Gitolite allows you to host Git repositories easily and securely.
It is also available on github, where you can find the last update.
Add a user
# useradd -m -U -r -s /bin/bash -d /srv/git git # su - git $ gitolite setup -pk id_rsa.pub
Add to your work-machine's ~/.ssh/config:
Host server HostName 192.168.12.2 User git ### IdentityFile specifies the private ssh-key Identityfile ~/.ssh/id_rsa
Do NOT add repos or users directly on the server! You MUST manage the server by cloning the special 'gitolite-admin' repo on your workstation:
$ git clone server:gitolite-admin
Ask each user who will get access to send you a public key. On their workstation generate the pair of ssh keys:
Rename each public key according to the user's name, with a .pub extension, like sitaram.pub or john-smith.pub. You can also use periods and underscores. Have the users send you the keys.
Copy all these *.pub files to keydir in your gitolite-admin repo clone. You can also organise them into various subdirectories of keydir if you wish, since the entire tree is searched.
Edit the config file (conf/gitolite.conf in your admin repo clone). See the gitolite.conf documentation (http://sitaramc.github.com/gitolite/admin.html#conf) for details on what goes in that file, syntax, etc. Just add new repos as needed, and add new users and give them permissions as required. The users names should be exactly the same as their keyfile names, but without the .pub extension
$ nano conf/gitolite.conf
Commit and push the changes them:
git commit -a git push
If you want to distinguish users with the same login (like username@server1, username@server2) you may want to do the following (for gitolite-3.04-1):
- edit /usr/lib/gitolite/triggers/post-compile/ssh-authkeys and replace
$user =~ s/(\@[^.]+)?\.pub$//; # baz.pub, email@example.com -> baz
$user =~ s/\.pub$//; # firstname.lastname@example.org -> baz@home
- update authorized_keys file (for example, by pushing into gitolite-admin repo)