On Fri, Mar 08, 2013 at 02:52:48PM +0100, Thomas Koch wrote:
Hi Daniel et al,
I'm also thinking a lot about how to improve Debian by improving our Git
tooling. Therefor I'm packaging Gerrit (#589436). But gerrit and its
dependencies is a big project...
Now that Git slowly becomes the de
On 2013-03-22 21:44:21 +0100 (+0100), Guido Günther wrote:
Gerrit's Jenkins integration is awesome.
[...]
OpenStack CI has some additional tools which help avoid the need to
interact directly with Jenkins too much. There's Zuul (the
gatekeeper) which watches the Gerrit event stream and triggers
On 2013-03-22 21:08:18 + (+), Jeremy Stanley wrote:
[...]
watches the Gerrit event stream and triggers jobs in Jenkins as a
result of matching again patterns defined a YAML configuration
file
[...]
Yeesh. I clearly shouldn't write E-mail when I'm rushing off to eat.
What I meant to say
]] Thomas Goirand
Did anyone try buildbot? It might be better for what I need.
Buildbot is pretty crap at managing slaves that disappear and come back
and such.
I quite disliked the fact that most of Jenkins is done through
a web GUI, which was in fact, more a nuisance than anything
else.
Hi Tollef,
Tollef Fog Heen tfh...@err.no writes:
Buildbot is pretty crap at managing slaves that disappear and come back
and such.
This works fine for me, I have never had any trouble with that (and yes,
my build slaves have disconnected/reconnected quite a few times). Using
buildbot since more
Stefano Zacchiroli zack at debian.org writes:
Related to this, there is also the risk that a user will ssh on alioth
and rm the repository (accidentally or not). Do we have any kind of
protection against that? (e.g. backups we can access to without
bothering the alioth admins, or a way to
]] Thomas Goirand
I wasn't discussing what can be done for backing up a Git repository,
I was asking what is *currently installed* in production as a backup
for Alioth.
da-backup. Look at /etc/da-backup/* for the configuration.
--
Tollef Fog Heen
UNIX is user friendly, it's just picky
On 03/09/2013 12:36 AM, PICCA Frédéric-Emmanuel wrote:
I start to really love the CI thing. I first invested a bit of
time in setting-up everything,
do you have a step by step cookbook for your setup.
Maybe on the debian wiki ?
Unfortunately, no. But it's really easier than what I thought.
I
On 2013-03-09 23:33:47 +0800 (+0800), Thomas Goirand wrote:
[...]
I also need to understand how to secure Jenkins. Because
by default, it's impressive how much Jenkins is a security
hole where you can execute any command. I was tempted
to file a bug report against the package because of it.
Hi Daniel et al,
I'm also thinking a lot about how to improve Debian by improving our Git
tooling. Therefor I'm packaging Gerrit (#589436). But gerrit and its
dependencies is a big project...
Now that Git slowly becomes the de facto standard VCS for Debian[1]
(resistance is futile) it might
On 2013-03-08 14:52:48 +0100 (+0100), Thomas Koch wrote:
[...]
http://openstack-ci.github.com/publications/
[...]
I'm one of the core developers for the team which manages all that
tooling and integration for the OpenStack Project, so I'm happy to
discuss some of the nitty-gritty details, any
On 03/08/2013 10:34 PM, Jeremy Stanley wrote:
On 2013-03-08 14:52:48 +0100 (+0100), Thomas Koch wrote:
[...]
http://openstack-ci.github.com/publications/
[...]
I'm one of the core developers for the team which manages all that
tooling and integration for the OpenStack Project, so I'm happy
I start to really love the CI thing. I first invested a bit of
time in setting-up everything,
do you have a step by step cookbook for your setup.
Maybe on the debian wiki ?
Cheers
Frederic
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe.
On 08/03/2013 17:36, PICCA Frédéric-Emmanuel wrote:
I start to really love the CI thing. I first invested a bit of
time in setting-up everything,
do you have a step by step cookbook for your setup.
Maybe on the debian wiki ?
I love what Michael Prokop did and documented here:
I love what Michael Prokop did and documented here:
http://jenkins-debian-glue.org/
Jenkins + Debian packaging using cowbuilder
The code is very clean and easy to hack.
Thanks, yes it looks great.
Cheers
Fred
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject
Thomas Koch tho...@koch.ro writes:
I'm also thinking a lot about how to improve Debian by improving our Git
tooling. Therefor I'm packaging Gerrit (#589436). But gerrit and its
dependencies is a big project...
Thank you very much for working on this! We use Gerrit extensively but so
far just
On 2013-03-08 12:44:36 -0800 (-0800), Russ Allbery wrote:
Thank you very much for working on this! We use Gerrit extensively but so
far just haven't packaged it because it was too intimidating.
Agreed, if Gerrit gets packaged in Debian/Ubuntu I'll likely push
OpenStack to start using DEBs of
On Mon, Mar 04, 2013 at 12:45:14AM +0800, Paul Wise wrote:
On Sun, Mar 3, 2013 at 11:21 PM, Thomas Goirand wrote:
So yes, I would think having a safe, backup of Alioth is important.
Now, what worries me is that I didn't read any of the Alioth admins
explaining what is currently in
On 03/03/2013 12:51 AM, Wouter Verhelst wrote:
On Thu, Feb 28, 2013 at 11:07:22AM +0100, Stefano Zacchiroli wrote:
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent
On 03/01/2013 02:20 AM, Daniel Pocock wrote:
DD access is also an `all or nothing' scenario, and it is tightly
controlled in other ways.
What I was anticipating is how we can provide more access for upstreams
and other non-DDs using the guest account mechanism or potentially some
kind of
On Sun, Mar 3, 2013 at 11:21 PM, Thomas Goirand wrote:
So yes, I would think having a safe, backup of Alioth is important.
Now, what worries me is that I didn't read any of the Alioth admins
explaining what is currently in production. I've searched, and the
only info I found was hosted
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote:
There was recently some discussion in pkg-javascript about how to give
more people access to the VCS (e.g. keeping the git repositories
logically organised under the pkg-javascript tree, but making write
access available to all
On Thu, Feb 28, 2013 at 11:07:22AM +0100, Stefano Zacchiroli wrote:
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of the following
dangerous operations?
On Donnerstag, 28. Februar 2013, Holger Levsen wrote:
signed commits, so you can identify unwanted bits and clean up in the very
care case that's actually needed?
^^ rare case
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
On 02/28/2013 08:33 PM, Andrew Shadura wrote:
we'd have both hg and git in one unified interface.
That is a very nice feature. I saw few sites having that, for example
bitbucket, unfortunatley, bitbucket doesn't allow git anonymous
checkout over http (it's only available with hg, if I understood
On 02/28/2013 06:07 PM, Stefano Zacchiroli wrote:
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of the following
dangerous operations?
Related to this, there
On 1 March 2013 10:54, Thomas Goirand z...@debian.org wrote:
On 02/28/2013 06:07 PM, Stefano Zacchiroli wrote:
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of
On 03/01/2013 07:21 PM, Dmitrijs Ledkovs wrote:
On 1 March 2013 10:54, Thomas Goirand z...@debian.org wrote:
On 02/28/2013 06:07 PM, Stefano Zacchiroli wrote:
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories, for
Thomas Goirand z...@debian.org (01/03/2013):
I wasn't discussing what can be done for backing up a Git repository,
I was asking what is *currently installed* in production as a backup
for Alioth.
Why are you asking debian-devel@ instead of asking the actual admins?
On 03/01/2013 09:34 PM, Cyril Brulebois wrote:
Thomas Goirand z...@debian.org (01/03/2013):
I wasn't discussing what can be done for backing up a Git repository,
I was asking what is *currently installed* in production as a backup
for Alioth.
Why are you asking debian-devel@ instead of asking
Hello,
On Fri, 01 Mar 2013 18:48:51 +0800
Thomas Goirand z...@debian.org wrote:
On 02/28/2013 08:33 PM, Andrew Shadura wrote:
we'd have both hg and git in one unified interface.
That is a very nice feature. I saw few sites having that, for example
bitbucket, unfortunatley, bitbucket
There was recently some discussion in pkg-javascript about how to give
more people access to the VCS (e.g. keeping the git repositories
logically organised under the pkg-javascript tree, but making write
access available to all DDs + alioth guest users and not just those in
the pkg-javascript
]] Daniel Pocock
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of the following
dangerous operations?
- prevent users pushing with the `--force' option
(from the man page for git-push: This can cause the remote
On 28 February 2013 09:39, Daniel Pocock dan...@pocock.com.au wrote:
There was recently some discussion in pkg-javascript about how to give
more people access to the VCS (e.g. keeping the git repositories
logically organised under the pkg-javascript tree, but making write
access available to
On Thu, Feb 28, 2013 at 10:45:35AM +0100, Tollef Fog Heen wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of the following
dangerous operations?
- prevent users pushing with the `--force' option
(from the man
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of the following
dangerous operations?
Related to this, there is also the risk that a user will ssh on alioth
and
Hi,
On 28.02.2013 11:07, Stefano Zacchiroli wrote:
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of the following
dangerous operations?
Related to this,
On 28/02/13 09:39, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of the following
dangerous operations?
Do you consider this to be a strong security measure against malicious
changes, or a weak safety
Hello.
On 28 February 2013 12:51, Arno Töll a...@debian.org wrote:
Having that said the risk is real and it may be time to reconsider some
choices including the use of Alioth itself for those who do not believe
in openness. Chances are #700630 is going to rescue us all on that.
Maybe we could
On Thu, 28 Feb 2013 12:51:33 +0100, Arno Töll wrote:
On 28.02.2013 11:07, Stefano Zacchiroli wrote:
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of the
On 28/02/13 13:15, Simon McVittie wrote:
On 28/02/13 09:39, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of the following
dangerous operations?
If you look at it from the appropriate angle, the
Quoting Daniel Pocock (2013-02-28 19:20:09)
On 28/02/13 13:15, Simon McVittie wrote:
On 28/02/13 09:39, Daniel Pocock wrote:
Has anybody had experience controlling access to git repositories,
for example, to give users access but prevent some of the following
dangerous operations?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 28/02/13 20:20, Jonas Smedegaard wrote:
Quoting Daniel Pocock (2013-02-28 19:20:09)
On 28/02/13 13:15, Simon McVittie wrote:
On 28/02/13 09:39, Daniel Pocock wrote:
Has anybody had experience controlling access to git
repositories, for
On Thu, Feb 28, 2013 at 04:01:34PM +0600, Andrey Rahmatullin wrote:
On Thu, Feb 28, 2013 at 10:45:35AM +0100, Tollef Fog Heen wrote:
Has anybody had experience controlling access to git repositories, for
example, to give users access but prevent some of the following
dangerous
Hi,
signed commits, so you can identify unwanted bits and clean up in the very
care case that's actually needed?
cheer,s
Holger
--
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
On Thu, 28 Feb 2013, Holger Levsen wrote:
signed commits, so you can identify unwanted bits and clean up in the very
care case that's actually needed?
Indeed. Secure git workflows are possible, although it is a relatively new
development. Signed commits and pull requests are a very big part
46 matches
Mail list logo