Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Protected branches #19

Open
Oreolek opened this issue Jul 13, 2018 · 2 comments
Open

Protected branches #19

Oreolek opened this issue Jul 13, 2018 · 2 comments

Comments

@Oreolek
Copy link

Oreolek commented Jul 13, 2018

Let's say there's a branch with an ACL, so only the specified servers could checkout it and only specified users could push to it. How would that look?

@yookoala
Copy link

No one in the work group think we should do push in our protocol. Git is perfectly capable to handle push permission with password control / certificates. Code checkout is the same. Basically, if Git is doing it fine, we won't touch it.

So we're only dealing with pull request, fork and maybe issue tracking. And you might ask the same access control question about these 3. Right?

It is very hard to enforce any security policy over a federated network. Security would needed to be done by the server hosting the project. Once the source code, or any federated messages, has left the original server, there is no way to enforce ownership or readership.

I think to fork from / send PR to a remote repository, you'd have to have a way to login to that remote server to gain access information (some access token?) for you to do it.

@bill-auger
Copy link
Member

bill-auger commented Jul 14, 2018 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants