aboutsummaryrefslogtreecommitdiffstats
path: root/cmd
Commit message (Expand)AuthorAgeFilesLines
* Remove Go and C source•••The Rust implementation now implements all features I need Rutger Broekhoff2024-01-244-1322/+0
* Rust code dumpRutger Broekhoff2024-01-191-7/+6
* Fix makehextag in git-lfs-authenticate (C)Rutger Broekhoff2024-01-092-15/+18
* Simplify git-lfs-authenticate, rip out Gitolite•••Zero dependencies for git-lfs-authenticate now. Not compatible with the LFS server. Assumes that any user who has access to the Git user, should have access to all repositories. Rutger Broekhoff2024-01-092-133/+309
* Make tokens short-livedRutger Broekhoff2024-01-022-3/+3
* Remove some cruft, add 'GITOLFS3_' prefix to envsRutger Broekhoff2024-01-021-30/+18
* Return after makeRespError; add notice in README.txtRutger Broekhoff2024-01-021-0/+2
* WheeeRutger Broekhoff2024-01-021-7/+20
* Don't use die() for printing usageRutger Broekhoff2024-01-021-2/+4
* Print usage in git-lfs-authenticateRutger Broekhoff2024-01-021-2/+4
* Remove concurrency stuff in git-lfs-authenticateRutger Broekhoff2024-01-021-21/+9
* Write Content-Length in object GETRutger Broekhoff2024-01-021-0/+3
* Token types, download verificationRutger Broekhoff2024-01-022-20/+140
* Better logging (for a standalone server)Rutger Broekhoff2024-01-021-7/+6
* 🚫 No CGI 🚫Rutger Broekhoff2024-01-021-2/+10
* catch panicRutger Broekhoff2024-01-021-1/+10
* Try generating more descriptive errorsRutger Broekhoff2024-01-021-1/+10
* lol oopsRutger Broekhoff2024-01-021-1/+1
* Uploading objects is a PUT, not a POSTRutger Broekhoff2024-01-021-1/+1
* Fix upload regexRutger Broekhoff2024-01-021-1/+1
* Upload validation by proxying•••Yes, the code is a mess Rutger Broekhoff2024-01-021-58/+263
* Specify x-amz-content-sha256 as in Scaleway docsRutger Broekhoff2023-12-311-0/+1
* Try formatting x-amz-checksum-sha256 as Base64•••Although this already looks like a lost cause (Scaleway Object Storage doesn't seem to care about these headers -- certainly not about Content-Length -- I wanted to see if I could still get automatic checksum verification working. Rutger Broekhoff2023-12-311-1/+15
* Fix mistakeRutger Broekhoff2023-12-301-4/+4
* Only print environment when dyingRutger Broekhoff2023-12-301-5/+4
* Add .git suffix to repo in href constructionRutger Broekhoff2023-12-301-5/+5
* git-lfs-authenticate: allow setting repo href base URLRutger Broekhoff2023-12-301-8/+27
* Implement authorization in git-lfs-server, test presigned PUTsRutger Broekhoff2023-12-302-31/+182
* Add command for generating ED25519 keypairsRutger Broekhoff2023-12-301-0/+31
* Properly format request timestampRutger Broekhoff2023-12-301-1/+2
* Adjust MkdirAll modeRutger Broekhoff2023-12-301-2/+2
* Improve git-lfs-authenticateRutger Broekhoff2023-12-301-10/+70
* Implement git-lfs-authenticateRutger Broekhoff2023-12-302-57/+130
* URL as string, lesson learnedRutger Broekhoff2023-12-301-2/+2
* Repo .git suffixRutger Broekhoff2023-12-301-1/+1
* Request IDs!Rutger Broekhoff2023-12-301-20/+40
* Allow setting Gitolite binary path via envRutger Broekhoff2023-12-291-8/+14
* Log moreRutger Broekhoff2023-12-291-0/+3
* Swap strings.TrimPrefix argsRutger Broekhoff2023-12-291-2/+2
* Log reqPath 2x moreRutger Broekhoff2023-12-291-0/+2
* SubmatchRutger Broekhoff2023-12-291-5/+7
* Prefer PATH_INFO over request URLRutger Broekhoff2023-12-291-1/+5
* List envs at startRutger Broekhoff2023-12-291-11/+21
* Improve handling of MIME typesRutger Broekhoff2023-12-291-5/+17
* Read S3 secrets from fileRutger Broekhoff2023-12-291-13/+23
* Make Nix builds workRutger Broekhoff2023-12-291-32/+32
* Add 'lfs/objects' part to pathRutger Broekhoff2023-12-291-1/+1
* Write basic read-only public Git LFS server•••The 'integration' with Gitolite is honestly pretty bad and should not be taken very seriously: it runs the 'gitolite access' command to check if some user (e.g., daemon/nobody) should be able to read from the repository. Based on this, it grants access to objects stored in S3, by generating Presigned GetObject URLs using the S3 API. Of course, this integration with Gitolite (especially when using the daemon user to check if the user should be able to read) is not very 'high-value': 1. If we already make use of the daemon pseudo-user to control access to public repositories, we may as well check for the existence of git-daemon-export-ok files. In case they exist, we simply assume that the repository is meant to be shown on the public internet and that therefore the LFS archive should also be considered 'open to the public'. 2. The way that Gitolite commands are currently run, this program breaks when not running under the git user without extra configuration; Gitolite decides where repositories are based on the HOME environment variable. This program currently does not set this. This could be set by the CGI server (or fcgiwrap) and would unbreak the system. There's no support for any more advanced kind of authn/authz. Uploading is also not supported yet. That's still to come. Rutger Broekhoff2023-12-291-0/+329
* Initial commitRutger Broekhoff2023-12-292-0/+49