| ..__text__TEXT0P1R__data__DATA0__cstring__TEXT@ __picsymbolstub2__TEXTK, .;~__la_sym_ptr2__DATAX.T0?__nl_symbol_ptr__DATA.D1*__textcoal_nt__TEXT.H1 @$A$M Px@+US$...x`u.x|t -~D$4$-=$-OD$X$h-a$A-t$-T$,EEUЍE<u\$,.xdt$UЍED$$,UЍED$$,.xdt$h,UE D$$C,UE8tcUE8tKUEEED$ ED$UED$4$+%UED$$+$+E.@ D$.@ D$$`+D$.@$+u8$1+.xht$+j$+u$**$[]ÐUVS4Eg++xdu ;+ D$$?*E}t`+xhuRED$$)EDž}t!D$sE$)t DžE}D$$)tLD$t $0*$ *ED$ED$4$)) D$$P)tt $( Dž}t>E8t6D$D$$(t}u DžU}ED$$(ED$$(|D$$v(xD$$R(tD$$.(pD$$ (lD$ $'hD$ $'dD$$'`D$$z'\Dž+xht$D$$>'t DžXD$$'TXtE}tDždDžTDžxTtDž\Džlxt Džhpt Džt}tEUЃpaE|tEUЃpdExtEUЃpiEttEUЃpjEptEUЃpkEltEUЃpnEhtEUЃpoEdtEUЃppE`tEUЃpqE\tEUЃprEXtEUЃpsETtEUЃpwEEEED$4$$EED$t$}$D$$$;D$$$P}$‹ED$T$ D$D$d$#D$$#89ƅ:8EP8tED$P$J# ED$$#D$$#ED$D$t$ T$ED$$&#ED$$#+x,t]+D$$N#t U Dž$B,Ѝt $"NE썃NE荃NE䍃NEԉE܉E؉EEEĉEЉEEȉẺEE}ED$T$"E}E8EEEEEED$aE$."t ED$dE$"t ED$iE$!t ED$jE$!t ED$kE$!t ED$nE$!t ED$oE$n!t ED$pE$N!t ED$qE$.!t ED$rE$!t ED$sE$ t ED$wE$ tEED$$!} $w!D$t $F!ED$$D$$!}tED$$ $ +@DD$$ }tED$ED$T$ $q E؉D$0ED$,ED$(EĉD$$EЉD$ ED$EȉD$ẺD$ED$ED$ ED$ED$$ +xhtE܉D$T$EԉD$$}uT $!$}tED$ED$T!$+x,t>!D$!$D$!$)u!$I+@ D$#$*+@ D$$$ }t'D$E$u+@ D$'$v)$sĐ[^]ÐUE8tE8 tE8 uEE8tEÐuserlistCvstracAdminUsersAdd UserusereditUser List SELECT id, name, email, capabilities FROM user ORDER BY id
User ID    Permissions    In Real Life
%h %s %h (%h) %h


Notes:
  1. The permission flags are as follows:

    a Admin: Create or delete users and ticket report formats
    d Delete: Erase anonymous wiki, tickets, and attachments
    i Check-in: Add new code to the %h repository
    jRead-Wiki: View wiki pages
    kWiki: Create or modify wiki pages
    nNew: Create new tickets
    o Check-out: Read code out of the %h repository
    pPassword: Change password
    qQuery: Create or edit report formats
    rRead: View tickets and change histories
    sSetup: Change CVSTrac options
    wWrite: Edit tickets

  2. If a user named "anonymous" exists, then anyone can access the server without having to log in. The permissions on the anonymous user determine the access rights for anyone who is not logged in.

  3. cvs
  4. You must be using CVS version 1.11 or later in order to give users read-only access to the repository. With earlier versions of CVS, all users with check-out privileges also automatically get check-in privileges.

  5. Changing a users ID or password modifies the CVSROOT/passwd, CVSROOT/readers, and CVSROOT/writers files in the CVS repository, if those files have write permission turned on. Users IDs in CVSROOT/passwd that are unknown to CVSTrac are preserved. Use the "Import CVS Users" button on the user setup page to import CVS users into CVSTrac.

idSELECT capabilities FROM user WHERE id='%q'deleteCancelAre You Sure?

You are about to delete the user %h from the database. This is an irreversible operation.

canpwemnmaaadaiajakanaoapaqarasawSELECT passwd FROM user WHERE id='%q'DELETE FROM user WHERE id='%q'delete2%d%.20sINSERT INTO user(id,name,email,passwd,capabilities) VALUES('%q','%q','%q','%q','%s')DELETE FROM config WHERE name='assignto' AND value='%q'SELECT name, email, capabilities FROM user WHERE id='%q' checkeduseredit?delete=1&id=%tDeleteEdit User %sAdd New User
User ID: %h
Full Name:
E-Mail:
Capabilities: Admin
Delete
Check-In
Read Wiki
Write Wiki
New Tkt
Check-Out
Password
Query
Read
Setup
Write
Password:
     

Notes:

  1. User %h has Setup privileges and you only have Admin privileges so you are not permitted to make changes to %h.

  2. yeswrite_cvs_passwd
  3. If the Check-out capability is specified then the password entered here will be used to regenerate the CVSROOT/passwd file and will thus become the CVS password as well as the password for this server.

  4. The Check-in capability means that the user ID will be written into the CVSROOT/writers file and thus allow write access to the CVS repository.

  5. If the Check-out capability is specified then the user will be able to browse the %s repository.

  6. The Check-in capability gives the user the ability to edit check-in messages.

  7. The Read and Write privileges give the user the ability to read and write tickets. The New Tkt capability means that the user is able to create new tickets.

  8. The Delete privilege give the user the ability to erase wiki, tickets, and atttachments that have been added by anonymous users. This capability is intended for deletion of spam.

  9. The Query privilege allows the user to create or edit report formats by specifying appropriate SQL. Users can run existing reports without the Query privilege.

  10. An Admin user can add other users, create new ticket report formats, and change system defaults. But only the Setup user is able to change the %h repository to which this program is linked.

  11. anonymous
  12. No login is required for user "anonymous". The capabilities of this user are available to anyone without supplying a username or password. To disable anonymous access, make sure there is no user with an ID of anonymous.

  13. The password for the "anonymous" user is used for anonymous %h access. The recommended value for the anonymous password is "anonymous".

  14. ⍀P⍀P~⍀Pje⍀PQL⍀P83⍀P⍀Pu⍀uP`⍀`PK⍀KP6⍀6P!⍀!P ⍀ Ppk⍀PWR⍀P>9⍀P% ⍀P ⍀P⍀Py⍀yPd⍀dPX,q,,,,,,- -9-R-k------..3.L.$Ë$B,*.*`'.{s`&d.\T$JB$80$&$.  $  #  #  `"  " .  4 , `$     .      z  b  @ y q Ik K YA + Y!  Y  Y  Y  Y  Y k Ya K YA + Y!  Y  Y   T K B 9 . & @  _ . .    n f V N / g{s]U_G?@/'3+.w[S7/ ~B:0&@@T.&..  v  z. tl bU. K E= .. .   @ bZ =5 '. !  .  `  }um ogd ][ WOI IA@ .!. .   .D..D.  .+..+.  ....  .-.-  .-.-  .-~.-x s m.-e.-_ Z T.-L.-F A ;.|-3.|-- ( ".c-.c-  .J-.J- |.1-|.1- x.-x.- t.,t., p.,p., l.,l.,~ y sh.,kh.,e ` Zd.,Rd.,L G A`.,9`.,3 . (\.i, \.i,  X.P,X.P, PLHD@<840,($  dd<D#D' D(D)-D*2D,7D-MD.[D/sD0D6D8D9D;D<D>D?%D@3DBADDfDEDFDIDKD8DMDmIDnjDzxD{DDDD$#$*6%]h iErstu$DDDDDD DD5DoDyDDDDDDDDD DcDmDtDDDDD%DIDmDDDD!DEDUDyDDDDDDD-DJDgDDDDDDDD6DKDiDDDDDD D D D D D$ D2 D7 D@ DI DR D | D  D  D D D D D D D2 DR Dr D D D D D D2 DT D$[ D%o D&} D' D( D) D+ D- D1 D2 D4* D68 DL DM DO DV DW D^ Da Db DhDjRDxbDDDDDDv$",6@JXijyzo{ |#x,t5p>lGhPdY`b\kXtT}m~P8i  7 $< DDDD-$$8d0?. ./$ %=Sspwi~W_user_list___i686.get_pc_thunk.bx_user_edit_remove_newline___i686.get_pc_thunk.axdyld_stub_binding_helper_g_db_config_mprintf_crypt_bprintf_getpid_db_execute_cgi_all_cgi_redirect_strchr_db_short_query_cgi_parameter_common_footer_strcmp_db_query_cgi_printf_common_header_common_add_action_item_common_add_help_item_common_standard_menu_login_needed_login_check_credentials/mnt/gmirror/ports/devel/cvstrac/work/cvstrac-2.0.0/user_.cgcc2_compiled.user_list:F(0,1)=(0,1)void:t(0,1)azResult:(0,2)=*(0,3)=*(0,4)=r(0,4);0;127;char:t(0,4)i:(0,5)=r(0,5);-2147483648;2147483647;int:t(0,5)zE:(0,3)user_edit:F(0,1)azResult:(0,2)zId:(0,6)=*(0,7)=k(0,4)zName:(0,6)zEMail:(0,6)zCap:(0,6)oaa:(0,3)oas:(0,3)oar:(0,3)oaw:(0,3)oan:(0,3)oai:(0,3)oaj:(0,3)oao:(0,3)oap:(0,3)oak:(0,3)oad:(0,3)oaq:(0,3)doWrite:(0,5)higherUser:(0,5)zOldCaps:(0,3)zOldPw:(0,6)zCap:(0,8)=ar(0,9)=r(0,9);0000000000000;0037777777777;;0;19;(0,4)long unsigned int:t(0,10)=r(0,10);0000000000000;0037777777777;i:(0,5)aa:(0,5)ad:(0,5)ai:(0,5)aj:(0,5)ak:(0,5)an:(0,5)ao:(0,5)ap:(0,5)aq:(0,5)ar:(0,5)as:(0,5)aw:(0,5)zPw:(0,6)zBuf:(0,11)=ar(0,9);0;2;(0,4)zSeed:(0,12)=ar(0,9);0;99;(0,4)z:(0,6)remove_newline:F(0,1)z:p(0,3)