You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

administration.mkd 9.1KB

11 years ago
11 years ago
11 years ago
10 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200
  1. ## Gitblit Configuration
  2. ### Administering Repositories
  3. Repositories can be created, edited, renamed, and deleted through the web UI. They may also be created, edited, and deleted from the command-line using real [Git](http://git-scm.com) or your favorite file manager and text editor.
  4. All repository settings are stored within the repository `.git/config` file under the *gitblit* section.
  5. [gitblit]
  6. description = master repository
  7. owner = james
  8. useTickets = false
  9. useDocs = true
  10. showRemoteBranches = false
  11. accessRestriction = clone
  12. isFrozen = false
  13. showReadme = false
  14. federationStrategy = FEDERATE_THIS
  15. isFederated = false
  16. skipSizeCalculation = false
  17. federationSets =
  18. #### Repository Names
  19. Repository names must be case-insensitive-unique but are CASE-SENSITIVE ON CASE-SENSITIVE FILESYSTEMS. The name must be composed of letters, digits, or `/ _ - . ~ +`<br/>
  20. Whitespace is illegal.
  21. Repositories can be grouped within subfolders. e.g. *libraries/mycoollib.git* and *libraries/myotherlib.git*
  22. All repositories created with Gitblit are *bare* and will automatically have *.git* appended to the name at creation time, if not already specified.
  23. #### Repository Owner
  24. The *Repository Owner* has the special permission of being able to edit a repository through the web UI. The Repository Owner is not permitted to rename the repository, delete the repository, or reassign ownership to another user.
  25. ### Access Restrictions and Access Permissions
  26. ![permissions matrix](permissions_matrix.png "Permissions and Restrictions")
  27. #### Discrete Permissions (Gitblit v1.2.0+)
  28. Since v1.2.0, Gitblit supports more discrete permissions. While Gitblit does not offer a built-in solution for branch-based permissions like Gitolite, it does allow for the following repository access permissions:
  29. - **V** (view in web ui, RSS feeds, download zip)
  30. - **R** (clone)
  31. - **RW** (clone and push)
  32. - **RWC** (clone and push with ref creation)
  33. - **RWD** (clone and push with ref creation, deletion)
  34. - **RW+** (clone and push with ref creation, deletion, rewind)
  35. These permission codes are combined with the repository path to create a user permission:
  36. RW:mygroup/myrepo.git
  37. **NOTE:**
  38. The following repository permissions are equivalent:
  39. - myrepo.git
  40. - RW+:myrepo.git
  41. This is to preserve backwards-compatibility with Gitblit <= 1.1.0 which granted rewind power to all access-permitted users.
  42. #### Discrete Permissions with Regex Matching (Gitblit v1.2.0+)
  43. Gitblit also supports *case-insensitive* regex matching for repository permissions. The following permission grants push privileges to all repositories in the *mygroup* folder.
  44. RW:mygroup/.*
  45. ##### Exclusions
  46. When using regex matching it may also be useful to exclude specific repositories or to exclude regex repository matches. You may specify the **X** permission for exclusion. The following example grants clone permission to all repositories except the repositories in mygroup. The user/team will have no access whatsoever to these repositories.
  47. X:mygroup/.*
  48. R:.*
  49. ##### Order is Important
  50. The preceding example should suggest that order of permissions is important with regex matching. Here are the rules for determining the permission that is applied to a repository request:
  51. 1. If the user is an admin or repository owner, then RW+
  52. 2. Else if user has an explicit permission, use that
  53. 3. Else check for the first regex match in user permissions
  54. 4. Else check for the HIGHEST permission from team memberships
  55. 1. If the team is an admin team, then RW+
  56. 2. Else if a team has an explicit permission, use that
  57. 3. Else check for the first regex match in team permissions
  58. #### No-So-Discrete Permissions (Gitblit &lt;= v1.1.0)
  59. Prior to v1.2.0, Gitblit has two main access permission groupings:
  60. 1. what you are permitted to do as an anonymous user
  61. 2. **RW+** for any permitted user
  62. #### Committer Verification
  63. You may optionally enable committer verification which requires that each commit be committed by the authenticated user pushing the commits. i.e. If Bob is pushing the commits, Bob **must** be the committer of those commits.
  64. **How is this enforced?**
  65. Bob must properly set his *user.name* and *user.email* values for the repository to match his Gitblit user account **BEFORE** committing to his repository.
  66. ```
  67. [user "bob"]
  68. displayName = Bob Jones
  69. emailAddress = bob@somewhere.com
  70. ```
  71. git config user.name "Bob Jones"
  72. git config user.email bob@somewhere.com
  73. or
  74. git config user.name bob
  75. git config user.email bob@somewhere.com
  76. The committer email address is required to be identical. Display name or username can be used as the committer name.
  77. All checks are case-insensitive.
  78. **What about merges?**
  79. You can not use fast-forward merges on your client when using committer verification. You must specify *--no-ff* to ensure that a merge commit is created with your identity as the committer. Only the first/left parent chain is traversed when verifying commits.
  80. #### Reflog
  81. Gitblit v1.2.1 introduced an incomplete reflog mechanism which was completed in 1.3.0. All pushes to Gitblit are automatically logged on an orphan branch, `refs/meta/gitblit/reflog`. If this ref exists, the reflog page link will be displayed on the repository pages.
  82. This reflog is similar to, but not the same as, the normal Git reflog. The Gitblit reflog links Gitblit accounts to ref changes and because it is stored on an orphan branch, the reflog is portable by the federation mechanism or by a normal <code>git clone --mirror</code> command.
  83. ### Teams
  84. Teams have assigned users and assigned repositories. A user can be a member of multiple teams and a repository may belong to multiple teams. This allows the administrator to quickly add a user to a team without having to keep track of all the appropriate repositories.
  85. ### Administering Users
  86. All users and permissions are stored in the `users.conf` file. Your file extension must be *.conf* in order to use this user service.
  87. The `users.conf` file uses a Git-style configuration format:
  88. [user "admin"]
  89. password = admin
  90. role = "#admin"
  91. role = "#notfederated"
  92. repository = RW+:repo1.git
  93. repository = RW+:repo2.git
  94. [user "hannibal"]
  95. password = bossman
  96. repository = RWD:topsecret.git
  97. repository = RW+:ateam/[A-Za-z0-9-~_\\./]+
  98. [user "faceman"]
  99. password = vanity
  100. [user "murdock"]
  101. password = crazy
  102. [user "babaracus"]
  103. password = grrrr
  104. [team "ateam"]
  105. user = hannibal
  106. user = faceman
  107. user = murdock
  108. user = babaracus
  109. repository = RW:topsecret.git
  110. mailingList = list@ateam.org
  111. postReceiveScript = sendmail
  112. The `users.conf` file allows flexibility for adding new fields to a UserModel object without imposing the complexity of relying on an embedded SQL database.
  113. ### Usernames
  114. Usernames must be unique and are case-insensitive.
  115. Whitespace is illegal.
  116. ### Passwords
  117. User passwords are CASE-SENSITIVE and may be *plain*, *md5*, or *combined-md5* formatted (see `gitblit.properties` -> *realm.passwordStorage*).
  118. ### User Roles
  119. There are four actual *roles* in Gitblit:
  120. - *#admin*, which grants administrative powers to that user for all repositories, users, and teams
  121. - *#notfederated*, which prevents an account from being pulled by another Gitblit instance
  122. - *#create*, which allows the user the power to create personal repositories
  123. - *#fork*, which allows the user to create a personal fork of an existing Gitblit-hosted repository
  124. ### Personal Repositories & Forks
  125. Personal Repositories and Forks are related but are controlled individually.
  126. #### Creating a Personal Repository
  127. A user may be granted the power to create personal repositories by specifying the *#create* role through the web ui or through the RPC mechanism via the Gitblit Manager. Personal repositories are exactly like common/shared repositories except that the owner has a few additional administrative powers for that repository, like rename and delete.
  128. #### Creating a Fork
  129. A user may also be granted the power to fork an existing repository hosted on your Gitblit server to their own personal clone by specifying the *#fork* role through the web ui or via the Gitblit Manager.
  130. Forks are mostly likely personal repositories or common/shared repositories except for two important differences:
  131. 1. Forks inherit a view/clone access list from the origin repository.
  132. i.e. if Team A has clone access to the origin repository, then by default Team A also has clone access to the fork. This is to facilitate collaboration.
  133. 2. Forks are always listed in the fork network, regardless of any access restriction set on the fork.
  134. In other words, if you fork *RepoA.git* to *~me/RepoA.git* and then set the access restriction of *~me/RepoA.git* to *Authenticated View, Clone, & Push* your fork will still be listed in the fork network for *RepoA.git*.
  135. If you really must have an invisible fork, the clone it locally, create a new personal repository for your invisible fork, and push it back to that personal repository.