Commit 580ded91 authored by Mike Lewis's avatar Mike Lewis Committed by Achilleas Pipinellis

Clarify in permissions doc: owner is at group level not project

parent 3842672d
...@@ -37,11 +37,12 @@ usernames. A GitLab administrator can configure the GitLab instance to ...@@ -37,11 +37,12 @@ usernames. A GitLab administrator can configure the GitLab instance to
NOTE: **Note:** NOTE: **Note:**
In GitLab 11.0, the Master role was renamed to Maintainer. In GitLab 11.0, the Master role was renamed to Maintainer.
While Maintainer is the highest project-level role, some actions can only be performed by a personal namespace or group owner. While Maintainer is the highest project-level role, some actions can only be performed by a personal namespace or group owner,
or an instance admin, who receives all permissions.
The following table depicts the various user permission levels in a project. The following table depicts the various user permission levels in a project.
| Action | Guest | Reporter | Developer |Maintainer| Owner | | Action | Guest | Reporter | Developer |Maintainer| Owner* |
|---------------------------------------------------|---------|------------|-------------|----------|--------| |---------------------------------------------------|---------|------------|-------------|----------|--------|
| Download project | ✓ (*1*) | ✓ | ✓ | ✓ | ✓ | | Download project | ✓ (*1*) | ✓ | ✓ | ✓ | ✓ |
| Leave comments | ✓ (*1*) | ✓ | ✓ | ✓ | ✓ | | Leave comments | ✓ (*1*) | ✓ | ✓ | ✓ | ✓ |
...@@ -138,10 +139,11 @@ The following table depicts the various user permission levels in a project. ...@@ -138,10 +139,11 @@ The following table depicts the various user permission levels in a project.
| Force push to protected branches (*4*) | | | | | | | Force push to protected branches (*4*) | | | | | |
| Remove protected branches (*4*) | | | | | | | Remove protected branches (*4*) | | | | | |
- (*1*): Guest users are able to perform this action on public and internal projects, but not private projects. \* Owner permission is only available at the group or personal namespace level (and for instance admins) and is inherited by its projects.
- (*2*): Guest users can only view the confidential issues they created themselves (*1*): Guest users are able to perform this action on public and internal projects, but not private projects.
- (*3*): If **Public pipelines** is enabled in **Project Settings > CI/CD** (*2*): Guest users can only view the confidential issues they created themselves.
- (*4*): Not allowed for Guest, Reporter, Developer, Maintainer, or Owner. See [Protected Branches](./project/protected_branches.md). (*3*): If **Public pipelines** is enabled in **Project Settings > CI/CD**.
(*4*): Not allowed for Guest, Reporter, Developer, Maintainer, or Owner. See [Protected Branches](./project/protected_branches.md).
## Project features permissions ## Project features permissions
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment