Gitolite
Gitolite allows you to host Git repositories easily and securely.
Contents
Installation
gitolite is available in the Arch User Repository, but installation is easier when done manually via the Git repository on GitHub.
Configuration
- Installing Git from pacman should automatically add a "git" user to the system. If not, create a new user named "git":
# useradd -m -U -r -d /srv/git -s /bin/bash git
- Edit /etc/passwd and make sure the git user's home is
/srv/git
ssh access
- Make sure
/srv/git
exists and is owned bygit:git
.
# sudo install -o git -g git -d /srv/git
- Copy *your* SSH public key to /srv/git/<your_username>.pub
# sudo cp ~/.ssh/id_rsa.pub /srv/git/<your_username>.pub
- Run the Gitolite setup script as git. Substitute your own admin username below.
# sudo su - git $ cd /srv/git $ rm -f .ssh/authorized_keys $ HOME=/srv/git gitolite setup -pk <your_username>.pub $ chmod a-x .ssh/authorized_keys $ logout
You can now remove the SSH public key you copied:
# sudo rm /srv/git/<your_username>.pub
Do NOT add repositories or users directly on the server! You MUST manage the server by cloning the special gitolite-admin repository on your workstation:
$ git clone <your_server_hostname>:gitolite-admin
See Gitolite
Adding http(s) access via Apache (with basic authentication)
- We need to create an suEXEC wrapper script. To satisfy suEXEC's security requirements, the script and the directory containing it must be owned by git:git and below
/srv/http
in the directory hierarchy. For this example, we create the directory as/srv/http/git/cgi-bin
.
# sudo install -o git -g git -d /srv/http/git/cgi-bin
- Create an suEXEC wrapper for the gitolite shell with the contents below. For this example, we create it as
/srv/http/git/cgi-bin/gitolite-suexec-wrapper
.
#!/usr/bin/bash # # suEXEC wrapper for gitolite-shell # export GIT_PROJECT_ROOT=/srv/git/repositories export GITOLITE_HTTP_HOME=/srv/git exec /usr/lib/gitolite/gitolite-shell
- Make the wrapper executable and owned by git:git.
# sudo chown git:git /srv/http/git/cgi-bin/gitolite-suexec-wrapper # sudo chmod 0755 /srv/http/git/cgi-bin/gitolite-suexec-wrapper
- Create an empty password database file, owned by
git:http
# sudo install -o git -g http -m 0640 /dev/null /srv/http/git/htpasswd
- Apache's basic authentication mechanism is separate from ssh, and therefore requires a separate set of credentials. Create your web users using
htpasswd
.
# sudo htpasswd /srv/http/git/htpasswd <your_username>
- Add the following to your Apache vhost configuration:
SuexecUserGroup git git ScriptAlias /git/ /srv/http/git/cgi-bin/gitolite-suexec-wrapper/ <Directory /srv/http/git/cgi-bin> Require all granted </Directory> <Location /git> AuthType Basic AuthName "Git Access" AuthBasicProvider file AuthUserFile /srv/http/git/htpasswd Require valid-user </Location>
- Reload Apache.
# sudo systemctl reload httpd
- Finally, in the gitolite-admin repository you cloned in the previous section, edit
conf/gitolite.conf
, add anR = daemon
access rule to all repositories you want to make available via http, and push the changes.
Add users
ssh users
Ask each user who will get access to send you a public key. On their workstation generate the pair of ssh keys:
$ ssh-keygen
Rename each public key according to the user's name, with a .pub extension, like sitaram.pub or john-smith.pub. You can also use periods and underscores. Have the users send you the keys.
Copy all these *.pub files to keydir in your gitolite-admin repo clone. You can also organise them into various subdirectories of keydir if you wish, since the entire tree is searched.
Edit the config file (conf/gitolite.conf in your admin repo clone). See the gitolite.conf documentation (http://sitaramc.github.com/gitolite/admin.html#conf) for details on what goes in that file, syntax, etc. Just add new repos as needed, and add new users and give them permissions as required. The users names should be exactly the same as their keyfile names, but without the .pub extension
$ nano conf/gitolite.conf
Commit and push the changes them:
git commit -a git push
http(s) users
User management for http(s) is more suitable for single-user setups. To add a new user or to change an existing user's password:
# sudo htpasswd /srv/http/git/htpasswd <username>
Gitosis-like ssh usernames
If you want to distinguish users with the same login (like username@server1, username@server2) you may want to do the following (for gitolite-3.04-1):
- edit
/usr/lib/gitolite/triggers/post-compile/ssh-authkeys
and replace
$user =~ s/(\@[^.]+)?\.pub$//; # baz.pub, baz@home.pub -> baz
by
$user =~ s/\.pub$//; # baz@home.pub -> baz@home
- update authorized_keys file (for example, by pushing into the gitolite-admin repository)