Re: git with large files...

2012-07-23 Thread Kalle Launiala
2012/7/23 Sitaram Chamarty sitar...@gmail.com:
 On Mon, Jul 23, 2012 at 2:24 AM, Junio C Hamano gits...@pobox.com wrote:
 mer...@stonehenge.com (Randal L. Schwartz) writes:

 Darek == Darek Bridges darek.brid...@me.com writes:

 Darek I use git for many things, but I am trying to work out the
 Darek workflow to use git for deployment.

 Don't.

 Yeah, don't think 'git checkout' is a way to 'deploy'.  Using Git
 as a transport measure is probably fine.

 You can also try
 http://sitaramc.github.com/the-list-and-irc/deploy.html.  Whether it's
 saying you *can* use git for deploying something, or you *can* but
 *should not*, or you *cannot*, will depend on your own thoughts on the
 matter ;-)

Nice summary list of options!

If you combine that with several key concepts:
1. You plan and design to deploy - hence you have separate deploy
repositories dedicated for that
2. You design for modularity and complete audit trail, hence you have this:
http://abstractiondev.files.wordpress.com/2011/12/git-distribution-overview.png

You can combine the staging with any approach, that *tries* to
maintain the local version copy. But if any problem arises in
pull/fetch, simply trash that part and get it from fresh (or just use
the git archive approach).

Now this model would introduce complete and as detailed security
enforcement - as the deployment can validate with certificates (from
the additional catalogue-metadata binding, whether there is authorized
party confirmed signature available for the wished deployable
version).

I don't see much overhead in any of the steps here - and the
deployment is as detailed and as securely controlled as desired. With
just Git (and well, possibly GnuPG or alike common tool for digital
certificate work).

Everything is also transparent - which is very important in having
that complete control and audit trail.
--
To unsubscribe from this list: send the line unsubscribe git in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Complete audit trail for embedded (Linux) system lifecycle with Git

2012-07-15 Thread Kalle Launiala
Hello,

We are to solve a complete audit trail solution for full subcontractor
value-chain fullfilling European Union machinery directive:
http://ec.europa.eu/enterprise/sectors/mechanical/machinery/

To summarize, the directive is created to ensure safe operating
environment for all kind of machinery devices (from industrial
machinery to consumer shopping-centre lifts/elevators). This also
includes the embedded software that controls the machinery (which is
as we know, the make-or-break the true safety of the device).

The solution is based on the very core Git functionality, in very
brief overview explained here:
http://abstractiondev.wordpress.com/git-based-distribution/

As Git is completely file-system based, in our solution it is used as
the core technology to audit ANY digital document or information. It
is serving as a distributed set of master data repositories,
including the digital signature repositories and 3rd party validation
stacks. In the validation chains it is critical to be able to support
responsible decision makers to approve design choises beyond the
software, thus the digital signature infrastructure for any
legal-binding document is as important as the actual embedded software
stack, that is by its nature version controlled within Git as well.

While I would hope this post to serve a purpose for demonstrating that
Git works as a perfect solution in the core, I'd also like to hear if
there is already established community/ongoing process of achieving
anything described above?

We have no intention of reinventing the wheel here, although being
very core solution for ANY audit trail and being so close based on Git
- bare functionality, I'm expecting any existing solution to share
much of similar design. Any existing tooling to support the solution
(especially dynamic cross-connected metadata repository searches - the
bottom image of the overview, that indexes the repositories together)
would be very welcome. The current technical solution is using GnuPG
for the digital signatures and open-source cross platform XML-database
for metadata indexing - grid databases being considered for the larger
implementations.

Any comments and/or feedback would be greatly appreciated.

Cheers,

Kalle Launiala
--
To unsubscribe from this list: send the line unsubscribe git in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html