On 13/05/15 16:45, Ramon Ribó wrote:

Hello,

A reasonable solution could be a pre-commit hook, where the script in TH1 or TCL had access to the branch name of the commit and other details. As a result, the hook could accept the commit, raise a warning, ask for confirmation or deny the commit.

This hook would not stop a determined hacker to make a sabotage of the repository, but would give some control over the distracted programmer.

And in my experience it is much more common to deal with distracted programmers than with professional saboteurs.

​ RR
​


It wouldn't offer much control over a distracted programmer, because your local repo is always going to be under the full control of the user on the local machine - no hacking required.

In which case, all you can do is prompt asking are you sure you want to commit to this branch.

Is that feature really that useful? Maybe someone who thinks it us could write some code and supply it as a bundle so other's interested can try it, and see if it truly helps or is a hindrance in practice.

I don't know the fossil codebase, so I don't know what's easiest to do, whether to add a TH hook, or for the sake of investigative purposes, just add another setting, which maybe takes a regexp, which is then used to determine whether or not to prompt.

_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to