Size: 2223
Comment:
|
Size: 3695
Comment: add link to Subrepository
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
== Acl Extension == | #pragma section-numbers 2 = ACL Extension = Restrict changes via access control lists. /!\ '''NOTE: This extension does not enable a workflow similar to that granted by DAV SVN even if they look very similar. Mercurial can't do partial commits, nor can it limit the change list sent (which in effect means all changes across a repository must be sent in its entirety). Such limited functionality can be supplied by [[Subrepository|subrepositories]].''' <<TableOfContents>> == Status == |
Line 6: | Line 15: |
=== Overview === | == Overview == |
Line 13: | Line 23: |
=== Configuration === | == Configuration == |
Line 16: | Line 26: |
Line 17: | Line 28: |
[extensions] hgext.acl= |
[hooks] |
Line 20: | Line 30: |
[hooks] # You can have ACL checks active at commit time, at push time, or both. |
# Use this if you want to check access restrictions at commit time pretxncommit.acl = python:hgext.acl.hook # Use this if you want to check access restrictions for pull, push, # bundle and serve. pretxnchangegroup.acl = python:hgext.acl.hook |
Line 23: | Line 37: |
# Activates ACL at push time: pretxnchangegroup.acl = python:hgext.acl.hook |
[acl] # Check whether the source of incoming changes is in this list where # "serve" == ssh or http, and "push", "pull" and "bundle" are the # corresponding hg commands. sources = serve |
Line 26: | Line 43: |
# Activates ACL at commit time: pretxncommit.acl = python:hgext.acl.hook |
[acl.groups] # If a group name is not defined here, and Mercurial is running under # a Unix-like system, the list of users will be taken from the OS. # Otherwise, an exception will be raised. designers = user1, user2 |
Line 29: | Line 49: |
[acl] # This is only checked at push time: sources = serve # check if source of incoming changes in this list # ("serve" == ssh or http, "push", "pull", "bundle") |
[acl.deny.branches] # Everyone is denied to the frozen branch: frozen-branch = * # A bad user is denied on all branches: * = bad-user [acl.allow.branches] # A few users are allowed on branch-a: branch-a = user-1, user-2, user-3 # Only one user is allowed on branch-b: branch-b = user-1 # The super user is allowed on any branch: * = super-user # Everyone is allowed on branch-for-tests: branch-for-tests = * |
Line 34: | Line 71: |
[acl.deny] # This list is checked first. If a match is found, 'acl.allow' won't be checked. # if acl.deny not present, no users denied by default # empty acl.deny = all users allowed # Format for both lists: glob pattern = user4, user5 # To match everyone, use an asterisk for the user: # my/glob/pattern = * |
[acl.deny] # This list is checked first. If a match is found, acl.allow is not # checked. All users are granted access if acl.deny is not present. # Format for both lists: glob pattern = user, ..., @group, ... |
Line 42: | Line 76: |
# user6 won't have write access to any file: ** = user6 |
# To match everyone, use an asterisk for the user: # my/glob/pattern = * |
Line 45: | Line 79: |
# Nobody will be able to change 'DONT-TOUCH-THIS.txt', despite everyone being able to change all other files. See below.) src/main/resources/DONT-TOUCH-THIS.txt = * |
# user6 will not have write access to any file: ** = user6 |
Line 48: | Line 82: |
[acl.allow] # if acl.allow not present, all users allowed by default # empty acl.allow = no users allowed |
# Group "hg-denied" will not have write access to any file: ** = @hg-denied |
Line 52: | Line 85: |
# User 'doc_writer' has write access to any file under the 'docs' folder: docs/** = doc_writer |
# Nobody will be able to change "DONT-TOUCH-THIS.txt", despite # everyone being able to change all other files. See below. src/main/resources/DONT-TOUCH-THIS.txt = * |
Line 55: | Line 89: |
# Everyone (except for 'user6'. See 'acl.deny' above) will have write access to any file under the 'resources' folder (except for 1 file. See 'acl.deny'): src/main/resources/** = * |
[acl.allow] # if acl.allow not present, all users allowed by default # empty acl.allow = no users allowed |
Line 58: | Line 93: |
.hgtags = release_engineer | # User "doc_writer" has write access to any file under the "docs" # folder: docs/** = doc_writer |
Line 60: | Line 97: |
# User "jack" and group "designers" have write access to any file # under the "images" folder: images/** = jack, @designers # Everyone (except for "user6" - see acl.deny above) will have write # access to any file under the "resources" folder (except for 1 # file. See acl.deny): src/main/resources/** = * .hgtags = release_engineer |
|
Line 63: | Line 110: |
CategoryExtension | CategoryBundledExtension |
ACL Extension
Restrict changes via access control lists.
NOTE: This extension does not enable a workflow similar to that granted by DAV SVN even if they look very similar. Mercurial can't do partial commits, nor can it limit the change list sent (which in effect means all changes across a repository must be sent in its entirety). Such limited functionality can be supplied by subrepositories.
Contents
1. Status
This extension is currently being distributed along with Mercurial.
Author: Vadim Gelfer
2. Overview
The ACL extension lets you have fine grained access control to parts of a repository using deny and allow lists. These lists associate glob patterns to users. Furthermore, it can restrict changes depending on its source (http, ssh, pull, push, bundle).
It's recommended that this extension is used with hg-ssh (a restricted shell for Mercurial ssh access) to tighten security.
3. Configuration
Below is an example configuration file (hgrc). The acl lists use the pattern = user syntax, where pattern is a glob by default. :
[hooks] # Use this if you want to check access restrictions at commit time pretxncommit.acl = python:hgext.acl.hook # Use this if you want to check access restrictions for pull, push, # bundle and serve. pretxnchangegroup.acl = python:hgext.acl.hook [acl] # Check whether the source of incoming changes is in this list where # "serve" == ssh or http, and "push", "pull" and "bundle" are the # corresponding hg commands. sources = serve [acl.groups] # If a group name is not defined here, and Mercurial is running under # a Unix-like system, the list of users will be taken from the OS. # Otherwise, an exception will be raised. designers = user1, user2 [acl.deny.branches] # Everyone is denied to the frozen branch: frozen-branch = * # A bad user is denied on all branches: * = bad-user [acl.allow.branches] # A few users are allowed on branch-a: branch-a = user-1, user-2, user-3 # Only one user is allowed on branch-b: branch-b = user-1 # The super user is allowed on any branch: * = super-user # Everyone is allowed on branch-for-tests: branch-for-tests = * [acl.deny] # This list is checked first. If a match is found, acl.allow is not # checked. All users are granted access if acl.deny is not present. # Format for both lists: glob pattern = user, ..., @group, ... # To match everyone, use an asterisk for the user: # my/glob/pattern = * # user6 will not have write access to any file: ** = user6 # Group "hg-denied" will not have write access to any file: ** = @hg-denied # Nobody will be able to change "DONT-TOUCH-THIS.txt", despite # everyone being able to change all other files. See below. src/main/resources/DONT-TOUCH-THIS.txt = * [acl.allow] # if acl.allow not present, all users allowed by default # empty acl.allow = no users allowed # User "doc_writer" has write access to any file under the "docs" # folder: docs/** = doc_writer # User "jack" and group "designers" have write access to any file # under the "images" folder: images/** = jack, @designers # Everyone (except for "user6" - see acl.deny above) will have write # access to any file under the "resources" folder (except for 1 # file. See acl.deny): src/main/resources/** = * .hgtags = release_engineer