Size: 2028
Comment:
|
Size: 2195
Comment: Removed the 'extensions' section, since it makes no difference here
|
Deletions are marked like this. | Additions are marked like this. |
Line 15: | Line 15: |
Below is an example configuration file (hgrc) provided with the sources. The acl lists use the pattern = user syntax, where pattern is a glob by default. : | Below is an example configuration file (hgrc). The acl lists use the pattern = user syntax, where pattern is a glob by default. : |
Line 17: | Line 17: |
[extensions] hgext.acl= |
[hooks] # You can have ACL checks active at commit time, at push time, or both. |
Line 20: | Line 20: |
[hooks] | # Activates ACL at push time: |
Line 23: | Line 23: |
# Activates ACL at commit time: pretxncommit.acl = python:hgext.acl.hook |
|
Line 24: | Line 27: |
# This is only checked at push time: |
Acl Extension
This extension is currently being distributed along with Mercurial.
Author: Vadim Gelfer
Overview
The ACL extension lets you have fine grained access control to parts of a repository using deny and allow lists. These lists associate glob patterns to users. Furthermore, it can restrict changes depending on its source (http, ssh, pull, push, bundle).
It's recommended that this extension is used with hg-ssh (a restricted shell for Mercurial ssh access) to tighten security.
Configuration
Below is an example configuration file (hgrc). The acl lists use the pattern = user syntax, where pattern is a glob by default. :
[hooks] # You can have ACL checks active at commit time, at push time, or both. # Activates ACL at push time: pretxnchangegroup.acl = python:hgext.acl.hook # Activates ACL at commit time: pretxncommit.acl = python:hgext.acl.hook [acl] # This is only checked at push time: sources = serve # check if source of incoming changes in this list # ("serve" == ssh or http, "push", "pull", "bundle") [acl.deny] # This list is checked first. If a match is found, 'acl.allow' won't be checked. # if acl.deny not present, no users denied by default # empty acl.deny = all users allowed # Format for both lists: glob pattern = user4, user5 # To match everyone, use an asterisk for the user: # my/glob/pattern = * # user6 won't have write access to any file: ** = user6 # Nobody will be able to change 'DONT-TOUCH-THIS.txt', despite everyone being able to change all other files. See below.) src/main/resources/DONT-TOUCH-THIS.txt = * [acl.allow] # if acl.allow not present, all users allowed by default # empty acl.allow = no users allowed # User 'doc_writer' has write access to any file under the 'docs' folder: docs/** = doc_writer # Everyone (except for 'user6'. See 'acl.deny' above) will have write access to any file under the 'resources' folder (except for 1 file. See 'acl.deny'): src/main/resources/** = * .hgtags = release_engineer