3.2.2.5. Impersonating Users ...........................................................................................................39
3.3. Classifications...............................................................................................................................................40
3.4. Products........................................................................................................................................................40
3.4.1. Creating New Products....................................................................................................................41
3.4.2. Editing Products...............................................................................................................................41
3.4.3. Adding or Editing Components, Versions and Target Milestones...................................................42
3.4.4. Assigning Group Controls to Products............................................................................................42
3.4.4.1. Common Applications of Group Controls..........................................................................43
3.5. Components..................................................................................................................................................45
3.6. Versions ........................................................................................................................................................45
3.7. Milestones ....................................................................................................................................................46
3.8. Flags .............................................................................................................................................................46
3.8.1. A Simple Example...........................................................................................................................46
3.8.2. About Flags......................................................................................................................................47
3.8.2.1. Values..................................................................................................................................47
3.8.3. Using flag requests...........................................................................................................................47
3.8.4. Two Types of Flags..........................................................................................................................47
3.8.4.1. Attachment Flags ................................................................................................................47
3.8.4.2. Bug Flags ............................................................................................................................48
3.8.5. Administering Flags.........................................................................................................................48
3.8.5.1. Creating a Flag....................................................................................................................48
3.8.5.2. Deleting a Flag....................................................................................................................50
3.8.5.3. Editing a Flag......................................................................................................................51
3.9. Keywords......................................................................................................................................................51
3.10. Custom Fields.............................................................................................................................................51
3.10.1. Adding Custom Fields...................................................................................................................51
3.10.2. Editing Custom Fields ...................................................................................................................52
3.10.3. Deleting Custom Fields .................................................................................................................52
3.11. Legal Values ...............................................................................................................................................52
3.11.1. Viewing/Editing legal values .........................................................................................................52
3.11.2. Deleting legal values......................................................................................................................52
3.12. Voting .........................................................................................................................................................53
3.13. Quips ..........................................................................................................................................................53
3.14. Groups and Group Security........................................................................................................................54
3.14.1. Creating Groups.............................................................................................................................54
3.14.2. Editing Groups and Assigning Group Permissions .......................................................................55
3.14.3. Assigning Users to Groups............................................................................................................56
3.14.4. Assigning Group Controls to Products..........................................................................................56
3.15. Checking and Maintaining Database Integrity...........................................................................................56
3.16. Upgrading to New Releases .......................................................................................................................56
3.16.1. Version Definitions ........................................................................................................................57
3.16.2. Upgrading - Notifications ..............................................................................................................57
3.16.3. Upgrading - Methods and Procedure.............................................................................................57
3.16.3.1. Upgrading using CVS.......................................................................................................58
3.16.3.2. Upgrading using the tarball...............................................................................................59
3.16.3.3. Upgrading using patches...................................................................................................59
3.16.4. Completing Your Upgrade.............................................................................................................60
v