<feed xmlns='http://www.w3.org/2005/Atom'>
<title>srcnode/gitolite, branch v0.3.0</title>
<subtitle>Custom git repository service</subtitle>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/'/>
<entry>
<title>gitolite: Force blank description for newly created repositories</title>
<updated>2024-03-12T03:46:04+00:00</updated>
<author>
<name>Malfurious</name>
<email>m@lfurio.us</email>
</author>
<published>2024-03-12T03:46:04+00:00</published>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/commit/?id=505e52aa3dd44b94a878c7a7e906263535e1df56'/>
<id>505e52aa3dd44b94a878c7a7e906263535e1df56</id>
<content type='text'>
A gitolite POST_CREATE trigger is added to initialize the description
file in new repos.  This prevents the "Unnamed repository; edit this
file ..." string from being used by default.

This affects new repositories, existing projects will remain as is.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
A gitolite POST_CREATE trigger is added to initialize the description
file in new repos.  This prevents the "Unnamed repository; edit this
file ..." string from being used by default.

This affects new repositories, existing projects will remain as is.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>gitolite: Fix bug in post git trigger branch detection</title>
<updated>2024-03-11T13:49:23+00:00</updated>
<author>
<name>Malfurious</name>
<email>m@lfurio.us</email>
</author>
<published>2024-03-11T13:49:23+00:00</published>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/commit/?id=1225cf17d153e3bee7ef58da47ef38b2e32b8b75'/>
<id>1225cf17d153e3bee7ef58da47ef38b2e32b8b75</id>
<content type='text'>
The previous version fails to handle nested branch names containing
slashes.  For example, if pushing a single new branch named
`feat/example`, the script would set HEAD to `feat` and remain dangling.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The previous version fails to handle nested branch names containing
slashes.  For example, if pushing a single new branch named
`feat/example`, the script would set HEAD to `feat` and remain dangling.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>gitolite: Create separate config for normalmode repository semantics</title>
<updated>2024-03-11T11:10:47+00:00</updated>
<author>
<name>Malfurious</name>
<email>m@lfurio.us</email>
</author>
<published>2023-12-16T11:00:25+00:00</published>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/commit/?id=d489b4438ded736c61a7dadeb87a6bd90ea53b50'/>
<id>d489b4438ded736c61a7dadeb87a6bd90ea53b50</id>
<content type='text'>
The previous content of gitolite.conf defined the standard access rules
for normalmode.  These are now moved to a new file which will be baked
into the gitolite docker image and not managed by the gitolite-admin
repository.

This will allow for easier management of the normalmode rules via this
git repository (aka, part of the normalmode distribution) and prevent
the need for user intervention and to stomp on gitolite-admin to adopt
new updates.  The goal is to give users nearly complete ownership of
their gitolite.conf file.

Added to the gitolite.conf template is a definition for a new @creators
group.  The normalmode rules are updated to permit only users from this
group to create and own new wildcard repositories.  This allows creating
new users which can only contribute to other's repos (as either a
MAINTAINER or CONTRIBUTOR), or access private repos.

As alluded by the previous paragraph, administrators may define private
repos within gitolite using normalmode.  This is done by manually
configuring them in gitolite.conf.  This use-case has always been
possible, but has only recently been tested to confirm that the access
restrictions are compatible with the rest of normalmode's operations.
(aka: Nothing is leaked via cgit, and the normalmode access rules don't
break anything).  Easing this use-case is another reason for the clean
separation of config files.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The previous content of gitolite.conf defined the standard access rules
for normalmode.  These are now moved to a new file which will be baked
into the gitolite docker image and not managed by the gitolite-admin
repository.

This will allow for easier management of the normalmode rules via this
git repository (aka, part of the normalmode distribution) and prevent
the need for user intervention and to stomp on gitolite-admin to adopt
new updates.  The goal is to give users nearly complete ownership of
their gitolite.conf file.

Added to the gitolite.conf template is a definition for a new @creators
group.  The normalmode rules are updated to permit only users from this
group to create and own new wildcard repositories.  This allows creating
new users which can only contribute to other's repos (as either a
MAINTAINER or CONTRIBUTOR), or access private repos.

As alluded by the previous paragraph, administrators may define private
repos within gitolite using normalmode.  This is done by manually
configuring them in gitolite.conf.  This use-case has always been
possible, but has only recently been tested to confirm that the access
restrictions are compatible with the rest of normalmode's operations.
(aka: Nothing is leaked via cgit, and the normalmode access rules don't
break anything).  Easing this use-case is another reason for the clean
separation of config files.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>gitolite: Prevent repo auto-creation on clone/fetch</title>
<updated>2023-09-16T18:56:41+00:00</updated>
<author>
<name>Malfurious</name>
<email>m@lfurio.us</email>
</author>
<published>2023-09-16T18:56:41+00:00</published>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/commit/?id=5f5cab13b85c6ca5948581692c7be4c994908703'/>
<id>5f5cab13b85c6ca5948581692c7be4c994908703</id>
<content type='text'>
I'm considering this default behavior as a bug for normalmode.  The
creation of a repository via a read activity seems far too accidental
for my taste.  Repositories are created by pushing to them.

This does mean that:

    git clone &lt;new-url&gt;
    ...
    git push

is no longer a shorthand for:

    git init
    git remote add origin &lt;new-url&gt;
    ...
    git push

I'm ok with that.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
I'm considering this default behavior as a bug for normalmode.  The
creation of a repository via a read activity seems far too accidental
for my taste.  Repositories are created by pushing to them.

This does mean that:

    git clone &lt;new-url&gt;
    ...
    git push

is no longer a shorthand for:

    git init
    git remote add origin &lt;new-url&gt;
    ...
    git push

I'm ok with that.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>gitolite: Fix bug in default branch push trigger</title>
<updated>2023-09-16T18:49:21+00:00</updated>
<author>
<name>Malfurious</name>
<email>m@lfurio.us</email>
</author>
<published>2023-09-16T18:49:21+00:00</published>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/commit/?id=fcf7dc53547554507ed0fe76acd78d1ac0456d9e'/>
<id>fcf7dc53547554507ed0fe76acd78d1ac0456d9e</id>
<content type='text'>
Since it is now allowed to remove the remote default branch, this script
needs to handle cases where there are no branches following a push.

In this case, the `git symbolic-ref` command will fail, and we return
our standard warning for when HEAD is dangling.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Since it is now allowed to remove the remote default branch, this script
needs to handle cases where there are no branches following a push.

In this case, the `git symbolic-ref` command will fail, and we return
our standard warning for when HEAD is dangling.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Add host script for initial configuration flow</title>
<updated>2023-09-16T17:07:18+00:00</updated>
<author>
<name>Malfurious</name>
<email>m@lfurio.us</email>
</author>
<published>2023-09-16T17:07:18+00:00</published>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/commit/?id=0b329d20c64502e3a9e932590f7872e09167d001'/>
<id>0b329d20c64502e3a9e932590f7872e09167d001</id>
<content type='text'>
The new installation procedure is to start with ./configure to set your
pubkey up for admin access.  The initialize script is updated to use an
active prompt, since as-is, CTRL-C won't properly terminate the script
to cancel.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The new installation procedure is to start with ./configure to set your
pubkey up for admin access.  The initialize script is updated to use an
active prompt, since as-is, CTRL-C won't properly terminate the script
to cancel.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>gitolite: Add admin initialization script</title>
<updated>2023-09-15T14:53:24+00:00</updated>
<author>
<name>Malfurious</name>
<email>m@lfurio.us</email>
</author>
<published>2023-09-15T12:49:25+00:00</published>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/commit/?id=c1db5d6e6557ac5f3b9d408eb2de888bf096a370'/>
<id>c1db5d6e6557ac5f3b9d408eb2de888bf096a370</id>
<content type='text'>
Per docker image changes, this serves as an alternative entrypoint for
performing initial pubkey configuration.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Per docker image changes, this serves as an alternative entrypoint for
performing initial pubkey configuration.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>gitolite: Allow users to delete remote HEAD branches</title>
<updated>2023-09-15T14:53:24+00:00</updated>
<author>
<name>Malfurious</name>
<email>m@lfurio.us</email>
</author>
<published>2023-09-15T09:48:40+00:00</published>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/commit/?id=5756572b09a78541d9d0d9fc6b21a6c006a99894'/>
<id>5756572b09a78541d9d0d9fc6b21a6c006a99894</id>
<content type='text'>
This allows the branch considered the repo default to be deleted via
push.  I'm not totally opposed to allowing this, even though it's not
entirely necessary.  However, the ability to do this is now required by
the docker image entrypoint script.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This allows the branch considered the repo default to be deleted via
push.  I'm not totally opposed to allowing this, even though it's not
entirely necessary.  However, the ability to do this is now required by
the docker image entrypoint script.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>gitolite: Remove hard-coded admin username</title>
<updated>2023-09-15T14:53:24+00:00</updated>
<author>
<name>Malfurious</name>
<email>m@lfurio.us</email>
</author>
<published>2023-09-14T18:34:48+00:00</published>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/commit/?id=a9c483cad66446d3569f0666c55bed6263f75162'/>
<id>a9c483cad66446d3569f0666c55bed6263f75162</id>
<content type='text'>
The default gitolite.conf file is now patched in to the gitolite
installation in the docker image.  This is so that the intended version
of the file is used in the gitolite-admin repo from the very beginning.
This is made necessary by the decoupling of repo purposes.

Instead of using (literal) 'admin', '%ADMIN' will be substituted with
the actual admin username during `gitolite setup`.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The default gitolite.conf file is now patched in to the gitolite
installation in the docker image.  This is so that the intended version
of the file is used in the gitolite-admin repo from the very beginning.
This is made necessary by the decoupling of repo purposes.

Instead of using (literal) 'admin', '%ADMIN' will be substituted with
the actual admin username during `gitolite setup`.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>gitolite: Correct site-local code location</title>
<updated>2023-09-15T14:53:24+00:00</updated>
<author>
<name>Malfurious</name>
<email>m@lfurio.us</email>
</author>
<published>2023-09-13T08:26:31+00:00</published>
<link rel='alternate' type='text/html' href='http://normalmode.org/malf/infra/srcnode/commit/?id=9543016ffb3a507829d980f0abc37725a211540b'/>
<id>9543016ffb3a507829d980f0abc37725a211540b</id>
<content type='text'>
Per the previous commit, site-local code is now to be located directly
in the git user's home directory, as static content in the docker image.
Correct this setting in the RC file.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Per the previous commit, site-local code is now to be located directly
in the git user's home directory, as static content in the docker image.
Correct this setting in the RC file.

Signed-off-by: Malfurious &lt;m@lfurio.us&gt;
</pre>
</div>
</content>
</entry>
</feed>
