X2Go Bug report logs - #242
Provide HTTP access to git repository

Package: git.x2go.org; Maintainer for git.x2go.org is git-admin@x2go.org;

Reported by: Heinrich Schuchardt <xypron.glpk@gmx.de>

Date: Sun, 16 Jun 2013 14:48:02 UTC

Severity: wishlist

Done: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>

Bug is archived. No further changes may be made.

Full log


Message #5 received at submit@bugs.x2go.org (full text, mbox, reply):

Received: (at submit) by bugs.x2go.org; 16 Jun 2013 14:40:18 +0000
From xypron.glpk@gmx.de  Sun Jun 16 16:40:18 2013
X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=0.0 required=5.0 tests=FREEMAIL_FROM,
	RCVD_IN_DNSWL_BLOCKED,URIBL_BLOCKED autolearn=ham version=3.3.2
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22])
	by ymir (Postfix) with ESMTP id 1EAEA5DB17
	for <submit@bugs.x2go.org>; Sun, 16 Jun 2013 16:40:18 +0200 (CEST)
Received: from mailout-de.gmx.net ([10.1.76.33]) by mrigmx.server.lan
 (mrigmx001) with ESMTP (Nemesis) id 0M1Cbu-1UUDIv2SxU-00tEhO for
 <submit@bugs.x2go.org>; Sun, 16 Jun 2013 16:40:17 +0200
Received: (qmail invoked by alias); 16 Jun 2013 14:40:17 -0000
Received: from ip-109-90-96-202.unitymediagroup.de (EHLO [192.168.123.29]) [109.90.96.202]
  by mail.gmx.net (mp033) with SMTP; 16 Jun 2013 16:40:17 +0200
X-Authenticated: #41704822
X-Provags-ID: V01U2FsdGVkX19HUzhlJINHExe8YJgZnq9EpzphRBysU2JjuqxZl6
	RF4Jfz1kX2ZNHR
Message-ID: <51BDCE4B.9010001@gmx.de>
Date: Sun, 16 Jun 2013 16:40:11 +0200
From: Heinrich Schuchardt <xypron.glpk@gmx.de>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:10.0.12) Gecko/20130116 Icedove/10.0.12
MIME-Version: 1.0
To: submit@bugs.x2go.org
Subject: Provide HTTP access to git repository
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Y-GMX-Trusted: 0
Package: git.x2go.org
Severity: wishlist

Dear maintainer,

the X2GO repository can be reached via the following protocols:
ssh, port 22
git, port 9118

Unfortunately these ports may not be reachable from behind a firewall.

Please, setup your webserver to allow access to the repositories via 
https or http.

For Apache this can be done with

# Indicate were the git repositories are located.
SetEnv GIT_PROJECT_ROOT /home/git/root

# Indicate git-daemon-export-ok is not needed.
SetEnv GIT_HTTP_EXPORT_ALL

# Location of git backend
ScriptAlias /git /usr/lib/git-core/git-http-backend

# Disallow pushing to repository via HTTP.
<LocationMatch "^/git/.*/git-receive-pack$">
  Order allow,deny
  Deny from all
</LocationMatch>

Best regards

Heinrich Schuchardt


Send a report that this bug log contains spam.


X2Go Developers <owner@bugs.x2go.org>. Last modified: Mon Nov 25 01:22:36 2024; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.