title: ${project.name} ${project.version} released
id: ${project.version}
date: ${project.buildDate}
- note: ~
+ note: "The default access restriction has been elevated from NONE to PUSH and anonymous push access has been disabled."
html: ~
text: ~
security: ~
dependencyChanges: ~
settings:
- { name: 'git.createRepositoriesShared', defaultValue: 'false' }
- - { name: 'git.allowAnonymousPushes', defaultValue: 'true' }
+ - { name: 'git.allowAnonymousPushes', defaultValue: 'false' }
+ - { name: 'git.defaultAccessRestriction', defaultValue: 'PUSH' }
- { name: 'web.commitMessageRenderer', defaultValue: 'plain' }
- { name: 'web.showBranchGraph', defaultValue: 'true' }
contributors:
# information.\r
#\r
# SINCE 1.4.0\r
-git.allowAnonymousPushes = true\r
+git.allowAnonymousPushes = false\r
\r
# The default access restriction for new repositories.\r
# Valid values are NONE, PUSH, CLONE, VIEW\r
# VIEW = authenticated view, clone, & push\r
#\r
# SINCE 1.0.0\r
-git.defaultAccessRestriction = NONE\r
+git.defaultAccessRestriction = PUSH\r
\r
# The default authorization control for new repositories.\r
# Valid values are AUTHENTICATED and NAMED\r
model.incrementalPushTagPrefix = getConfig(config, "incrementalPushTagPrefix", null);
model.allowForks = getConfig(config, "allowForks", true);
model.accessRestriction = AccessRestrictionType.fromName(getConfig(config,
- "accessRestriction", settings.getString(Keys.git.defaultAccessRestriction, null)));
+ "accessRestriction", settings.getString(Keys.git.defaultAccessRestriction, "PUSH")));
model.authorizationControl = AuthorizationControl.fromName(getConfig(config,
"authorizationControl", settings.getString(Keys.git.defaultAuthorizationControl, null)));
model.verifyCommitter = getConfig(config, "verifyCommitter", false);
} else {\r
// common repository, user default server settings\r
model.authorizationControl = AuthorizationControl.fromName(GitBlit.getString(Keys.git.defaultAuthorizationControl, ""));\r
- model.accessRestriction = AccessRestrictionType.fromName(GitBlit.getString(Keys.git.defaultAccessRestriction, ""));\r
+ model.accessRestriction = AccessRestrictionType.fromName(GitBlit.getString(Keys.git.defaultAccessRestriction, "PUSH"));\r
}\r
\r
// create the repository\r
}\r
\r
public AccessRestrictionType getDefaultAccessRestriction() {\r
- String restriction = null;\r
+ String restriction = "PUSH";\r
if (settings.hasKey(Keys.git.defaultAccessRestriction)) {\r
restriction = settings.get(Keys.git.defaultAccessRestriction).currentValue;\r
}\r
timeout = client.getDaemon().getTimeout();
}
- boolean allowAnonymousPushes = GitBlit.getBoolean(Keys.git.allowAnonymousPushes, true);
+ boolean allowAnonymousPushes = GitBlit.getBoolean(Keys.git.allowAnonymousPushes, false);
if (!allowAnonymousPushes && UserModel.ANONYMOUS.equals(user)) {
// prohibit anonymous pushes
throw new ServiceNotEnabledException();
super();\r
isCreate = true;\r
RepositoryModel model = new RepositoryModel();\r
- String restriction = GitBlit.getString(Keys.git.defaultAccessRestriction, null);\r
+ String restriction = GitBlit.getString(Keys.git.defaultAccessRestriction, "PUSH");\r
model.accessRestriction = AccessRestrictionType.fromName(restriction);\r
String authorization = GitBlit.getString(Keys.git.defaultAuthorizationControl, null);\r
model.authorizationControl = AuthorizationControl.fromName(authorization);\r
form.add(ownersPalette);\r
form.add(new CheckBox("allowForks").setEnabled(GitBlit.getBoolean(Keys.web.allowForking, true)));\r
DropDownChoice<AccessRestrictionType> accessRestriction = new DropDownChoice<AccessRestrictionType>("accessRestriction",\r
- AccessRestrictionType.choices(GitBlit.getBoolean(Keys.git.allowAnonymousPushes, true)), new AccessRestrictionRenderer());\r
+ AccessRestrictionType.choices(GitBlit.getBoolean(Keys.git.allowAnonymousPushes, false)), new AccessRestrictionRenderer());\r
form.add(accessRestriction);\r
form.add(new CheckBox("isFrozen"));\r
// TODO enable origin definition\r