d71720d050
Well, something even more outrageous than deny rules and path-based limits came along, so I decided that "rebel" was actually quite "conformist" in comparision ;-) Jokes apart, the fact is that the access control rules, even when using deny rules and path-limits, are still *auditable*. Which means it is good enough for "corporate use". [The stuff that I'm working on now takes away the auditability aspect -- individual users can "own" repos, create rules for themselves, etc. So let's just say that is the basis of distinguishing "master" now.] |
||
---|---|---|
.. | ||
0-INSTALL.mkd | ||
1-migrate.mkd | ||
2-admin.mkd | ||
3-faq-tips-etc.mkd | ||
5-delegation.mkd | ||
6-ssh-troubleshooting.mkd | ||
COPYING | ||
TODO |