Codechain — code trust through hash chains — β release
This is a beta release of Codechain — everything is fairly stable, but there is still a small risk that the hash chain might be reset!
In code we trust: Secure multiparty code reviews with signatures and hash chains.
The most common signing mechanism for open-source software is using GPG signatures. For example, GPG is used to sign Git commits and Debian packages. There is no built-in mechanism for key rotation and key compromise. And if forced to, a single developer can subvert all machines which trust the corresponding GPG key.
That's where the Codechain tool comes in. It establishes code trust via multi-party reviews recorded in unmodifiable hash chains.
Codechain allows to only publish code that has been reviewed by a preconfigured set of reviewers. The signing keys can be rotated and the reviewer set flexibly changed.
Every published code state is uniquely identified by a deterministic source tree hash stored in the hash chain, signed by a single responsible developer.
Codechain uses files to store the hash chain, not a distributed "blockchain".
go get -u -v github.com/frankbraun/codechain
- Minimal code base, Go only, cross-platform.
Codechain depends on the
git binary (for
git diff), but that's optional.
Out of scope
- Source code management. Git and other VCS systems are good for that, Codechain can be used alongside them and solves a different problem.
- Single source of truth (SSOT). Codechain requires a SSOT to distribute the current hash chain head, but that's outside of the scope for now. DNS (plus DNSCrypt) or DNSSEC could be used. Gossiping of the current head would also work.
- Code distribution (minimal support is provided via
codechain apply -f).
- Reproducible builds.