Amazon cover image
Image from Amazon.com

Gitolite Essentials.

By: Material type: TextTextSeries: Community experience distilledPublication details: Packt Publishing, 2014.Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1306640245
  • 9781306640244
  • 9781783282388
  • 178328238X
  • 9781783282371
  • 1783282371
Subject(s): Genre/Form: Additional physical formats: Print version:: No titleDDC classification:
  • 004.2934
LOC classification:
  • QA76.73.K67 .C384 2014
Online resources:
Contents:
Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Getting Started with Gitolite; Common Access Control needs; Access Control example with Gitolite; Sampling of Gitolite's power features; Creating groups; Personal branches; Personal repositories; Gitolite and the Git control flow; Trying out Gitolite; Preparing for the setup; Installing and setting up a test instance; Playing with Gitolite; Summary; Installing Gitolite; Gitolite users and the hosting user; Distinguishing users from each other; Preparing the server.
Getting the Gitolite sourceInstalling the code; Setting up Gitolite; Creating an ssh key pair; Running the setup command; Checking over your new Gitolite server; Adding a user; Adding a repository; Summary; Your Users and Gitolite; Accessing Git repositories; Git servers, SSH, and HTTP; Accessing Gitolite repositories; SSH key pairs; Repository naming; Getting information from Gitolite; Gitolite commands; Getting help for commands; Troubleshooting SSH issues; Authorization, not authentication; Duplicate public keys; Diagnosing public key problems; SSH best practice; Summary.
Adding and Removing UsersAdding users; Behind the scenes; Users with multiple key pairs; Giving some users a shell; Managing keys outside Gitolite; Getting user group information from LDAP; Removing users; Summary; Managing Repositories; Adding repositories; Adding existing repositories; Common problems and troubleshooting; Ownership and permissions; Converting a non-bare repository to a bare repository; Gitolite and the update hook; Summary; Getting Started with Access Control; Basic access control examples; Basic branch level access control; Lexical syntax of the conf file.
The syntax of access control rulesBranch level access control and refexes; Using deny rules; The permission field; Defining user and repo groups; Working with large groups; The special @all group; The include statement; Rule accumulation and delegation; Summary; Advanced Access Control and Configuration; Making changes to the rc file; Giving users their own branches; Types of write operations; Allowing Gitweb and Git-daemon access; Locating the projects list file; Unix permissions and the umask; Specifying Git config values and Gitolite options; Deleting a git-config key.
Substituting the repository nameOverriding config values; Gitolite options; Applying deny rules to read access; Understanding VREFs; Summary; Allowing Users to Create Repos; Putting repositories in Sub-directories; Repository wildcards; Creating a wildcard repository; Giving access to other users; Generalizing the ruleset; Explaining wild repos to your users; Managing with just wild repos; Deleting wild repositories; Summary; Customizing Gitolite; Core and non-core Gitolite; Types of non-core code and examples; Commands; Syntactic sugar; Triggers; Virtual refs; Writing your own non-core code.
Summary: The book is written to suit an easy-reading style, using typical problems in access control to illustrate the need for each Gitolite feature explained. This book is for system administrators or development managers who need to keep a lid on Git-based development workflows. Basic knowledge of Git as well as of the Unix shell is helpful.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Print version record.

The book is written to suit an easy-reading style, using typical problems in access control to illustrate the need for each Gitolite feature explained. This book is for system administrators or development managers who need to keep a lid on Git-based development workflows. Basic knowledge of Git as well as of the Unix shell is helpful.

Includes bibliographical references and index.

Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Getting Started with Gitolite; Common Access Control needs; Access Control example with Gitolite; Sampling of Gitolite's power features; Creating groups; Personal branches; Personal repositories; Gitolite and the Git control flow; Trying out Gitolite; Preparing for the setup; Installing and setting up a test instance; Playing with Gitolite; Summary; Installing Gitolite; Gitolite users and the hosting user; Distinguishing users from each other; Preparing the server.

Getting the Gitolite sourceInstalling the code; Setting up Gitolite; Creating an ssh key pair; Running the setup command; Checking over your new Gitolite server; Adding a user; Adding a repository; Summary; Your Users and Gitolite; Accessing Git repositories; Git servers, SSH, and HTTP; Accessing Gitolite repositories; SSH key pairs; Repository naming; Getting information from Gitolite; Gitolite commands; Getting help for commands; Troubleshooting SSH issues; Authorization, not authentication; Duplicate public keys; Diagnosing public key problems; SSH best practice; Summary.

Adding and Removing UsersAdding users; Behind the scenes; Users with multiple key pairs; Giving some users a shell; Managing keys outside Gitolite; Getting user group information from LDAP; Removing users; Summary; Managing Repositories; Adding repositories; Adding existing repositories; Common problems and troubleshooting; Ownership and permissions; Converting a non-bare repository to a bare repository; Gitolite and the update hook; Summary; Getting Started with Access Control; Basic access control examples; Basic branch level access control; Lexical syntax of the conf file.

The syntax of access control rulesBranch level access control and refexes; Using deny rules; The permission field; Defining user and repo groups; Working with large groups; The special @all group; The include statement; Rule accumulation and delegation; Summary; Advanced Access Control and Configuration; Making changes to the rc file; Giving users their own branches; Types of write operations; Allowing Gitweb and Git-daemon access; Locating the projects list file; Unix permissions and the umask; Specifying Git config values and Gitolite options; Deleting a git-config key.

Substituting the repository nameOverriding config values; Gitolite options; Applying deny rules to read access; Understanding VREFs; Summary; Allowing Users to Create Repos; Putting repositories in Sub-directories; Repository wildcards; Creating a wildcard repository; Giving access to other users; Generalizing the ruleset; Explaining wild repos to your users; Managing with just wild repos; Deleting wild repositories; Summary; Customizing Gitolite; Core and non-core Gitolite; Types of non-core code and examples; Commands; Syntactic sugar; Triggers; Virtual refs; Writing your own non-core code.

English.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library