<div dir="ltr"><div><div><div><div>Note that Koji doesn't actually limit building, it limits tagging. So you can run scratch builds and skip-tag builds against any tag, regardless of permissions. You just can't tag those builds when they are done.<br><br></div><div>The 'build' permission in Koji is actually unused currently.<br></div><div><br></div>Tagging is limited on two levels in Koji. The basic level is the permission requirement that can be set for each tag. When this is set, only users with the required permission can tag or untag there.<br><br></div>The next level is to adjust the tag policy on the hub (in hub.conf). This gives you more flexibility, and allows for more complex logic, but updating the hub config is a little more complicated than just running some edit-tag commands. You can read more about Koji policies here:<br><a href="https://fedoraproject.org/wiki/Koji/Policies">https://fedoraproject.org/wiki/Koji/Policies</a><br></div>(unfortunately not a complete doc, but better than nothing)<br><br></div>I think syncing FAS groups data to CBS permissions sounds reasonable. Using permissions means you can just use the tag permission settings and not have to worry about hub policy.<br><div><br><div><br></div></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Aug 6, 2015 at 4:04 AM, Thomas Oulevey <span dir="ltr"><<a href="mailto:thomas.oulevey@cern.ch" target="_blank">thomas.oulevey@cern.ch</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class=""><br>
<br>
On 08/06/2015 08:47 AM, Sandro Bonazzola wrote:<br>
</span><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">
<br>
<br>
On Wed, Aug 5, 2015 at 10:01 PM, Brian Stinson <<a href="mailto:brian@bstinson.com" target="_blank">brian@bstinson.com</a><br></span><div><div class="h5">
<mailto:<a href="mailto:brian@bstinson.com" target="_blank">brian@bstinson.com</a>>> wrote:<br>
<br>
Hi All,<br>
<br>
We're working on testing instances of FAS for storing our user/group<br>
membership information used by the CBS. I'd like to talk about group<br>
naming and the permissions model to get some input. The goal is to get<br>
these discussions going so we can set up our test environment to mirror<br>
what we'll roll out in production. Consider this a proposal, and please<br>
send comments my way (on-list please!).<br>
<br>
Groups will use the convention 'sig-<shortname>', for example: people in<br>
the Cloud SIG will be members of the FAS group 'sig-cloud'. This<br>
convention will allow push access in dist-git to any branch that starts<br>
with sig-cloud (sig-cloud7, sig-cloud7-openstack,<br>
sig-cloud7-openstack-juno) and grant build permissions under the SIG<br>
tags<br>
in Koji[0].<br>
<br>
FAS has 3 types of membership in a group: Admin, Sponsor, and User.<br>
All 3<br>
levels will be granted commit/build permissions, while only Admins and<br>
Sponsors can modify members of the group.<br>
<br>
To match our permissions model[1], I propose:<br>
- We populate the 'Accounts' (Global Admin) group with the members<br>
of the<br>
CentOS Board.<br>
- The Board member responsible for each SIG will create the appropriate<br>
SIG group in FAS<br>
- The Board member will add him/herself as an admin of the group<br>
- The Board member will sponsor the SIG Chair as a sponsor for the group<br>
- From then on, the SIG Chair and Board member can sponsor others<br>
into the<br>
group as users (and optionally add more sponsors to the group)<br>
<br>
Anyone have thoughts? Once we reach consensus, I'll get this written up<br>
for the SIG wiki page.<br>
<br>
<br>
+1 on my side<br>
<br>
</div></div></blockquote>
<br>
+1 It looks good ; As a side note for koji we will need to have a permission that match the SIG ; the default permission for building is "build".<br>
<br>
What we proposed is to have build-<signame> (build-cloud, build-nfv, build-virt ...) so we can match groups between FAS and Koji.<br>
<br>
Now I don't think we want finer grained permission to project level e.g : build-<signame>-<project> (build-cloud-openstack) as everybody in a SIG should be trusted to do the right thing, however if there is some use case let us know.<br>
<br>
This will be transparent to users, and add an extra security bit (no cross SIG errors) but we will need to sync FAS groups with Koji users/permissions.<span class="HOEnZb"><font color="#888888"><br>
<br>
-- <br>
Thomas Oulevey</font></span><div class="HOEnZb"><div class="h5"><br>
_______________________________________________<br>
CentOS-devel mailing list<br>
<a href="mailto:CentOS-devel@centos.org" target="_blank">CentOS-devel@centos.org</a><br>
<a href="http://lists.centos.org/mailman/listinfo/centos-devel" rel="noreferrer" target="_blank">http://lists.centos.org/mailman/listinfo/centos-devel</a><br>
</div></div></blockquote></div><br></div>