- Gitolite Essentials
- Sitaram Chamarty
- 275字
- 2021-07-16 12:10:04
Access Control example with Gitolite
We will see how simple Access Control can be with Gitolite. First, here's an example where the junior developers (let's call them Alice and Bob here) should be prevented from rewinding or deleting any branches, while the senior developers (Carol and David) are allowed to do so:
repo foo RW = alice bob RW+ = carol david
You probably guessed that the RW
stands for read and write. The +
in the second rule stands for force, just as it does in the push
command, and allows you to rewind or delete a branch.
Now, suppose we want the junior developers to have some specific set of branches that they should be allowed to rewind or delete, a sort of "sandbox", if you will. The following command will help you to implement that:
RW+ sandbox/ = alice bob
Alice and Bob can now push, rewind, or delete any branches whose names start with sandbox/
.
Access Control at the repository level is even easier, and you may even have guessed what that looks like:
repo foo RW+ = alice R = bob repo bar RW+ = bob R = alice repo baz RW+ = carol R = alice bob
As you can see, you have three users with different access permissions for each of the three repositories. Doing this using the file systems' permissions mechanisms or POSIX ACLs would be doable, but quite cumbersome to set up and to audit/review.
- Hands-On Intelligent Agents with OpenAI Gym
- 虛擬儀器設計測控應用典型實例
- Mastercam 2017數控加工自動編程經典實例(第4版)
- Security Automation with Ansible 2
- 機艙監測與主機遙控
- 西門子S7-200 SMART PLC實例指導學與用
- Ruby on Rails敏捷開發最佳實踐
- 基于Xilinx ISE的FPAG/CPLD設計與應用
- 手機游戲策劃設計
- INSTANT Adobe Story Starter
- 分布式Java應用
- SQL Server 2019 Administrator's Guide
- 探索中國物聯網之路
- Microsoft Office 365:Exchange Online Implementation and Migration(Second Edition)
- Ubuntu 9 Linux應用基礎