|
From: Bert F. <be...@is...> - 2002-05-21 22:04:19
|
With the commitinfo script it is easy to restrict access on a directory basis. It's somewhat harder to limit access to individual files. But I see no way to ensure a file is indeed committed to a branch, rather than to the trunk. See http://www.gnu.org/manual/cvs-1.9/html_node/cvs_134.html and http://www.loria.fr/~molli/fom-serve/cache/93.html -- Bert On Tue, 21 May 2002, Andreas Raab wrote: > Ian, > > I think this would be great. My major concern is mostly making errors so > I wouldn't even require this to be "secure" in any way. What it should > do is to make it harder to do stupid mistakes and for that it seems > perfectly applicable. > > Cheers, > - Andreas > > > > -----Original Message----- > > From: squ...@li... > > [mailto:squ...@li...] On Behalf > > Of Ian Piumarta > > Sent: Tuesday, May 21, 2002 4:44 PM > > To: Rob Withers > > Cc: squ...@li... > > Subject: RE: [Squeak-VMdev] RE: Pending 3.2 and VM sources @ > > sourceforge > > > > > > On Mon, 13 May 2002, Rob Withers wrote: > > > > > > Do we know that we can restrict access to the main trunk to the > > > maintainers, then issue expanded rights to select > > individuals to their > > > branches? > > > > You can do it with a trivial commitinfo script to filter the usernames > > that are allowed to commit to a particular area. (The script > > is called on > > every commit with env vars and arguments telling who, what, > > where, etc. > > If the script exits with nonzero then the commit is aborted. > > A few lines > > of case/sed/test/etc. does the trick.) > > > > Of course, for this to be in any way secure, SF must only > > allow admins to > > meddle with the contents of CVSROOT/commitinfo. > > > > Ciao, > > Ian |