I have a single repo in which I have 2 user groups:
I do not wish to give read/write access of my maste
Addition to @1615903's answer, you can protect a branch in Azure DevOps like below:
In Azure DevOps, protecting a branch with security permissions and policies which allow you can do the following:
and more detailed information on the docs page.
To protect the branch:
Git itself does not have such feature, but many hosting providers do. This is generally known as branch protection. There is no way to prevent read access as far as I know.
BitBucket allows a lot of customization for the actions to prevent by branch protection. To protect a branch:
Go to a repository in a project.
Choose Settings > Branch permissions.
Click Add permission.
In the Branches field, select either Branch name, Branch pattern, or Branching model.
Branch name - select an existing branch by name.
Branch pattern - specify a branch using branch pattern syntax for matching branch names.
Branching model - select the branch type to restrict access to.
Branch deletion - prevents branch and tag deletion.
Rewriting history - prevents history rewrites on the specified branch(es) - for example by a force push or rebase.
Changes without a pull request - prevents pushing changes directly to the specified branch(es); changes are allowed only with a pull request.
All modifications - prevents pushes to the specified branch(es) and restricts creating new branches matching the specified branch(es) or pattern.
Optional: Add exemptions for any of the selected restrictions. Adding a user or group as an exemption means that it will not apply to them. This is not required; not adding any exemptions means the restriction will apply to everyone.
Click Create to finish.
Source
A repository can have multiple protected branch rules that affect the same branches.
Protected branches are available only in public repositories with GitHub Free.
Protected branch in GitHub can be configured to require:
pushes to be made via pull requests and reviewed before being merged,
other branches to pass status check before being merged,
commits to be signed,
history to be linear,
that the above rules are enforced even for administrators,
that pushes come from specific people, teams or app,
Force pushes and deletions can be allowed independently.
To protect a branch:
On GitHub, navigate to the main page of the repository.
Under your repository name, click Settings.
In the left menu, click Branches.
Next to "Branch protection rules", click Add rule.
Under "Branch name pattern", type the branch name or pattern you want to protect (Impacted branches are listed and counted).
Configure specific branch rule settings if needed.
Click Create or Save changes.
Source
In GitLab, protecting a branch does the following:
To protect the branch:
Navigate to the main page of the project.
In the upper right corner, click the settings wheel and select Protected branches.
From the Branch dropdown menu, select the branch you want to protect and click Protect.
Once done, the protected branch will appear in the "Already protected" list.
You can then allow some access to users with developer rights by checking "Developers can merge" or "Developers can push"
Source
In Git itself you can use the "pre-receive" hook in the server to protect for writing in a branch to some user.
Using this hook you can apply your restriction policies for each file in the push.
Here you can find an example.