search for: gitolites

Displaying 20 results from an estimated 37 matches for "gitolites".

Did you mean: gitolite
2016 Jun 22
0
Problem executing VM backups
Hi everyone, we are suddenly having a problem with executing our backup jobs. For a long time, we have used a shell script which contains the following code to backup all our virtual machines: for domain in Testserver Faktura Fileserver Gitolite Jenkins Nexus SimpleHelp VpnGateway Wiki; do echo -n "$(date +"%Y-%m-%d %H:%M:%S") starting backup for vm
2013 Jan 19
0
Cannot get eth0 to work on libvirt-lxc
I'm trying to get an Archlinux guest running on a Archlinux host. Everything works except ethernet. When I boot the host, --- # dmesg |tail [ 8.265493] Bridge firewalling registered [ 8.514547] IPv6: ADDRCONF(NETDEV_UP): virbr0: link is not ready [ 8.645303] ip6_tables: (C) 2000-2006 Netfilter Core Team --- Then I do --- # virsh -c lxc:/// start gitolite Domain gitolite started #
2013 Aug 18
1
Extracting client certificate information
When using client certificate authentication, is there any way to extract the key ID from the certificate in a force command on the server? I would like to be able to configure Gitolite [1] with a certificate authority key and then use the key ID as the Gitolite user ID when a client connects. Currently I can achieve the same effect by embedding the username in a "force-command"
2013 Nov 01
1
Dynamic Environments, r10k, gitolite and Non-environment Puppet Config
Hi all, Apologies if this has been dealt with before, but I haven''t managed to find an answer yet. I have a working "dynamic environments" setup: * A gitolite repository (on a dedicated host) with multiple branches - one for each environment. * I use r10k ro deploy the environments on the master to $confdir/environments/$::environment. This all works *really* well, but I
2016 Mar 11
2
OpenSSH Security Advisory: xauth command injection
Nico Kadel-Garcia <nkadel at gmail.com> writes: > Dag-Erling Sm?rgrav <des at des.no> writes: > > Some OS distributions (FreeBSD, RHEL / CentOS, probably Fedora) have > > X11Forwarding enabled by default. > I'm not sure I see your point. With X11Forwarding off by default, one would assume that it is only enabled on a case-by-case basis for users or groups who
2010 Jun 17
0
Help ME, Please
I want to login in remote server, git server, with two accounts (mars and gitolite) without password. e.g. (steps) 1. ssh-keygen? # no password 2. scp .ssh/id_rsa.pub gitolite at gitserver:/tmp/ 3. ssh gitolite at gitserve 4. cat /tmp/id_rsa.pub >> .ssh/authorized_keys 5. exit Then, do : ssh gitolite at gitserver ls But error message occurs:? Permission denied
2015 Feb 21
4
[Bug 2358] New: allow sshd to "redirect" to another local user
...vhosting: Match User git LocalAddress 11.22.33.44 User git-a Match User git LocalAddress 11.22.33.55 User git-b So one would have e.g. two domains, pointing to different IPs, which however both go to the same physical host (and thus sshd). In that example it would be desired, that the two git/gitolites are completely separate, i.e. no shared "usernames" (which they implement via ssh keys), no shared repositories between the two domains and so on. Right now, one would need two different user accounts for this, and two different git/gitolite installations. But this in turn "breaks&q...
2013 Jun 09
1
pass fingerprint to authorizedkeyscommand
Hi guys, It might be nice if AuthorizedKeysCommand would receive the fingerprint of the offered key as an argument, so that programs like gitolite could implement more refined key-based identity lookup that offers better performance than AuthorizedKeysFile's linear scan. The following patch is untested but is the basic idea: diff -ru openssh-6.2p1/auth2-pubkey.c
2014 Dec 28
2
pubkey fingerprint and krb princ name in environment
Hey, I use gitolite for git hosting on my server, and because I want to use kerberos authentication I patched OpenSSH to put the name of the kerberos principal name or the ssh fingerprint as environment variables so my ForceCommand script can use them to actually authorize the user by the principal/fingerprint. It?s a bit annoying to keep my own patch and I thought it might be something
2013 Jan 16
5
[Bug 2063] New: RFE: export principal which was used for .k5login
https://bugzilla.mindrot.org/show_bug.cgi?id=2063 Bug ID: 2063 Summary: RFE: export principal which was used for .k5login Classification: Unclassified Product: Portable OpenSSH Version: 6.1p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component:
2015 Nov 17
4
[Bug 2496] New: sshd hangs when using AuthorizedKeysCommand
https://bugzilla.mindrot.org/show_bug.cgi?id=2496 Bug ID: 2496 Summary: sshd hangs when using AuthorizedKeysCommand Product: Portable OpenSSH Version: 7.1p1 Hardware: amd64 OS: FreeBSD Status: NEW Severity: normal Priority: P5 Component: sshd Assignee: unassigned-bugs at
2015 Feb 20
18
[Bug 2355] New: general protection / segfaults when PermitOpen=none
https://bugzilla.mindrot.org/show_bug.cgi?id=2355 Bug ID: 2355 Summary: general protection / segfaults when PermitOpen=none Product: Portable OpenSSH Version: 6.7p1 Hardware: amd64 OS: Linux Status: NEW Severity: major Priority: P5 Component: sshd Assignee: unassigned-bugs at
2016 Feb 25
2
RFC: Move the test-suite LLVM project to GitHub?
Am 25.02.2016 um 14:41 schrieb Renato Golin: > On 25 February 2016 at 12:46, Joachim Durchholz via llvm-dev >> What workflow are you comparing this to, if a pull request is a penalty? > > Today, 100s of people commit directly. Ah. I wasn't aware of that, I thought LLVM had a gatekeeper model. > In a GitHub style, 100s of > people will have to wait for a merge from a few
2016 Feb 25
0
RFC: Move the test-suite LLVM project to GitHub?
On 25 February 2016 at 15:01, Joachim Durchholz via llvm-dev <llvm-dev at lists.llvm.org> wrote: > Well, PRs are a good way to discuss proposed patches, so you can take the > discussion there. Particularly if the git hoster gives you all the web forum > thingies you want, including the ability to be helpful with Markdown. > Also, a PR is easy to integrate once it's done.
2015 Feb 06
2
Re: Creating users "on - the - fly"
This is a good suggestion - and maybe I'm not totally clear on the restrictions... So - in these situations gitolite will actually append things to your authorized_keys file. Which can get very long. And after a while - it gets *very* long. I think I saw comments that it should be limited to about 20k or so. And around 20k the look up times are in the seconds. So that wouldn't be enough
2015 Feb 06
4
Creating users "on - the - fly"
I guess I didn't want to litter the users table either - it just seems "wrong" to be actually adding things to the host when it is really so transient. It feels like it should be LDAP-ish. Just ask the server for the keys and do a one-off authentication. But I've seen even LDAP creates the user directories. I see that 2.6 kernels can have some 4B users, which should last me a
2016 Feb 25
2
RFC: Move the test-suite LLVM project to GitHub?
Am 25.02.2016 um 12:33 schrieb Renato Golin via llvm-dev: > Kristof, Chandler, > > I think most of the responses seem favourable of the move, the > concerns being which Git repo we'll use (GitHub, GitLab, BitBucket), > but they're essentially identical on the git side. I'm repeating myself but not they are not identical on the git side. Not for people without push
2016 Mar 11
2
OpenSSH Security Advisory: xauth command injection
Nico Kadel-Garcia <nkadel at gmail.com> writes: > I'm just trying to figure out under what normal circumstances a > connection with X11 forwarding enabled wouldn't be owned by a user who > already has normal system privileges for ssh, sftp, and scp access. Some OS distributions (FreeBSD, RHEL / CentOS, probably Fedora) have X11Forwarding enabled by default. DES --
2010 Jan 23
0
Git: help sought
I have a project using Git on machine A. I'm running a Centos server on machine B. I'd like to "publish" the project on machine B (mainly for my own use, so I can access it from various sites). I've asked about this on a Git mailing list, but haven't understood the replies. In particular, a couple of people suggested gitolite, but when I examined this I couldn't make
2012 Apr 06
1
Feature request config entry for `-T'
Hi, AFAICT, there is no .ssh/config option for disabling pseudo-tty allocation. It would be nice to have one. Context: we're using gitolite in our project, and it sets things up to run a command with "no-pty". Every once in a while, users will try to ssh to the machine to see that things are working, and when they see the "PTY allocation request failed on channel 0"