any rule and so will -be denied. Unless it matches the second rule, in which case it will still -be denied. Changes to the access.conf in hgadmin will change that, as the example at the start of this section shows. +User pat tries to write to existing +repository widget. Until we change +the access.conf file in hgadmin, this will match no rule, and so will +be denied. Any request from a user whose key not under the