Phabricator/Permissions/zh

phabricator.wikimedia.org上的角色和权限.



匿名用户
匿名用户可以在唯讀模式下查看所有公开信息.



注册用户
注册用户可以执行所有常见操作：创建和编辑任务、评论、上传原型或文件、编辑他们自己的个人简介...

任何维基媒体SUL用户和维基媒体LDAP用户都可以注册.

ACL groups
Phabricator contain some ACL projects which is used to enforce policy restrictions. The following is a partial list of ACL projects; the description is usually only part of permissions of the groups.

ACL projects are for access control only; they are not meant to be used for task management. Tasks should be added to a corresponding team project (which is public).

Other than those indicated specifically, membership application are handled by tasks in the Phabricator project.


 * Trusted-Contributors
 * A minimal policy control group for access to certain features in Phabricator which might be prone to abuse, including "protect as security issue" feature and personal Herald rules.


 * acl*Batch-Editors
 * Have permission of batch edits.


 * acl*Project-Admins
 * 參見T706以獲得權限要求的訊息. Note public projects may be edited by all Trusted-Contributors.


 * acl*repository-admins
 * Create and edit Diffusion Repositories.


 * Policy-Admins and subprojects; acl*sre-team, acl*stewards, acl*otrs-admins, etc.
 * Various "policy admins" projects are used to manage access policies of Phabricator objects (for example, tasks and other projects). They are also used in space policies. Other than dedicated "policy admins" projects, ACL projects may also be created for otherwise defined restricted user groups or WMF teams.


 * acl*phabricator
 * Manages homepage dashboard and global Herald rules.


 * WMF-NDA
 * Access to tasks restricted to some of WMF employee, and volunteers who signed Trusted Volunteer Access & Confidentiality Agreement (see that page for process to sign).


 * acl*security
 * Access to Security issues. Members must be approved by and have 2FA enabled. 參見访问安全问题以了解群組成員，除非有不同的指定.  Per T244165, members consist of the following subgroups (Wikimedia Security Team may define additional subgroups):
 * acl*security_bugwrangler
 * For current bugwrangler(s).
 * acl*security_developer, acl*security_documentation, acl*security_legal, acl*security_management, acl*security_product_manager, acl*security_program_manager, acl*security_releng, acl*security_secteam, acl*security_sre, acl*security_trusa
 * Some groups of WMF employees, who have access to security issues for work purposes. NDA is signed as part of Terms of Employment.
 * acl*security_wmde
 * WMDE employees who have access to security issues for work purposes.
 * acl*security_steward
 * (Some of) current stewards who have access to security issues. (This ACL is separate from acl*stewards, which includes all stewards with a Phabricator account and does not give access to security issues.)
 * acl*security_volunteer
 * Other volunteer with access to security issues.

管理员
管理员可以做很多事，并破坏它们，虽然从设计上讲他们在Phabricator中不是万能的. 他们可以访问受保护数据（除了您的密码）、并且他们可以在意外情況下向他人提供其访问权. 然而，管理员不能绕过对象存取方針.

由于这些原因，管理员组的成员非常有限. 没有人可以在不签署NDA的情况下成为Phabricator的管理员. 加入/离开此团队的过程必须被定义（目前，請在tag/phabricator/下提交任務並解釋你的原因）. 另请参见（已过时）Bugzilla管理员权限方针.

Some tasks (e.g. removing Two Factor Authentication) may not be done by ordinary Phabricator administrators; They may only be performed by people with shell access to Phabricator servers.



Phabricator培训
参见帮助页面以了解更多有关使用Phabricator的信息.