Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:54482 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 55041 invoked from network); 9 Aug 2011 04:27:36 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 9 Aug 2011 04:27:36 -0000 Authentication-Results: pb1.pair.com smtp.mail=joey@joeysmith.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=joey@joeysmith.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain joeysmith.com designates 209.90.98.146 as permitted sender) X-PHP-List-Original-Sender: joey@joeysmith.com X-Host-Fingerprint: 209.90.98.146 host-3.pl1071314.fiber.net Received: from [209.90.98.146] ([209.90.98.146:57384] helo=localhost) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id F1/32-35859-737B04E4 for ; Tue, 09 Aug 2011 00:27:36 -0400 Received: from joey by localhost with local (Exim 4.74) (envelope-from ) id 1QqduY-0007z0-2X for internals@lists.php.net; Mon, 08 Aug 2011 22:27:26 -0600 Date: Mon, 8 Aug 2011 22:27:25 -0600 To: internals@lists.php.net Message-ID: <20110809042725.GA21131@joeysmith.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Subject: Re: [PHP-DEV] [RFC] Choosing a distributed version control system for PHP (or not). Call for Participation. From: joey@joeysmith.com (Joey Smith) On Sun, Aug 07, 2011 at 04:50:55PM -0400, David Soria Parra wrote: > Hi Internals, > > NOTE: this is not the place for any religiouise discussion about git vs > mercurial whatsover. if you have nothing else to add than "hg is $*** > anyway" or think hosting platform XY will solve all our problems > without reading the RFC carefully, please post to alt.relgion.* and not > here. > > > - David I feel like maybe the RFC throws in the towel too early on the idea of using SSH keys to manage access control. On the git side, there's a tool called gitolite which makes management of access controls via SSH keys incredibly trivial. While I've never looked at the code behind the online "Manager Users" tool we have, I can't imagine it would be terribly hard to expand that to allow people to add their public SSH keys for plugging into gitolite [1]. [1] https://github.com/sitaramc/gitolite