How do programs like gitolite work?

后端 未结 3 1306
-上瘾入骨i
-上瘾入骨i 2020-11-22 04:35

I am curious as to how programs such as gitolite work -- specifically how do they interact with the SSH protocol to provide a tailored experience. Can somebody provide an ex

3条回答
  •  一整个雨季
    2020-11-22 05:04

    The basic steps are:

    1. Check the public key of the person trying to log in
    2. Map the public key to an access control list

    In other words, for these things to work, you have to get public keys from the users and then generate a list (file, database, whatever) that pairs a key to a user and permissions.

提交回复
热议问题