Summary

This chapter showed you how to add your own repositories, and told you about some common problems that may occur when bringing in existing repositories in to Gitolite's control. The previous chapter has already covered adding users, so we are now ready to start looking at access control. Access control is the reason Gitolite exists, and the next chapter will (finally!) show you some basic access control syntax, rules, and other details.

Get Gitolite Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.