1、安装git
apt install git
apt install openssh-server
2、安装gitolite
https://github.com/sitaramc/gitolite
First, prepare the ssh key:
~/.ssh/authorized_keys
is empty or non-existentNext, install gitolite by running these commands:
git clone https://github.com/sitaramc/gitolite
mkdir -p $HOME/bin
gitolite/install -to $HOME/bin
Finally, setup gitolite with yourself as the administrator:
gitolite setup -pk YourName.pub
If the last command doesn't run perhaps "bin" is not in your "PATH". You can either add it, or just run:
$HOME/bin/gitolite setup -pk YourName.pub
If you get any other errors please refer to the online documentation whose URL was given at the top of this file.
Do NOT add new repos or users manually on the server. Gitolite users, repos, and access rules are maintained by making changes to a special repo called "gitolite-admin" and pushing those changes to the server.
To administer your gitolite installation, start by doing this on your workstation (if you have not already done so):
git clone git@host:gitolite-admin
NOTE: if you are asked for a password, something went wrong.. Go hit the link for the complete documentation earlier in this file.
Now if you "cd gitolite-admin", you will see two subdirectories in it: "conf" and "keydir".
To add new users alice, bob, and carol, obtain their public keys and add them to "keydir" as alice.pub, bob.pub, and carol.pub respectively.
To add a new repo "foo" and give different levels of access to these users, edit the file "conf/gitolite.conf" and add lines like this:
repo foo
RW+ = alice
RW = bob
R = carol
Once you have made these changes, do something like this:
git add conf
git add keydir
git commit -m "added foo, gave access to alice, bob, carol"
git push
When the push completes, gitolite will add the new users to ~/.ssh/authorized_keys
on the server, as well as create a new, empty, repo called "foo".
Once a user has sent you their public key and you have added them as specified above and given them access, you have to tell them what URL to access their repos at. This is usually "git clone git@host:reponame"; see man git-clone for other forms.
NOTE: again, if they are asked for a password, something is wrong.
If they need to know what repos they have access to, they just have to run "ssh git@host info".
Gitolite's access rules are very powerful. The simplest use was already shown above. Here is a slightly more detailed example:
repo foo
RW+ = alice
- master = bob
- refs/tags/v[0-9] = bob
RW = bob
RW refs/tags/v[0-9] = carol
R = dave
Here's what these example rules say:
alice can do anything to any branch or tag -- create, push, delete, rewind/overwrite etc.
bob can create or fast-forward push any branch whose name does not start with "master" and create any tag whose name does not start with "v"+digit.
carol can create tags whose names start with "v"+digit.
dave can clone/fetch.
Please see the main documentation linked above for all the gory details, as well as more features and examples.
Gitolite allows you to group users or repos for convenience. Here's an example that creates two groups of users:
@staff = alice bob carol
@interns = ashok
repo secret
RW = @staff
repo foss
RW+ = @staff
RW = @interns
Group lists accumulate. The following two lines have the same effect as the earlier definition of @staff above:
@staff = alice bob
@staff = carol
You can also use group names in other group names:
@all-devs = @staff @interns
Finally, @all is a special group name that is often convenient to use if you really mean "all repos" or "all users".
Users can run certain commands remotely, using ssh. Running
ssh git@host help
prints a list of available commands.
The most commonly used command is "info". All commands respond to a single argument of "-h" with suitable information.
If you have shell on the server, you have a lot more commands available to you; try running "gitolite help".
最后、禁用shell登录:
出于安全考虑,第二步创建的git用户不允许登录shell,这可以通过编辑/etc/passwd
文件完成。找到类似下面的一行:
git:x:1001:1001:,,,:/home/git:/bin/bash
改为:
git:x:1001:1001:,,,:/home/git:/usr/bin/git-shell
这样,git
用户可以正常通过ssh使用git,但无法登录shell,因为我们为git
用户指定的git-shell
每次一登录就自动退出。