From owner-freebsd-hackers@FreeBSD.ORG Thu Jan 8 09:16:15 2004 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id B508516A4CE for ; Thu, 8 Jan 2004 09:16:15 -0800 (PST) Received: from mail6.speakeasy.net (mail6.speakeasy.net [216.254.0.206]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7222A43D1F for ; Thu, 8 Jan 2004 09:16:12 -0800 (PST) (envelope-from jhb@FreeBSD.org) Received: (qmail 7906 invoked from network); 8 Jan 2004 17:16:10 -0000 Received: from dsl027-160-063.atl1.dsl.speakeasy.net (HELO server.baldwin.cx) ([216.27.160.63]) (envelope-sender ) encrypted SMTP for ; 8 Jan 2004 17:16:10 -0000 Received: from 10.50.40.206 (gw1.twc.weather.com [216.133.140.1]) by server.baldwin.cx (8.12.10/8.12.10) with ESMTP id i08HFqM0038106; Thu, 8 Jan 2004 12:15:55 -0500 (EST) (envelope-from jhb@FreeBSD.org) From: John Baldwin To: Roman Neuhauser , Peter Jeremy Date: Thu, 8 Jan 2004 11:25:14 -0500 User-Agent: KMail/1.5.4 References: <3FFC03E5.7010305@iconoplex.co.uk> <20040108073340.GI25474@server.vk2pj.dyndns.org> <20040108125738.GQ54743@freepuppy.bellavista.cz> In-Reply-To: <20040108125738.GQ54743@freepuppy.bellavista.cz> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200401081125.15181.jhb@FreeBSD.org> X-Spam-Checker-Version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp) cc: freebsd-hackers@freebsd.org Subject: Re: Where is FreeBSD going? X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Jan 2004 17:16:15 -0000 On Thursday 08 January 2004 07:57 am, Roman Neuhauser wrote: > Now, I'm by no means advocating everybody should get ssh login on > [dnp]cvs.freebsd.org; I just can't wait for the day when FreeBSD > uses a SCM that handles tags and branches efficiently (so that > people can freely create branches of areas they hack), that has > permissions model with file- or directory-level granularity (so that > people can be granted commit e. g. in /ports/x11-wm/openbox and > nowhere else), etc. Note that cvs_acls.pl and the avail files already allow directory-level (and possibly file-level) ACLs. They aren't very widely used at the moment, however. -- John Baldwin <>< http://www.FreeBSD.org/~jhb/ "Power Users Use the Power to Serve" = http://www.FreeBSD.org