Repository management
Code Storage repositories are identified by unique IDs. You can either let the system generate an ID or provide your own:/ for organizing repositories by team, project, or user.
Authentication & Security
All access to Code Storage requires JWT tokens signed by your organization. Each token:- Grants access to a single repository
- Contains explicit permission scopes
- Has a configurable time-to-live (TTL)
- Is customer-signed for full control
Token structure
SDK note: the client normalizes Git status codes inJWT headers must include:stateto descriptive values and provides the original status underrawStatealongside camelCase property names.
Permission scopes
| Scope | Description | Operations |
|---|---|---|
git:read | Read repository contents | clone, fetch, pull |
git:write | Modify repository | push (includes read) |
repo:write | Create repositories | POST /api/v1/repos |
git:write | Sync from upstream | POST /api/v1/repos/pull-upstream |
Key management
Public keys for JWT verification are managed through the Pierre Admin Panel. Thekid (Key ID)
header enables zero-downtime key rotation—register new keys before retiring old ones.
For detailed authentication setup, manual JWT generation, and advanced token configuration, see Authentication.