Commit Briefs

758dc042e8 Stefan Sperling

remove trailing whitespace; patch by Josiah Frentsos


13b2bc374c Stefan Sperling

introduce gotd(8), a Git repository server reachable via ssh(1)

This is an initial barebones implementation which provides the absolute minimum of functionality required to serve got(1) and git(1) clients. Basic fetch/send functionality has been tested and seems to work here, but this server is not yet expected to be stable. More testing is welcome. See the man pages for setup instructions. The current design uses one reader and one writer process per repository, which will have to be extended to N readers and N writers in the future. At startup, each process will chroot(2) into its assigned repository. This works because gotd(8) can only be started as root, and will then fork+exec, chroot, and privdrop. At present the parent process runs with the following pledge(2) promises: "stdio rpath wpath cpath proc getpw sendfd recvfd fattr flock unix unveil" The parent is the only process able to modify the repository in a way that becomes visible to Git clients. The parent uses unveil(2) to restrict its view of the filesystem to /tmp and the repositories listed in the configuration file gotd.conf(5). Per-repository chroot(2) processes use "stdio rpath sendfd recvfd". The writer defers to the parent for modifying references in the repository to point at newly uploaded commits. The reader is fine without such help, because Git repositories can be read without having to create any lock-files. gotd(8) requires a dedicated user ID, which should own repositories on the filesystem, and a separate secondary group, which should not have filesystem-level repository access, and must be allowed access to the gotd(8) socket. To obtain Git repository access, users must be members of this secondary group, and must have their login shell set to gotsh(1). gotsh(1) connects to the gotd(8) socket and speaks Git-protocol towards the client on the other end of the SSH connection. gotsh(1) is not an interactive command shell. At present, authenticated clients are granted read/write access to all repositories and all references (except for the "refs/got/" and the "refs/remotes/" namespaces, which are already being protected from modification). While complicated access control mechanism are not a design goal, making it possible to safely offer anonymous Git repository access over ssh(1) is on the road map.


d294b1dcc0 Stefan Sperling

allow got_object_parse_tree to reuse entries buffer allocations for speed

ok millert@


9985f404ff Stefan Sperling

parse tree entries into an array instead of a pathlist

Avoids some extra malloc/free in a performance-critical path. ok op@


c0df59665d Stefan Sperling

wrap overlong lines



5aa813935b Stefan Sperling

add copyright year for files already touched in 2020



b64b1f953a Stefan Sperling

plug a memory leak; parsed tree entries were not freed


56e0773df7 Stefan Sperling

convert tree entries from SIMPLEQ to an array



ed17542722 Stefan Sperling

more progress on generating new tree entries


9f2369b01b Stefan Sperling

make all the read_privsep functions local to object.c


ebc55e2dfc Stefan Sperling

eliminate got_object_open() round-trip when opening blobs


268f7291e6 Stefan Sperling

eliminate got_object_open() round-trip when opening tags


13c729f710 Stefan Sperling

eliminate got_object_open() round-trip when opening trees





5df4932d8e Stefan Sperling

improve handling of struct got_object_qid allocations




05e1230b0e Stefan Sperling

rename got_commit_object_mini to got_mini_commit_object


7762fe12f8 Stefan Sperling

add a mini-commit object for use by commit graph


3840f4c96d Stefan Sperling

fix "rpath" pledge violation in got-read-pack