-
Notifications
You must be signed in to change notification settings - Fork 117
Add redmine groups to gitolite configuration #435
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Yes and it's normal. This won't be implemented. It would add too much complexity.
See here |
I don't think #389 is exactly what I'm looking for. It's related to force pushing, while in my case I want to prevent @ALL from having RW permission. Is there any plan to support having a "per group" set of permissions or will we have to define permissions on a per refex/user basis? (if you add a new user to a project, you need to add them to the project under various group AND then add them to the specific protected branches rules under the repository settings) |
Hi! Sorry for the delay.
Actually it's quite the same thing : protected branches. (http://gitolite.com/gitolite/conf.html#rules) I worked on a group based implementation : 2912c1d With this new implementation you can add both users and groups on each protected branch (refex). |
Great! :) |
In Gitolite conf :
|
The last 3 lines are not in Gitolite conf because there's no users declared. |
Note there's some limitations : when protected branches are enabled, plugin assumes that it has full control on repository configuration. In other words : manual modifications won't be saved or handled in any ways. |
Actually it can work with the last patch I've made on Grack server :) 0c53fda |
It appears that groups defined in redmine are not imported in the gitolite config. It would probably be nice to have support for that so that things such as giving group permissions on protected branches can be done.
My current use case: I want to give READ permissions to developers (or @ALL) on the develop/master branches, while giving RW+ permissions to lead developers on those branches.
The text was updated successfully, but these errors were encountered: