1、安装git
2、安装gitolite
https://github.com/sitaramc/gitolite
Installation and setup
server requirements
- any unix system
- sh
- git 1.6.6 or later
- perl 5.8.8 or later
- openssh 5.0 or later
- a dedicated userid to host the repos (in this document, we assume it is "git", but it can be anything; substitute accordingly)
- this user id does NOT currently have any ssh pubkey-based access
- ideally, this user id has shell access ONLY by "su - git" from some other userid on the same server (this ensure minimal confusion for ssh newbies!)
steps to install
First, prepare the ssh key:
- login to "git" on the server
- make sure
~/.ssh/authorized_keys
is empty or non-existent - make sure your ssh public key from your workstation has been copied as $HOME/YourName.pub
Next, install gitolite by running these commands:
Finally, setup gitolite with yourself as the administrator:
If the last command doesn't run perhaps "bin" is not in your "PATH". You can either add it, or just run:
If you get any other errors please refer to the online documentation whose URL was given at the top of this file.
adding users and repos
Do NOT add new repos or users manually on the server. Gitolite users, repos, and access rules are maintained by making changes to a special repo called "gitolite-admin" and pushing those changes to the server.
To administer your gitolite installation, start by doing this on your workstation (if you have not already done so):
NOTE: if you are asked for a password, something went wrong.. Go hit the link for the complete documentation earlier in this file.
Now if you "cd gitolite-admin", you will see two subdirectories in it: "conf" and "keydir".
To add new users alice, bob, and carol, obtain their public keys and add them to "keydir" as alice.pub, bob.pub, and carol.pub respectively.
To add a new repo "foo" and give different levels of access to these users, edit the file "conf/gitolite.conf" and add lines like this:
Once you have made these changes, do something like this:
When the push completes, gitolite will add the new users to ~/.ssh/authorized_keys
on the server, as well as create a new, empty, repo called "foo".
help for your users
Once a user has sent you their public key and you have added them as specified above and given them access, you have to tell them what URL to access their repos at. This is usually "git clone git@host:reponame"; see man git-clone for other forms.
NOTE: again, if they are asked for a password, something is wrong.
If they need to know what repos they have access to, they just have to run "ssh git@host info".
access rule examples
Gitolite's access rules are very powerful. The simplest use was already shown above. Here is a slightly more detailed example:
Here's what these example rules say:
- alice can do anything to any branch or tag -- create, push, delete, rewind/overwrite etc.
- bob can create or fast-forward push any branch whose name does not start with "master" and create any tag whose name does not start with "v"+digit.
- carol can create tags whose names start with "v"+digit.
- dave can clone/fetch.
Please see the main documentation linked above for all the gory details, as well as more features and examples.
groups
Gitolite allows you to group users or repos for convenience. Here's an example that creates two groups of users:
Group lists accumulate. The following two lines have the same effect as the earlier definition of @staff above:
You can also use group names in other group names:
Finally, @all is a special group name that is often convenient to use if you really mean "all repos" or "all users".
commands
Users can run certain commands remotely, using ssh. Running
prints a list of available commands.
The most commonly used command is "info". All commands respond to a single argument of "-h" with suitable information.
If you have shell on the server, you have a lot more commands available to you; try running "gitolite help".
最后、禁用shell登录:
出于安全考虑,第二步创建的git用户不允许登录shell,这可以通过编辑/etc/passwd
文件完成。找到类似下面的一行:
改为:
这样,git
用户可以正常通过ssh使用git,但无法登录shell,因为我们为git
用户指定的git-shell
每次一登录就自动退出。