Show More
@@ -22,7 +22,7 b' interactive shell access, as they can th' | |||
|
22 | 22 | Nor is it safe if remote users share an account, because then there |
|
23 | 23 | is no way to distinguish them. |
|
24 | 24 | |
|
25 |
The deny list is checked before the allow list |
|
|
25 | The deny list is checked before the allow list. | |
|
26 | 26 | |
|
27 | 27 | The allow and deny sections take key-value pairs, having a subtree pattern |
|
28 | 28 | as key (with a glob syntax by default). The corresponding value can be either: |
@@ -30,11 +30,9 b' as key (with a glob syntax by default). ' | |||
|
30 | 30 | 1) an asterisk, to match everyone; |
|
31 | 31 | 2) a comma-separated list containing users and groups. |
|
32 | 32 | |
|
33 | Group names must be prefixed with an @ symbol. | |
|
33 | Group names must be prefixed with an ``@`` symbol. | |
|
34 | 34 | Specifying a group name has the same effect as specifying all the users in |
|
35 | 35 | that group. |
|
36 | The set of users for a group is taken from "grp.getgrnam" | |
|
37 | (see http://docs.python.org/library/grp.html#grp.getgrnam). | |
|
38 | 36 | |
|
39 | 37 | To use this hook, configure the acl extension in your hgrc like this:: |
|
40 | 38 | |
@@ -43,7 +41,7 b' To use this hook, configure the acl exte' | |||
|
43 | 41 | |
|
44 | 42 | [hooks] |
|
45 | 43 | |
|
46 | # Use this if you want to check access restrictions at commit time | |
|
44 | # Use this if you want to check access restrictions at commit time. | |
|
47 | 45 | pretxncommit.acl = python:hgext.acl.hook |
|
48 | 46 | |
|
49 | 47 | # Use this if you want to check access restrictions for pull, push, bundle |
@@ -51,16 +49,15 b' To use this hook, configure the acl exte' | |||
|
51 | 49 | pretxnchangegroup.acl = python:hgext.acl.hook |
|
52 | 50 | |
|
53 | 51 | [acl] |
|
54 | # Check whether the source of incoming changes is in this list | |
|
55 |
# |
|
|
52 | # Check whether the source of incoming changes is in this list where | |
|
53 | # "serve" == ssh or http, and "push", "pull" and "bundle" are the | |
|
54 | # corresponding hg commands. | |
|
56 | 55 | sources = serve |
|
57 | 56 | |
|
58 | 57 | [acl.deny] |
|
59 | 58 | # This list is checked first. If a match is found, 'acl.allow' will not be |
|
60 | # checked. | |
|
61 | # if acl.deny is not present, no users denied by default | |
|
62 | # empty acl.deny = all users allowed | |
|
63 | # Format for both lists: glob pattern = user4, user5, @group1 | |
|
59 | # checked. All users are granted access if acl.deny is not present. | |
|
60 | # Format for both lists: glob pattern = user, ..., @group, ... | |
|
64 | 61 | |
|
65 | 62 | # To match everyone, use an asterisk for the user: |
|
66 | 63 | # my/glob/pattern = * |
@@ -87,7 +84,7 b' To use this hook, configure the acl exte' | |||
|
87 | 84 | images/** = jack, @designers |
|
88 | 85 | |
|
89 | 86 | # Everyone (except for "user6" - see "acl.deny" above) will have write access |
|
90 | to any file under the "resources" folder (except for 1 file. See "acl.deny"): | |
|
87 | # to any file under the "resources" folder (except for 1 file. See "acl.deny"): | |
|
91 | 88 | src/main/resources/** = * |
|
92 | 89 | |
|
93 | 90 | .hgtags = release_engineer |
General Comments 0
You need to be logged in to leave comments.
Login now