TY - BOOK AU - Chamarty,Sitaram TI - Gitolite Essentials T2 - Community experience distilled SN - 1306640245 AV - QA76.73.K67 .C384 2014 U1 - 004.2934 PY - 2014/// PB - Packt Publishing KW - Git (Computer file) KW - fast KW - Open source software KW - Software engineering KW - Logiciels libres KW - GĂ©nie logiciel KW - COMPUTERS KW - Computer Literacy KW - bisacsh KW - Computer Science KW - Data Processing KW - Hardware KW - General KW - Information Technology KW - Machine Theory KW - Reference KW - Electronic books N1 - Includes bibliographical references and index; Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Getting Started with Gitolite; Common Access Control needs; Access Control example with Gitolite; Sampling of Gitolite's power features; Creating groups; Personal branches; Personal repositories; Gitolite and the Git control flow; Trying out Gitolite; Preparing for the setup; Installing and setting up a test instance; Playing with Gitolite; Summary; Installing Gitolite; Gitolite users and the hosting user; Distinguishing users from each other; Preparing the server; Getting the Gitolite sourceInstalling the code; Setting up Gitolite; Creating an ssh key pair; Running the setup command; Checking over your new Gitolite server; Adding a user; Adding a repository; Summary; Your Users and Gitolite; Accessing Git repositories; Git servers, SSH, and HTTP; Accessing Gitolite repositories; SSH key pairs; Repository naming; Getting information from Gitolite; Gitolite commands; Getting help for commands; Troubleshooting SSH issues; Authorization, not authentication; Duplicate public keys; Diagnosing public key problems; SSH best practice; Summary; Adding and Removing UsersAdding users; Behind the scenes; Users with multiple key pairs; Giving some users a shell; Managing keys outside Gitolite; Getting user group information from LDAP; Removing users; Summary; Managing Repositories; Adding repositories; Adding existing repositories; Common problems and troubleshooting; Ownership and permissions; Converting a non-bare repository to a bare repository; Gitolite and the update hook; Summary; Getting Started with Access Control; Basic access control examples; Basic branch level access control; Lexical syntax of the conf file; The syntax of access control rulesBranch level access control and refexes; Using deny rules; The permission field; Defining user and repo groups; Working with large groups; The special @all group; The include statement; Rule accumulation and delegation; Summary; Advanced Access Control and Configuration; Making changes to the rc file; Giving users their own branches; Types of write operations; Allowing Gitweb and Git-daemon access; Locating the projects list file; Unix permissions and the umask; Specifying Git config values and Gitolite options; Deleting a git-config key; Substituting the repository nameOverriding config values; Gitolite options; Applying deny rules to read access; Understanding VREFs; Summary; Allowing Users to Create Repos; Putting repositories in Sub-directories; Repository wildcards; Creating a wildcard repository; Giving access to other users; Generalizing the ruleset; Explaining wild repos to your users; Managing with just wild repos; Deleting wild repositories; Summary; Customizing Gitolite; Core and non-core Gitolite; Types of non-core code and examples; Commands; Syntactic sugar; Triggers; Virtual refs; Writing your own non-core code N2 - The book is written to suit an easy-reading style, using typical problems in access control to illustrate the need for each Gitolite feature explained. This book is for system administrators or development managers who need to keep a lid on Git-based development workflows. Basic knowledge of Git as well as of the Unix shell is helpful UR - https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=759788 ER -