Phabricator Username: MLechvien-WMF
Reasons For Request: I'm a new manager in SRE and will need access for my daily work.
Phabricator Username: MLechvien-WMF
Reasons For Request: I'm a new manager in SRE and will need access for my daily work.
I am not @MLechvien-WMF's manager (adding @Kappakayala for that) but as a fellow manager in SRE, +1ing his request as we discussed it in a video call.
Confirming @MLechvien-WMF has Phab 2fa enabled. @Kappakayala and @MLechvien-WMF - would you be able to provide a bit more detail about the need for this request? e.g. specific lines of work and Phabricator task examples that @MLechvien-WMF need access to? Thanks.
As the new manager of SRE/ServiceOps, there are tasks that are referenced/discussed in my day to day work and I can't access them because I am not part of acl_security.
I will also need to have this access to look up and follow tasks such as https://phabricator.wikimedia.org/T355949
Thanks
More example of bugs I can't access to:
Those are both filed by @corto -- perhaps we could have a Herald rule that auto-subscribes relevant users? Once you're subscribed, you can view those tasks.
... or at least, that's how I thought it worked. After adding @MLechvien-WMF, phab says "No View Permission" for that user in the "Subscribers" list
I'd note that this would add an extra layer of complexity that would need to become part of various audit, on/offboarding, etc. processes. Introducing new mechanisms like this has a non-zero cost.
@MLechvien-WMF - We're still waiting on final approval to add you to the acl*security_sre.
The task's View Policy is members of acl*security. The task's View Policy is not members of acl*security or tasks subscribers.
Hi,
Is there any update on this request?
Please let me know if anything else is needed from my end.
Thanks!
Thanks. However I still get access denied when accessing the example bugs I linked:
Is there anything specific I should do for this approval to be propagated?
Yes, access was approved but not granted :) I've now added you to #acl_security_sre.