Commit message (Expand) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Only print environment when dying | 2023-12-30 | 1 | -5/+4 | |
* | Add .git suffix to repo in href construction | 2023-12-30 | 1 | -5/+5 | |
* | git-lfs-authenticate: allow setting repo href base URL | 2023-12-30 | 1 | -8/+27 | |
* | Implement authorization in git-lfs-server, test presigned PUTs | 2023-12-30 | 2 | -31/+182 | |
* | Add command for generating ED25519 keypairs | 2023-12-30 | 1 | -0/+31 | |
* | Properly format request timestamp | 2023-12-30 | 1 | -1/+2 | |
* | Adjust MkdirAll mode | 2023-12-30 | 1 | -2/+2 | |
* | Improve git-lfs-authenticate | 2023-12-30 | 1 | -10/+70 | |
* | Implement git-lfs-authenticate | 2023-12-30 | 35 | -59/+2858 | |
* | URL as string, lesson learned | 2023-12-30 | 1 | -2/+2 | |
* | Repo .git suffix | 2023-12-30 | 1 | -1/+1 | |
* | Request IDs! | 2023-12-30 | 1 | -20/+40 | |
* | Allow setting Gitolite binary path via env | 2023-12-29 | 1 | -8/+14 | |
* | Log more | 2023-12-29 | 1 | -0/+3 | |
* | Swap strings.TrimPrefix args | 2023-12-29 | 1 | -2/+2 | |
* | Log reqPath 2x more | 2023-12-29 | 1 | -0/+2 | |
* | Submatch | 2023-12-29 | 1 | -5/+7 | |
* | Prefer PATH_INFO over request URL | 2023-12-29 | 1 | -1/+5 | |
* | List envs at start | 2023-12-29 | 1 | -11/+21 | |
* | Improve handling of MIME types | 2023-12-29 | 1 | -5/+17 | |
* | Read S3 secrets from file | 2023-12-29 | 1 | -13/+23 | |
* | Make Nix builds work | 2023-12-29 | 824 | -33/+410277 | |
* | Add 'lfs/objects' part to path | 2023-12-29 | 1 | -1/+1 | |
* | Write basic read-only public Git LFS server•••The 'integration' with Gitolite is honestly pretty bad and should not be taken very seriously: it runs the 'gitolite access' command to check if some user (e.g., daemon/nobody) should be able to read from the repository. Based on this, it grants access to objects stored in S3, by generating Presigned GetObject URLs using the S3 API. Of course, this integration with Gitolite (especially when using the daemon user to check if the user should be able to read) is not very 'high-value': 1. If we already make use of the daemon pseudo-user to control access to public repositories, we may as well check for the existence of git-daemon-export-ok files. In case they exist, we simply assume that the repository is meant to be shown on the public internet and that therefore the LFS archive should also be considered 'open to the public'. 2. The way that Gitolite commands are currently run, this program breaks when not running under the git user without extra configuration; Gitolite decides where repositories are based on the HOME environment variable. This program currently does not set this. This could be set by the CGI server (or fcgiwrap) and would unbreak the system. There's no support for any more advanced kind of authn/authz. Uploading is also not supported yet. That's still to come. | 2023-12-29 | 3 | -0/+401 | |
* | Initial commit | 2023-12-29 | 4 | -0/+57 |