Page MenuHomePhabricator
Feed Advanced Search

Apr 18 2018

amckinley lowered the priority of T13128: Phriction document header doesn't render policy strength variations from Normal to Low.
Apr 18 2018, 9:41 PM · Policy, PHUI, Phriction

Mar 14 2018

epriestley closed T10103: Proxied object policies are not evaluated in the proper context as Resolved.

This was resolved by the introduction of PhabricatorExtendedPolicyInterface. Older cases with missing policy proxies occasionally crop up, but I believe most of them are resolved at HEAD of master. These errors always fail closed (deny access which should be acceptable), never fail open (allow impermissible access) so there's no urgency to hunting them down.

Mar 14 2018, 5:04 PM · Policy

Mar 13 2018

epriestley closed T13104: Policy "Subscribers" does not consider members of subprojects as Resolved by committing rP598d0c04e716: When computing the "Subscribers" policy, use materialized membership.
Mar 13 2018, 3:30 PM · Projects, Policy
epriestley added a revision to T13104: Policy "Subscribers" does not consider members of subprojects: D19213: When computing the "Subscribers" policy, use materialized membership.
Mar 13 2018, 3:27 PM · Projects, Policy
epriestley claimed T13104: Policy "Subscribers" does not consider members of subprojects.

Thanks, I wasn't able to puzzle out the reproduction instructions on the original report since they didn't mention actually making any policy changes.

Mar 13 2018, 3:22 PM · Projects, Policy
avivey created T13104: Policy "Subscribers" does not consider members of subprojects.
Mar 13 2018, 6:34 AM · Projects, Policy

Jan 26 2018

epriestley moved T6207: Add a "Can Use Herald Rules" application permission from Next to Far Future on the Herald board.
Jan 26 2018, 5:52 PM · Restricted Project, Policy, Herald

Dec 13 2017

epriestley added a parent task for T13029: Provide some way for administrators to remove/reset a user's profile image: T10215: Provide tools to combat and recover from abuse.
Dec 13 2017, 1:13 PM · Abuse, People

Dec 9 2017

avivey added a comment to T13029: Provide some way for administrators to remove/reset a user's profile image.

You need to clear some caches too - ./bin/cache purge - but I'm not sure which; And then hard-refresh the in the browser.

Dec 9 2017, 11:36 PM · Abuse, People
aklapper added a project to T13029: Provide some way for administrators to remove/reset a user's profile image: Feature Request.
Dec 9 2017, 8:02 PM · Abuse, People
aklapper created T13029: Provide some way for administrators to remove/reset a user's profile image.
Dec 9 2017, 8:01 PM · Abuse, People

Nov 28 2017

epriestley closed T8918: Header shows number of notifications and various other controls on the 2FA auth screen, a subtask of T8442: Build Space switching UI, as Resolved.
Nov 28 2017, 6:05 PM · Restricted Project, Spaces, Wikimedia, Policy

Nov 25 2017

Twilight added a comment to T603: Support permissions/policies in all Phabricator applications.

Not all applications have full policy support yet, usually because it's blocked by something or they're beta.

Nov 25 2017, 5:27 AM · Wikimedia, Policy

Nov 23 2017

sshannin added a comment to T7703: Policy checks may execute incompletely for non-viewers.

I'm unable to close this, but I believe this to be resolved (or at least my specific repro of flags via herald no longer applies I believe).

Nov 23 2017, 3:37 AM · Policy, Herald, Flags

Aug 25 2017

chad added a comment to Blog Post: Projects in Policy Controls: No Longer Total Garbage.

hi

Aug 25 2017, 1:48 AM · Policy, Projects

Aug 22 2017

chad added a comment to T12871: Setting a restricted dashboard as the topmost item in the global menu can lock some users out.

Somewhat related, if you have a disabled "Home" as your top item, we still show that regardless of the active dashboard below it.

Aug 22 2017, 10:23 PM · Policy, Dashboards, Bug Report

Aug 10 2017

epriestley added a comment to T12871: Setting a restricted dashboard as the topmost item in the global menu can lock some users out.

T12956 has another situation where letting MenuItem generate 2+ items may be bad: we want to let a menu item steal the selection, but it's muddy to implement if each MenuItem can return several actual views.

Aug 10 2017, 1:38 PM · Policy, Dashboards, Bug Report

Aug 5 2017

chad updated the task description for T4411: Adding a CC to a Maniphest Task should give View rights for that user.
Aug 5 2017, 9:16 PM · Wikimedia, Policy

Jul 27 2017

epriestley merged T12308: Access forbidden on homepage if the first dashboard in menu is not visible to user into T12871: Setting a restricted dashboard as the topmost item in the global menu can lock some users out.
Jul 27 2017, 4:25 PM · Policy, Dashboards, Bug Report

Jul 25 2017

joshuaspence added a comment to T6524: Support "request is from IP / subnet" policy rule.

@hach-que, did you end up implementing a solution for this?

Jul 25 2017, 12:58 PM · Policy

Jul 9 2017

chad removed the image for Policy.
Jul 9 2017, 6:50 PM

Jul 6 2017

epriestley closed T12900: Phame blog draft posts are visible to users who can edit the blog, but the UI states that they are visible to only authors as Resolved.

That use case doesn't strike me as compelling enough to justify a separate field or a behavioral change so I don't plan to adjust our behavior here.

Jul 6 2017, 3:15 PM · Phame, Policy, Bug Report
stevex added a comment to T12900: Phame blog draft posts are visible to users who can edit the blog, but the UI states that they are visible to only authors.

Only you and users who have permission to edit <Blog Name> can see this draft until it is published. Use "Publish" to publish this post.

...would that resolve things in your case? Or does the rule we actually implement not work as well as "only the author" in your use case?

Jul 6 2017, 3:12 PM · Phame, Policy, Bug Report

Jul 5 2017

epriestley added a comment to T12900: Phame blog draft posts are visible to users who can edit the blog, but the UI states that they are visible to only authors.

You must be able to view a post's blog to view the post, so the rule is effectively "view and edit".

Jul 5 2017, 10:09 PM · Phame, Policy, Bug Report
avivey added a comment to T12900: Phame blog draft posts are visible to users who can edit the blog, but the UI states that they are visible to only authors.

Don't most places consider "Can Edit" to be weaker than "Can View"?

Jul 5 2017, 10:04 PM · Phame, Policy, Bug Report
epriestley added a project to T12900: Phame blog draft posts are visible to users who can edit the blog, but the UI states that they are visible to only authors: Phame.
Jul 5 2017, 4:59 PM · Phame, Policy, Bug Report
epriestley renamed T12900: Phame blog draft posts are visible to users who can edit the blog, but the UI states that they are visible to only authors from Phame blog draft posts are visible to all to Phame blog draft posts are visible to users who can edit the blog, but the UI states that they are visible to only authors.
Jul 5 2017, 4:59 PM · Phame, Policy, Bug Report

Jun 26 2017

epriestley lowered the priority of T12871: Setting a restricted dashboard as the topmost item in the global menu can lock some users out from Normal to Low.

For private reasons affecting the reporting install, this no longer has customer impact.

Jun 26 2017, 2:02 PM · Policy, Dashboards, Bug Report

Jun 23 2017

epriestley triaged T12871: Setting a restricted dashboard as the topmost item in the global menu can lock some users out as Normal priority.
Jun 23 2017, 7:16 PM · Policy, Dashboards, Bug Report

May 12 2017

stephane.chazelas added a comment to T11173: User unable to create repository if not in the "Default Edit Policy" of Diffusion Application.

Isn't that a dup of T8611?

May 12 2017, 1:43 PM · Diffusion (v3), Restricted Project, Policy, Bug Report

Apr 29 2017

epriestley created T12654: Conpherence allows you to create a room you can't view.
Apr 29 2017, 6:13 PM · Policy, Conpherence (v4)

Apr 12 2017

epriestley removed a project from T4411: Adding a CC to a Maniphest Task should give View rights for that user: Support Impact.
Apr 12 2017, 2:49 PM · Wikimedia, Policy

Mar 26 2017

epriestley reopened T8918: Header shows number of notifications and various other controls on the 2FA auth screen, a subtask of T8442: Build Space switching UI, as Open.
Mar 26 2017, 8:15 PM · Restricted Project, Spaces, Wikimedia, Policy

Mar 14 2017

20after4 added a comment to T12375: Integrate Conduit API for Policy Object Creation.

@stettberger: If there is anything missing from the WMF policy API extension, please feel free to file tasks under https://phabricator.wikimedia.org/tag/wikimedia_phabricator_extensions/ or open a differential revision against https://phabricator.wikimedia.org/source/phab-extensions/. I will be glad to review patches, I can't make any promises about feature requests but reasonable changes will be considered.

Mar 14 2017, 3:28 PM · Policy, Feature Request

Mar 13 2017

stettberger added a comment to T12375: Integrate Conduit API for Policy Object Creation.

Then, I will use the WMF extension for now. I understand that you won't prioritize this. Just for future reference, I will document the structure we have come up with : I currently employ already a more hierarchical project/subproject structure that can be use over several semesters and makes it possible for me to reference all students at once:

Mar 13 2017, 8:58 PM · Policy, Feature Request
epriestley added a comment to T12375: Integrate Conduit API for Policy Object Creation.

Some workarounds in the short term:

Mar 13 2017, 5:38 PM · Policy, Feature Request

Mar 11 2017

chad added a project to T12375: Integrate Conduit API for Policy Object Creation: Policy.
Mar 11 2017, 8:19 PM · Policy, Feature Request

Mar 3 2017

epriestley closed T11207: User can change properties on the task, even when not having edit policy rights as Resolved by committing rP0a0ac1302f02: Prevent users from taking "edit"-like actions via comment forms if they don't….
Mar 3 2017, 12:57 AM · Restricted Project, Policy, Bug Report

Mar 2 2017

epriestley added a comment to T11207: User can change properties on the task, even when not having edit policy rights.

D17452 marks this as resolved and makes these changes:

Mar 2 2017, 8:38 PM · Restricted Project, Policy, Bug Report
epriestley added a revision to T11207: User can change properties on the task, even when not having edit policy rights: D17452: Prevent users from taking "edit"-like actions via comment forms if they don't have edit permission.
Mar 2 2017, 8:33 PM · Restricted Project, Policy, Bug Report

Feb 13 2017

ofbeaton added a comment to T4411: Adding a CC to a Maniphest Task should give View rights for that user.

We would also like this behaviour, and currently use a workaround to accomplish it (which is why we never came here looking for a fix). We created a custom Create Task form that sets the default view policy to include subscribers.

Feb 13 2017, 3:50 PM · Wikimedia, Policy

Feb 2 2017

epriestley moved T11173: User unable to create repository if not in the "Default Edit Policy" of Diffusion Application from Backlog to Probably Actual Bugs on the Diffusion (v3) board.
Feb 2 2017, 3:53 PM · Diffusion (v3), Restricted Project, Policy, Bug Report

Jan 18 2017

epriestley moved T11173: User unable to create repository if not in the "Default Edit Policy" of Diffusion Application from Backlog to v3 on the Diffusion board.
Jan 18 2017, 7:01 PM · Diffusion (v3), Restricted Project, Policy, Bug Report

Jan 8 2017

epriestley added a revision to T9058: PhabricatorPolicyFilter::hasCapability() does not apply application-level "Can Use Application" policy checks: D17152: Fix excessively strict "Can Use Application" policy filtering.
Jan 8 2017, 6:58 PM · Policy, Differential, Daemons
sshannin added a comment to T11992: daemon hits policy exception repeatedly.

Voila.

Jan 8 2017, 6:12 PM · Daemons, Policy, Bug Report
epriestley added a comment to T11992: daemon hits policy exception repeatedly.

You can also safely cherry-pick that to test if it resolves things, it doesn't interact with anything else.

Jan 8 2017, 5:58 PM · Daemons, Policy, Bug Report
epriestley added a comment to T11992: daemon hits policy exception repeatedly.

That is: rP65c1c758ed261f65c8164d200ce01373ae5b822c

Jan 8 2017, 5:58 PM · Daemons, Policy, Bug Report
epriestley added a comment to T11992: daemon hits policy exception repeatedly.

If you upgrade past 65c1c758ed261f65c8164d200ce01373ae5b822c (both stable and master have this change), does it reproduce?

Jan 8 2017, 5:57 PM · Daemons, Policy, Bug Report
sshannin added a comment to T11992: daemon hits policy exception repeatedly.

(And again, to emphasize, I'm happy to drop this if y'all aren't interested. I have my solution and am happy ignoring this, but just thought it might be something you guys would want to check out.)

Jan 8 2017, 5:57 PM · Daemons, Policy, Bug Report
sshannin added a comment to T11992: daemon hits policy exception repeatedly.

Head as of my Dec. 17 post in this thread. Can roll forward, but was hoping to wait till the edit engine migration settled a bit.

Jan 8 2017, 5:55 PM · Daemons, Policy, Bug Report
epriestley added a comment to T11992: daemon hits policy exception repeatedly.

What version of Phabricator are you currently running?

Jan 8 2017, 5:51 PM · Daemons, Policy, Bug Report
sshannin updated subscribers of T11992: daemon hits policy exception repeatedly.

@epriestley any suggestions?

Jan 8 2017, 5:49 PM · Daemons, Policy, Bug Report

Jan 7 2017

sshannin added a comment to T11992: daemon hits policy exception repeatedly.

I did some further digging and made a little progress

Jan 7 2017, 6:06 PM · Daemons, Policy, Bug Report

Jan 6 2017

epriestley closed T11945: Unable to edit calendar events created by someone else, even after `bin/policy unlock` as Resolved.

I wasn't able to reproduce this earlier so I'm not sure how to move forward, but feel free to follow up if you have more information.

Jan 6 2017, 9:25 PM · Bug Report (Needs Information), Policy, Calendar

Jan 2 2017

epriestley closed T9058: PhabricatorPolicyFilter::hasCapability() does not apply application-level "Can Use Application" policy checks as Resolved by committing rPcf1ccc995e19: Apply application visibility checks during normal object filtering.
Jan 2 2017, 6:00 PM · Policy, Differential, Daemons

Jan 1 2017

epriestley added a revision to T9058: PhabricatorPolicyFilter::hasCapability() does not apply application-level "Can Use Application" policy checks: D17127: Apply application visibility checks during normal object filtering.
Jan 1 2017, 7:10 PM · Policy, Differential, Daemons
epriestley closed T9648: Diffs do not use extended policies, so object policies evaluate in the wrong context as Resolved by committing rP65c1c758ed26: Use extended policies in Differential diffs.
Jan 1 2017, 5:56 PM · Policy, Differential
epriestley moved T9058: PhabricatorPolicyFilter::hasCapability() does not apply application-level "Can Use Application" policy checks from Backlog to v3 (Infrastructure) on the Differential board.
Jan 1 2017, 5:49 PM · Policy, Differential, Daemons
epriestley renamed T9058: PhabricatorPolicyFilter::hasCapability() does not apply application-level "Can Use Application" policy checks from PhabricatorApplicationTransactionPublishWorker failures to PhabricatorPolicyFilter::hasCapability() does not apply application-level "Can Use Application" policy checks.
Jan 1 2017, 5:48 PM · Policy, Differential, Daemons
epriestley added a revision to T9648: Diffs do not use extended policies, so object policies evaluate in the wrong context: D17123: Use extended policies in Differential diffs.
Jan 1 2017, 4:42 PM · Policy, Differential
epriestley renamed T9648: Diffs do not use extended policies, so object policies evaluate in the wrong context from This revision has no diffs. Something has gone quite wrong. to Diffs do not use extended policies, so object policies evaluate in the wrong context.
Jan 1 2017, 4:38 PM · Policy, Differential

Dec 18 2016

avivey added a comment to T11992: daemon hits policy exception repeatedly.

I've been playing with it for maybe half an hour, and couldn't reproduce:

  • Made revision public
  • stopped the daemons
  • mention a user
  • updated the revision to a new diff
  • made the revision not-visible to that user (visible only to the acting user)
  • start daemons and let them finish the queue
Dec 18 2016, 12:44 AM · Daemons, Policy, Bug Report

Dec 17 2016

sshannin added a comment to T11992: daemon hits policy exception repeatedly.

Thanks for the advice. That yields the trace below. My understanding is that it was a diff with policy set to subscribers which had an author plus a single subscriber. That subscriber was added by herald upon the diff's creation, so there's certainly grounds for something going on there. I had trouble divining the exact issue, but tinkering with the permissions for the object ended up letting the emails go through.

Dec 17 2016, 9:48 PM · Daemons, Policy, Bug Report
avivey added a comment to T11992: daemon hits policy exception repeatedly.

We used to have a tool to show a task's data, but it must have gotten lost in some refactoring.

Dec 17 2016, 8:13 PM · Daemons, Policy, Bug Report
avivey added a comment to T11992: daemon hits policy exception repeatedly.
  • In Daemons, find the task ID in the leftmost column of "Leased Tasks".
  • Run bin/worker execute --id <id> --trace to execute the task in the foreground.

That will give you a more detailed error information which you can paste here.

Dec 17 2016, 8:04 PM · Daemons, Policy, Bug Report
sshannin added a comment to T11992: daemon hits policy exception repeatedly.

Just updated to head and am seeing the same issues.

Dec 17 2016, 6:19 PM · Daemons, Policy, Bug Report

Dec 13 2016

epriestley renamed T6188: User should receive a nicer exception when selecting an invalid application policy like "Can Use Application: No One" from "Can Use Application" policy value "No One" useless? to User should receive a nicer exception when selecting an invalid application policy like "Can Use Application: No One".
Dec 13 2016, 11:40 AM · Policy

Dec 12 2016

epriestley closed T4850: Defining policies for "Project Members" as Resolved.

At least in this use case, I believe things turned out alright without this policy.

Dec 12 2016, 10:34 PM · Restricted Project, Policy

Dec 11 2016

chad added a comment to T11992: daemon hits policy exception repeatedly.

(Feel free to follow up with reproduction steps once you've sorted everything out)

Dec 11 2016, 12:09 AM · Daemons, Policy, Bug Report
chad closed T11992: daemon hits policy exception repeatedly as Invalid.

You have to be up to date and you must provide reproduction information in order to file a bug report. Please use Ponder otherwise. Thanks!

Dec 11 2016, 12:02 AM · Daemons, Policy, Bug Report

Dec 10 2016

sshannin updated the task description for T11992: daemon hits policy exception repeatedly.
Dec 10 2016, 11:31 PM · Daemons, Policy, Bug Report
sshannin created T11992: daemon hits policy exception repeatedly.
Dec 10 2016, 11:28 PM · Daemons, Policy, Bug Report

Dec 5 2016

epriestley added a project to T11945: Unable to edit calendar events created by someone else, even after `bin/policy unlock` : Bug Report (Needs Information).
Dec 5 2016, 5:10 PM · Bug Report (Needs Information), Policy, Calendar
epriestley added a comment to T11945: Unable to edit calendar events created by someone else, even after `bin/policy unlock` .

Hmm, I'm having trouble reproducing this. Here's what I did:

Dec 5 2016, 5:09 PM · Bug Report (Needs Information), Policy, Calendar

Dec 4 2016

20after4 created T11945: Unable to edit calendar events created by someone else, even after `bin/policy unlock` .
Dec 4 2016, 9:40 AM · Bug Report (Needs Information), Policy, Calendar

Nov 24 2016

3h.william updated the task description for T603: Support permissions/policies in all Phabricator applications.
Nov 24 2016, 7:01 AM · Wikimedia, Policy

Nov 11 2016

epriestley closed T11853: Caching inside the policy filter may cause policy filtering to occur on a partial representation of a project as Resolved by committing rP40d3bcb8910b: Fix a complicated object caching issue with the policy filter.
Nov 11 2016, 9:42 PM · Policy, Bug Report
epriestley added a revision to T11853: Caching inside the policy filter may cause policy filtering to occur on a partial representation of a project: D16841: Fix some policy CSS.
Nov 11 2016, 9:31 PM · Policy, Bug Report
epriestley added a revision to T11853: Caching inside the policy filter may cause policy filtering to occur on a partial representation of a project: D16840: Fix a complicated object caching issue with the policy filter.
Nov 11 2016, 9:28 PM · Policy, Bug Report
epriestley claimed T11853: Caching inside the policy filter may cause policy filtering to occur on a partial representation of a project.
Nov 11 2016, 9:15 PM · Policy, Bug Report
epriestley renamed T11853: Caching inside the policy filter may cause policy filtering to occur on a partial representation of a project from Cannot view or unlock a subproject to Caching inside the policy filter may cause policy filtering to occur on a partial representation of a project.
Nov 11 2016, 9:15 PM · Policy, Bug Report

Oct 2 2016

20after4 added a comment to T10003: Upgrading: Maniphest field-level policies ("Can Prioritize Tasks", etc.) have been deprecated and will be removed.

@vanmeeuwen couldn't you use custom forms to lock/hide the policy controls on the maniphest task submission / edit forms? That's how we handled it at Wikimedia's Phabricator. As mentioned above, Custom Forms is the general way forward for controlling default task policies.

Oct 2 2016, 12:41 AM · Policy, Maniphest, Installing & Upgrading

Sep 15 2016

eadler added a project to T11173: User unable to create repository if not in the "Default Edit Policy" of Diffusion Application: Restricted Project.
Sep 15 2016, 6:08 PM · Diffusion (v3), Restricted Project, Policy, Bug Report
eadler added a project to T11207: User can change properties on the task, even when not having edit policy rights: Restricted Project.
Sep 15 2016, 6:08 PM · Restricted Project, Policy, Bug Report

Aug 27 2016

vanmeeuwen added a comment to T10003: Upgrading: Maniphest field-level policies ("Can Prioritize Tasks", etc.) have been deprecated and will be removed.
NOTE: We do not use Maniphest field-level policies any longer, but since the topic had been silent, I figured I'd share.
Aug 27 2016, 9:12 AM · Policy, Maniphest, Installing & Upgrading

Aug 24 2016

epriestley added a comment to T6524: Support "request is from IP / subnet" policy rule.

T6706 was the IP-address specific task.

Aug 24 2016, 11:11 PM · Policy
epriestley closed T6524: Support "request is from IP / subnet" policy rule as Wontfix.

We haven't seen other requests for this in nearly two years, and it can likely be implemented as an extension, except possibly for the weird cases mentioned above.

Aug 24 2016, 11:07 PM · Policy

Aug 14 2016

epriestley closed T11428: Upcoming: Personal Herald Rules No Longer Semi-Private as Resolved.

This has promoted to stable and doesn't seem like a contentious change so I don't currently anticipate any need to keep this open or revisit it.

Aug 14 2016, 12:19 PM · Policy, Installing & Upgrading, Herald
epriestley added a comment to T11428: Upcoming: Personal Herald Rules No Longer Semi-Private.

Personal Herald rules do not run for disabled users, so disabling a user will disable all of their personal rules.

Aug 14 2016, 12:18 PM · Policy, Installing & Upgrading, Herald

Aug 12 2016

stevex added a comment to T4411: Adding a CC to a Maniphest Task should give View rights for that user.

In my personal opinion adding a CC that cannot see the task is an error and like this should be treated, meaning ux should just report as error when try to save it. It is important that ux reports it since it can be overlooked by the person changing the task.

Aug 12 2016, 2:21 PM · Wikimedia, Policy

Aug 10 2016

Danny_B added a comment to T11428: Upcoming: Personal Herald Rules No Longer Semi-Private.

Thank you for exhaustive description. One more question:

Aug 10 2016, 10:00 PM · Policy, Installing & Upgrading, Herald
epriestley moved T11428: Upcoming: Personal Herald Rules No Longer Semi-Private from Backlog to Next on the Herald board.
Aug 10 2016, 4:41 PM · Policy, Installing & Upgrading, Herald
epriestley closed T9410: Policy behavior for Herald rules is murky and inconsistent, a subtask of T11428: Upcoming: Personal Herald Rules No Longer Semi-Private, as Resolved.
Aug 10 2016, 3:53 PM · Policy, Installing & Upgrading, Herald
epriestley added a revision to T11428: Upcoming: Personal Herald Rules No Longer Semi-Private: D16384: Update Herald documentation for modern policies and beahvior.
Aug 10 2016, 1:52 PM · Policy, Installing & Upgrading, Herald
epriestley added a comment to T11428: Upcoming: Personal Herald Rules No Longer Semi-Private.

Primarily, global rules bypass access control policies. They can also apply different actions.

Aug 10 2016, 1:13 AM · Policy, Installing & Upgrading, Herald
Danny_B added a comment to T11428: Upcoming: Personal Herald Rules No Longer Semi-Private.

Great and very helpful change, thank you!

Aug 10 2016, 12:35 AM · Policy, Installing & Upgrading, Herald

Aug 5 2016

eadler added a project to T4850: Defining policies for "Project Members": Restricted Project.
Aug 5 2016, 5:24 PM · Restricted Project, Policy
eadler added a project to T8442: Build Space switching UI: Restricted Project.
Aug 5 2016, 5:23 PM · Restricted Project, Spaces, Wikimedia, Policy

Aug 4 2016

epriestley added a subtask for T11428: Upcoming: Personal Herald Rules No Longer Semi-Private: T9410: Policy behavior for Herald rules is murky and inconsistent.
Aug 4 2016, 3:20 PM · Policy, Installing & Upgrading, Herald
epriestley created T11428: Upcoming: Personal Herald Rules No Longer Semi-Private.
Aug 4 2016, 3:16 PM · Policy, Installing & Upgrading, Herald