# Perforce Protections Specification.
#
# Each line contains a protection mode, a user name, client host id,
# and a depot file path pattern. A user gets the highest privilege
# granted on any line.
#
# Mode: The permission being granted. Each permission includes
# all the permissions above it, except for 'review'.
#
# list - users can see names but not contents of files;
# users can see all non-file related metadata
# (clients, users, changelists, jobs, etc.)
#
# read - users can sync, diff, and print files
#
# open - users can add, edit, delete, and integrate files
#
# write - users can submit open files
#
# super - allows access to the 'protect' command
#
# review - allows access to the 'review' command; implies
# read access
#
# User: A Perforce user name; may be wildcarded. The user name
# is not authenticated, and so user restrictions are for
# safety, not security.
#
# Host: The IP address of a client host; may be wildcarded.
#
# Path: The part of the depot being granted access.
Protections:
read * * //...
read * * //IT/...
write * * //IT/PRE/10/...
write * * //IT/DEV/10/...
write * * //IT/INT/9/...
write * * //IT/QAT/9/...
read * * //IT/PRD/9/...
write * * //IT/PRD/9/1/...
write elio * //IT/PRE/10/...
write elio * //IT/DEV/10/...
write elio * //IT/INT/9/...
write elio * //IT/QAT/9/...
read elio * //IT/PRD/9/...
write elio * //IT/PRD/9/2/...
write * * //Elite/PRE/2/...
write * * //Elite/DEV/2/...
read * * //Elite/PRD/1/...
write elio * //Elite/PRE/2/...
write elio * //Elite/DEV/2/...
read elio * //Elite/PRD/1/...
write elio * //Elite/PRD/1/1/...
write * * //Elite/PRD/1/2/...
write * * //OFF202/...
write kozer * //SoftInfra/...
write aryehs * //SoftInfra/...
write off * //SoftInfra/...
write yarivs * //Demo/...
write aryehs * //Demo/...
write kozer * //Demo/QAT/...
super p4adm * //...
super off * //IT/...
super elio * //IT/...
super elio * //Elite/...
super elio * //Elite2/...