--- type: change message: |- Support non-fastforward commits This includes: * adding a filter to accessctl which can be used to allow non-ff commits, and augmenting the default access controls to deny non-ff commits for master. VerifyCommits was then modified to use that new functionality, and then tests were added to cover that. * adding a `VerifyBranchCanSetHEADTo` method, and using that in the pre-receive hook rather than putting all the logic in the hook itself. `VerifyBranchCanSetHEADTo` is thoroughly tested, and the tests for it ended up uncovering some broken aspects of `VerifyCommits` as well, so those are fixed too. change_hash: ACTyCsTFBnAjGAek355IU3I6MioLIx5mb1mS4YjMUrF5 credentials: - type: pgp_signature pub_key_id: 95C46FA6A41148AC body: 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 account: mediocregopher
|3 years ago|
|.dehub||3 years ago|
|accessctl||3 years ago|
|cmd||3 years ago|
|fs||3 years ago|
|sigcred||3 years ago|
|typeobj||3 years ago|
|yamlutil||3 years ago|
|.gitignore||3 years ago|
|Dockerfile.dehub-remote||3 years ago|
|README.md||3 years ago|
|ROADMAP.md||3 years ago|
|SPEC.md||3 years ago|
|commit.go||3 years ago|
|commit_change.go||3 years ago|
|commit_change_test.go||3 years ago|
|commit_comment.go||3 years ago|
|commit_credential.go||3 years ago|
|commit_credential_test.go||3 years ago|
|commit_test.go||3 years ago|
|config.go||3 years ago|
|diff.go||3 years ago|
|go.mod||3 years ago|
|go.sum||3 years ago|
|hash.go||3 years ago|
|hash_test.go||3 years ago|
|repo.go||3 years ago|
|repo_test.go||3 years ago|
dehub aims to provide all the features of a git hosting platform, but without the hosting part. These features include:
User management - Authentication that commits come from the user they say they do, and fine-grained control over which users can do what.
Pull requests and issues - Facilitation of discussion via comment commits, and fine-grained (down to the file level) sign-off requirements.
Tags and releases* - Mark releases in the repo itself, and provide immutable and verifiable git tags so there's never any funny business.
Plugins*: Extend all aspects of dehub functionality via executables managed in the repo itself (in the same style as git hooks).
To implement these features, dehub combines two key concepts:
First, repo configuration is defined in the repo itself. A file called
.dehub/config.yml contains all information related to user accounts, their pgp
keys, branch and file level access controls, and more. Every commit must adhere
to the configuration of its parent in order to be considered verifiable. The
configuration file is committed to the repo like any other file would be, and so
is even able to define the access controls on itself.
Second, the commit message of every dehub commit contains YAML encoded metadata,
which allows dehub to extend git and provide multiple commit types, each with
its own capabilities and restrictions. Some example dehub commit types are
comment commits, and
Infrastructure (or lack thereof)
Because a dehub project is entirely housed within a traditional git project, which is merely a collection of files, any existing git or network filesystem infrastructure can be used to host any dehub project:
The most barebones git daemon server (with a simple pre-receive hook set up).
A remote SSH endpoint.
A mailing list (aka the old school way).
Network file syncing utilities such as dropbox, syncthing, or NFS.
Existing git project hosts like GitHub, Bitbucket, or Keybase.
Decentralized filesystems such as IPFS*.
* Planned feature, but not yet implemented.
The dehub project itself can be found by cloning
Installation of the dehub tool is currently done via the
go get command:
go get dehub.dev/src/dehub.git/cmd/dehub
This will install the binary to your
$GOBIN path, which you'll want to put in
go env if you're not sure where your
Once installed, running
dehub -h should show you the help output of the
command. You can continue on to the tutorials if you're not sure where to go
The following tutorials will guide you through the basic usage of dehub. As dehub is still very much in development a high level of git and PGP profiency is still required in order to use dehub effectively.
The SPEC is the best place to see every possible nitty-gritty detail of how dehub works. It attempts to be both human-readable and exhaustive in its coverage.
ROADMAP documents upcoming features and other work required on the project. If you're looking to contribute, this is a great place to start.
dehub-remote is a simple docker image which can be used to host a remote dehub project over http(s). The endpoint will automatically verify all pushed commits.
git-http-server is a small server which makes a git repo's file tree available via http. It will automatically render markdown files to html as well. git-http-server is used to render dehub's website.