TORII defines intent, Git executes it.
TORII operates as a distinct Control Plane, separate from the Git Execution Plane.
- Responsibility: Management of Repositories, Policies, and Access Bindings.
- Interface: Synchronous API.
- Output: Auditable Event Stream.
- Responsibility: Storing Git objects, handling
git-receive-packandgit-upload-pack. - Interface: SSH / HTTP(S).
- Integration: Server-side Git Hooks + Host Agent Gates.
A Repository in TORII is a managed resource with a unique ID, an owner, and attached policies. It maps to a physical storage location on the Execution Plane.
Policies are declarative rules (e.g., "Main branch is protected", "Author email must match verified domain"). Gates are the enforcement points (Pre-Receive Hooks, SSH Authentication Wrapper).
The append-only log of every control action (e.g., "Policy Updated") and enforcement decision (e.g., "Push Rejected: Policy Violation").
- Admin defines Policy via Control Plane API.
- TORII persists Policy and emits
PolicyCreatedevent. - Developer initiates
git push. - Execution Plane (Gate) intercepts the request.
- Gate queries TORII for authorization/policy check.
- TORII evaluates request against active Policy.
- TORII returns Allow/Deny decision and emits
GitOperationGatedevent. - Execution Plane proceeds or rejects the push.