Commits

44f779fe536a2e49f56fce1a288a3e2a601bd0d0
Switch branches/tags
espadonne
All time
May 2026
Su Mo Tu We Th Fr Sa
26 27 28 29 30 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

Commits on May 12, 2026

  1. espadonne committed
  2. espadonne committed
  3. espadonne committed

Commits on May 11, 2026

  1. espadonne committed
  2. espadonne committed
  3. espadonne committed
  4. Merge pull request #97 from tenseleyFlow/contrib-live-diagnosis
    Credit affiliated imported commit authors
    espadonne committed
  5. Merge pull request #96 from tenseleyFlow/profile-contrib-parity
    Count profile contributions across repos
    espadonne committed
  6. espadonne committed

Commits on May 10, 2026

  1. espadonne committed
  2. espadonne committed
  3. Merge pull request #77 from tenseleyFlow/repo-source-remotes
    Add source remotes for submodule imports
    espadonne committed
  4. espadonne committed
  5. espadonne committed
  6. espadonne committed
  7. espadonne committed
  8. Merge pull request #59 from tenseleyFlow/offcanvas-remove-mcp
    Remove MCP registry from offcanvas nav
    espadonne committed
  9. espadonne committed
  10. espadonne committed
  11. storage: inject safe.directory=* in RepairSharedPerms git invocation
    Operator runs 'shithubd storage repair-shared-perms' as root over
    SSH; the bare repos are owned by shithub:shithub. git 2.35+'s
    dubious-ownership protection early-exits with the misleading
    'fatal: not in a git directory' before it reads core.sharedRepository.
    
    Same env trick the SSH dispatcher uses (cmd/shithubd/ssh_dispatch
    injects GIT_CONFIG_COUNT=1 + safe.directory=* for the cross-user
    git-receive-pack/upload-pack invocations). The path is verified
    contained-in-root above the env injection, so '*' here is safe by
    construction — every iteration of this loop targets a path we
    already validated.
    espadonne committed
  12. espadonne committed
  13. espadonne committed
  14. Merge remote-tracking branch 'origin/trunk' into sr2/audit-remediation-base
    # Conflicts:
    #	internal/web/handlers/orgs/orgs.go
    espadonne committed
  15. espadonne committed
  16. espadonne committed
  17. lint: lint-unused script + CI step to block shim regrowth (SR2 M1)
    scripts/lint-unused.sh fails the build when any non-test Go file
    under internal/ or cmd/ carries 'var _ = symbol' (the dead-code
    shim shape). Allows the legitimate 'var _ Type = (*X)(nil)'
    interface-assertion pattern by anchoring the regex to '= [A-Za-z]'
    without a type name in between.
    
    Wired into:
    - Makefile 'lint-unused' target + the 'ci' alias
    - .github/workflows/ci.yml as a dedicated step (the rest of the
      bash lints are still local-only; lint-unused gets first-class CI
      treatment because the audit caught regrowth twice in 3 days).
    espadonne committed
  18. drop var-_-equals-symbol unused-import shims (SR2 M1)
    Pre-fix: 8 sites carried 'var _ = symbol' shims with comments like
    'silence unused-import warnings during refactors'. These were lying:
    in every case the import was already used elsewhere in the file or
    the symbol was unreachable. Audit 2026-05-08 flagged 3 occurrences;
    audit 2026-05-10 found 8 — the pattern grew because nothing failed
    CI on it.
    
    Sites cleaned:
    - internal/auth/totp/recovery.go              (base32.StdEncoding)
    - internal/web/middleware/pat.go              (pgx.ErrNoRows)
    - internal/web/handlers/orgs/teams.go         (pgx.ErrNoRows + errors.New)
    - internal/web/handlers/profile/profile.go    (context.Background)
    - internal/web/handlers/api/api.go            (context.Background)
    - internal/web/handlers/repo/code.go          (pgtype.Int8{})
    - internal/web/handlers/repo/redirect.go      (usersdb.New)
    
    Build still passes after each shim drop because the imports are
    genuinely live; the shims were cargo-cult.
    espadonne committed