git-http-backend和ldap身份validation,推送错误:请求的URL返回错误:401授权必需

我的设置:

操作系统:debian
git v 1.7.10
apache(与suexec模式启用)configuration与git-http-backend和ldap授权git回购wchich工作克隆操作,但不工作推,这就是问题所在。 我使用https作为通信协议到我的git服务器。
这是我的configuration:

VirtualHostconfiguration:

<IfModule mod_ssl.c> <VirtualHost _default_:443> DocumentRoot /git/myrepos <Directory "/git/myrepos"> Allow from All Options +ExecCGI AllowOverride All </Directory> ScriptAlias /git /git/myrepos/bin/suexec-wrapper.sh SSLEngine on SSLCertificateFile /etc/ssl/git.crt SSLCertificateKeyFile /etc/ssl/git.key <FilesMatch "\.(cgi|shtml|phtml|php)$"> SSLOptions +StdEnvVars </FilesMatch> <Directory /usr/lib/cgi-bin> SSLOptions +StdEnvVars </Directory> 

/git/myrepos/bin/suexec-wrapper.sh:

 #!/bin/bash PATH_INFO=$SCRIPT_URL GIT_PROJECT_ROOT=/git/myrepos REMOTE_USER=$REDIRECT_REMOTE_USER export GIT_HTTP_EXPORT_ALL=true /usr/lib/git-core/git-http-backend 

克隆回购的工作,因为它应该(例如。 git clone https://192.168.0.1/repo1.git ):它接受LDAP用户的凭据和克隆回购。
当推回购(例如,git push origin master):它要求凭证,接受它们,然后抛出错误:

 error: Cannot access URL https://192.168.0.1/repo1.git/, return code 22 fatal: git-http-push failed 

当在详细模式下运行push( GIT_CURL_VERBOSE=1 git push origin master )时,它要求input凭证,接受它们和(输出的尾部):

 * STATE: DO => DO_DONE handle 0x1cdd270; (connection #0) * STATE: DO_DONE => WAITPERFORM handle 0x1cdd270; (connection #0) * STATE: WAITPERFORM => PERFORM handle 0x1cdd270; (connection #0) * additional stuff not fine transfer.c:1037: 0 0 * The requested URL returned error: 401 * Closing connection #0 * Expire cleared error: Cannot access URL https://192.168.0.1/repo1.git/, return code 22 fatal: git-http-push failed 

我正确configurationApache的git-http-backend(包装脚本?)吗?
什么会导致推操作的问题?
如何更详细的debugging方法?
任何build议非常感谢!
亲切的问候

经过多次尝试,我找到了解决方案:)
问题在于git-http-backend的不正确的VirtualHost配置。
这是我的工作配置:

 <Ifmodulee mod_ssl.c> <VirtualHost _default_:443> DocumentRoot /git/myrepos SetEnv GIT_PROJECT_ROOT /git/myrepos SetEnv GIT_HTTP_EXPORT_ALL ScriptAlias /myrepos/ /usr/lib/git-core/git-http-backend AliasMatch ^/myrepos/(.*/objects/[0-9a-f]{2}/[0-9a-f]{38})$ /git/myrepos/$1 AliasMatch ^/repos/(.*/objects/pack/pack-[0-9a-f]{40}.(pack|idx))$ /git/myrepos/$1 ScriptAliasMatch "(?x)^/(.*/(HEAD | info/refs | objects/(info/[^/]+ | [0-9a-f]{2}/[0-9a-f]{38} | pack/pack-[0-9a-f]{40}\.(pack|idx)) | git-(upload|receive)-pack))$" /usr/lib/git-core/git-http-backend/$1 <Directory "/usr/lib/git-core/"> Options +ExecCGI Allow From All </Directory> ScriptAlias /cgi-bin/ /usr/lib/cgi-bin/ <Directory "/usr/lib/cgi-bin"> AllowOverride None Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch Order allow,deny Allow from all </Directory> ErrorLog ${APACHE_LOG_DIR}/error.log LogLevel warn CustomLog ${APACHE_LOG_DIR}/ssl_access.log combined SSLEngine on SSLCertificateFile /etc/ssl/git.crt SSLCertificateKeyFile /etc/ssl/git.key <FilesMatch "\.(cgi|shtml|phtml|php)$"> SSLOptions +StdEnvVars </FilesMatch> <Directory /usr/lib/cgi-bin> SSLOptions +StdEnvVars </Directory> BrowserMatch "MSIE [2-6]" \ nokeepalive ssl-unclean-shutdown \ downgrade-1.0 force-response-1.0 BrowserMatch "MSIE [17-9]" ssl-unclean-shutdown <Location /repo1.git> Order deny,allow Deny from all Allow from all AuthName "GIT Authentication" AuthType Basic AuthBasicProvider ldap AuthzLDAPAuthoritative off AuthLDAPBindDN domain\user AuthLDAPBindPassword passwd AuthLDAPURL ldap://ldap.server:389/ou=git,DC=domain?sAMAccountName Require ldap-group cn=git_repo1,ou=git,dc=domain </Location> </VirtualHost> </Ifmodulee> 

现在所有的git操作都可以通过https与ldap授权,通过git-http-backend正常工作:)
也许这对某个人有用。