Go to file
jolheiser 04f4bc04e9
fix zellij layout
2025-03-23 11:56:29 -05:00
assets initial commit 2024-01-15 16:26:51 -06:00
cmd/ugitd trap sigterm instead of kill 2025-02-23 12:38:16 -06:00
contrib fix zellij layout 2025-03-23 11:56:29 -05:00
internal use raw for script 2025-03-10 13:53:58 -05:00
nix multiple nix module instances 2025-02-13 22:36:27 -06:00
.air.toml add air 2025-03-23 11:43:47 -05:00
.gitignore feat: private repos over tailscale 2024-07-26 10:59:36 -05:00
LICENSE wip 2023-12-29 10:06:09 -06:00
README.md chore: update README 2024-07-23 16:50:24 -05:00
flake.lock update go modules 2025-01-08 12:39:54 -06:00
flake.nix add air 2025-03-23 11:43:47 -05:00
go.mod add tests 2025-02-23 12:45:51 -06:00
go.mod.sri add tests 2025-02-23 12:45:51 -06:00
go.sum remove tailscale directly 2025-02-11 10:02:24 -06:00

README.md

ugit logo

ugit

Minimal git server

ugit allows cloning via HTTPS/SSH, but can only be pushed to via SSH.

There are no plans to directly support issues or PR workflows, although webhooks are planned and auxillary software may be created to facilitate these things. If you wish to collaborate, please send me patches via git-pr.

Currently all HTML is allowed in markdown, ugit is intended to be run by/for a trusted user.

Getting your public SSH keys from another forge

Using GitHub as an example (although Gitea/GitLab should have the same URL scheme)

Ba/sh

curl https://github.com/<username>.keys > path/to/authorized_keys

Nushell

http get https://github.com/<username>.keys | save --force path/to/authorized_keys

License

MIT

Lots of inspiration and some starting code used from gitea (MIT), wish (MIT), and legit (MIT).