Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

In what use case it can be interesting alternativd?

Limited access control (e.g. CI pass required), so not very useful for end users. For machine-to-machine it's an additional layer of abstraction when a regular tarball is fine.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: