Gitano is a git server providing user separation with ssh keys or passwords with access rules defined in customisable ACLs and maximally sandboxed hooks written in Lua with this configuration stored in git repositories for both global and per-repository configuration with additional server-side commands for easier administration accessible over the git, http and ssh transport protocols.
…is a git server providing user separation with ssh keys or passwords…
Git servers implement the
when accessed over ssh,
handle requests to
when accessed over http,
and the bespoke protocol of the git transport.
Gitano implements the ssh interface by generating a
for all the permitted ssh keys
that specifies a proxy command that is told which user the key belonged to,
and which determines if the user is permitted to run the requested command
before running the appropriate git operation.
Gitano implements the http interface by providing
which the system administrator configures their web server to run,
and which authenticates the user based on a generated htpasswd file,
then determines whether the authenticated user is permitted to run the service,
before handing it off to
Gitano supports the git interface by generating
for every repository that the anonymous user is permitted to read.
The protocol implementation is left to the
which is built into
…access rules defined as customisable ACLs…
All Gitano commands consult ACLs written in lace to determine whether the operation is permitted.
Existing git operations have ACLs applied by a hook installed by Gitano.
This allows a Gitano administrator to define rules that permit delegation of roles to different users.
If those roles are defined by group membership and the ability to add a user to a group is delegated then the permission to grant permissions can also be delegated.
…maximally sandboxed hooks written in Lua…
In addition to installing hooks to provide ACL checking for git operations, these hooks will also run hook code, written in Lua, in a supple sandbox, such that it is safe to run semi-trusted code contributed by users for purposes such as notifying web services of a repository update.
…configuration stored in git for global and per-repository configuration…
Gitano reads the majority of its configuration
from the master branch of the
in the set of repositories it manages access to.
For operations performed on a specific repository
it reads configuration from that repository's
ACLs stored in
gitano-admin.git are supplemented from
so users may add their own access restrictions.
Any hooks defined in
gitano-admin.git (i.e. a global hook) get called
with a per-repo hook as a parameter if defined in
so the global hook may decide whether to suppress or call the per-repo hook.
If a global hook is not defined then per-repo hooks are called if defined.
Users, their ssh keys, groups and GPG keys
are only loaded from the
By putting the configuration of Gitano in repositories managed by Gitano it is easy to make a backup of configuration with the data by mirroring the repository content. Configuration gains the same traceability guarantees as git history and can be access controlled with the same mechanism as the data.
…server side commands for easier administration…
Management of git repositories isn't naturally part of the git protocol, so commands for creating and deleting repositories need to be added so that you don't need a shell account on the machine to manage repositories.
Additionally operations that may be performed
by making changes to the
may also be done with the command-line,
which is significantly quicker and more scriptable than pushing changes.