Re: Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-22 Thread Jeremy Stanley
On 2013-03-22 21:08:18 + (+), Jeremy Stanley wrote: [...] > watches the Gerrit event stream and triggers jobs in Jenkins as a > result of matching again patterns defined a YAML configuration > file [...] Yeesh. I clearly shouldn't write E-mail when I'm rushing off to eat. What I meant to s

Re: Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-22 Thread Jeremy Stanley
On 2013-03-22 21:44:21 +0100 (+0100), Guido Günther wrote: > Gerrit's Jenkins integration is awesome. [...] OpenStack CI has some additional tools which help avoid the need to interact directly with Jenkins too much. There's Zuul (the gatekeeper) which watches the Gerrit event stream and triggers

Re: Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-22 Thread Guido Günther
On Fri, Mar 08, 2013 at 02:52:48PM +0100, Thomas Koch wrote: > Hi Daniel et al, > > I'm also thinking a lot about how to improve Debian by improving our Git > tooling. Therefor I'm packaging Gerrit (#589436). But gerrit and its > dependencies is a big project... > > Now that Git slowly becomes

Re: RE : Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-17 Thread Michael Stapelberg
Hi Tollef, Tollef Fog Heen writes: > Buildbot is pretty crap at managing slaves that disappear and come back > and such. This works fine for me, I have never had any trouble with that (and yes, my build slaves have disconnected/reconnected quite a few times). Using buildbot since more than a year

Re: RE : Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-17 Thread Tollef Fog Heen
]] Thomas Goirand > Did anyone try buildbot? It might be better for what I need. Buildbot is pretty crap at managing slaves that disappear and come back and such. > I quite disliked the fact that most of Jenkins is done through > a web GUI, which was in fact, more a nuisance than anything > els

Re: git dangerous operations on alioth

2013-03-13 Thread Thorsten Glaser
Stefano Zacchiroli debian.org> writes: > Related to this, there is also the risk that a user will ssh on alioth > and rm the repository (accidentally or not). Do we have any kind of > protection against that? (e.g. backups we can access to without > bothering the alioth admins, or a way to give g

Re: git dangerous operations on alioth

2013-03-11 Thread Tollef Fog Heen
]] Thomas Goirand > I wasn't discussing what can be done for backing up a Git repository, > I was asking what is *currently installed* in production as a backup > for Alioth. da-backup. Look at /etc/da-backup/* for the configuration. -- Tollef Fog Heen UNIX is user friendly, it's just picky a

Re: RE : Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-09 Thread Jeremy Stanley
On 2013-03-09 23:33:47 +0800 (+0800), Thomas Goirand wrote: [...] > I also need to understand how to secure Jenkins. Because > by default, it's impressive how much Jenkins is a security > hole where you can execute any command. I was tempted > to file a bug report against the package because of it.

Re: RE : Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-09 Thread Thomas Goirand
On 03/09/2013 12:36 AM, PICCA Frédéric-Emmanuel wrote: >> I start to really love the CI thing. I first invested a bit of >> time in setting-up everything, > do you have a step by step cookbook for your setup. > Maybe on the debian wiki ? Unfortunately, no. But it's really easier than what I thought

Re: Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-08 Thread Jeremy Stanley
On 2013-03-08 12:44:36 -0800 (-0800), Russ Allbery wrote: > Thank you very much for working on this! We use Gerrit extensively but so > far just haven't packaged it because it was too intimidating. Agreed, if Gerrit gets packaged in Debian/Ubuntu I'll likely push OpenStack to start using DEBs of

Re: Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-08 Thread Russ Allbery
Thomas Koch writes: > I'm also thinking a lot about how to improve Debian by improving our Git > tooling. Therefor I'm packaging Gerrit (#589436). But gerrit and its > dependencies is a big project... Thank you very much for working on this! We use Gerrit extensively but so far just haven't pac

RE : RE : Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-08 Thread PICCA Frédéric-Emmanuel
> I love what Michael Prokop did and documented here: > http://jenkins-debian-glue.org/ > Jenkins + Debian packaging using cowbuilder > The code is very clean and easy to hack. Thanks, yes it looks great. Cheers Fred -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subje

Re: RE : Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-08 Thread Sylvestre Ledru
On 08/03/2013 17:36, PICCA Frédéric-Emmanuel wrote: >> I start to really love the CI thing. I first invested a bit of >> time in setting-up everything, > > do you have a step by step cookbook for your setup. > Maybe on the debian wiki ? I love what Michael Prokop did and documented here: http://j

RE : Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-08 Thread PICCA Frédéric-Emmanuel
> I start to really love the CI thing. I first invested a bit of > time in setting-up everything, do you have a step by step cookbook for your setup. Maybe on the debian wiki ? Cheers Frederic -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Tro

Re: Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-08 Thread Thomas Goirand
On 03/08/2013 10:34 PM, Jeremy Stanley wrote: > On 2013-03-08 14:52:48 +0100 (+0100), Thomas Koch wrote: > [...] >> http://openstack-ci.github.com/publications/ > [...] > > I'm one of the core developers for the team which manages all that > tooling and integration for the OpenStack Project, so I'm

Re: Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-08 Thread Jeremy Stanley
On 2013-03-08 14:52:48 +0100 (+0100), Thomas Koch wrote: [...] > http://openstack-ci.github.com/publications/ [...] I'm one of the core developers for the team which manages all that tooling and integration for the OpenStack Project, so I'm happy to discuss some of the nitty-gritty details, any go

Gerrit, Git requirements, cooperation with others. was: git dangerous operations on alioth

2013-03-08 Thread Thomas Koch
Hi Daniel et al, I'm also thinking a lot about how to improve Debian by improving our Git tooling. Therefor I'm packaging Gerrit (#589436). But gerrit and its dependencies is a big project... Now that Git slowly becomes the de facto standard VCS for Debian[1] (resistance is futile) it might be

Re: git dangerous operations on alioth

2013-03-07 Thread Philipp Kern
On Mon, Mar 04, 2013 at 12:45:14AM +0800, Paul Wise wrote: > On Sun, Mar 3, 2013 at 11:21 PM, Thomas Goirand wrote: > > So yes, I would think having a safe, backup of Alioth is important. > > Now, what worries me is that I didn't read any of the Alioth admins > > explaining what is currently in pro

Re: git dangerous operations on alioth

2013-03-03 Thread Paul Wise
On Sun, Mar 3, 2013 at 11:21 PM, Thomas Goirand wrote: > So yes, I would think having a safe, backup of Alioth is important. > Now, what worries me is that I didn't read any of the Alioth admins > explaining what is currently in production. I've searched, and the > only info I found was hosted pro

Re: git dangerous operations on alioth

2013-03-03 Thread Thomas Goirand
On 03/01/2013 02:20 AM, Daniel Pocock wrote: > > DD access is also an `all or nothing' scenario, and it is tightly > controlled in other ways. > > What I was anticipating is how we can provide more access for upstreams > and other non-DDs using the guest account mechanism or potentially some > kind

Re: git dangerous operations on alioth

2013-03-03 Thread Thomas Goirand
On 03/03/2013 12:51 AM, Wouter Verhelst wrote: > On Thu, Feb 28, 2013 at 11:07:22AM +0100, Stefano Zacchiroli wrote: >> On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: >>> Has anybody had experience controlling access to git repositories, for >>> example, to give users access but pre

Re: git dangerous operations on alioth

2013-03-02 Thread Wouter Verhelst
On Thu, Feb 28, 2013 at 11:07:22AM +0100, Stefano Zacchiroli wrote: > On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: > > Has anybody had experience controlling access to git repositories, for > > example, to give users access but prevent some of the following > > dangerous operation

Re: git dangerous operations on alioth

2013-03-02 Thread Wouter Verhelst
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: > > > There was recently some discussion in pkg-javascript about how to give > more people access to the VCS (e.g. keeping the git repositories > logically organised under the pkg-javascript tree, but making write > access available t

Re: git dangerous operations on alioth

2013-03-01 Thread Andrew Shadura
Hello, On Fri, 01 Mar 2013 18:48:51 +0800 Thomas Goirand wrote: > On 02/28/2013 08:33 PM, Andrew Shadura wrote: > > we'd have both hg and git in one unified interface. > That is a very nice feature. I saw few sites having that, for example > bitbucket, unfortunatley, bitbucket doesn't allow git

Re: git dangerous operations on alioth

2013-03-01 Thread Thomas Goirand
On 03/01/2013 09:34 PM, Cyril Brulebois wrote: > Thomas Goirand (01/03/2013): >> I wasn't discussing what can be done for backing up a Git repository, >> I was asking what is *currently installed* in production as a backup >> for Alioth. > Why are you asking debian-devel@ instead of asking the act

Re: git dangerous operations on alioth

2013-03-01 Thread Cyril Brulebois
Thomas Goirand (01/03/2013): > I wasn't discussing what can be done for backing up a Git repository, > I was asking what is *currently installed* in production as a backup > for Alioth. Why are you asking debian-devel@ instead of asking the actual admins? (http://wiki.debian.org/Alioth#Maintenan

Re: git dangerous operations on alioth

2013-03-01 Thread Thomas Goirand
On 03/01/2013 07:21 PM, Dmitrijs Ledkovs wrote: > On 1 March 2013 10:54, Thomas Goirand wrote: >> On 02/28/2013 06:07 PM, Stefano Zacchiroli wrote: >>> On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: Has anybody had experience controlling access to git repositories, for ex

Re: git dangerous operations on alioth

2013-03-01 Thread Dmitrijs Ledkovs
On 1 March 2013 10:54, Thomas Goirand wrote: > On 02/28/2013 06:07 PM, Stefano Zacchiroli wrote: >> On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: >>> Has anybody had experience controlling access to git repositories, for >>> example, to give users access but prevent some of the fo

Re: git dangerous operations on alioth

2013-03-01 Thread Thomas Goirand
On 02/28/2013 06:07 PM, Stefano Zacchiroli wrote: > On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: >> Has anybody had experience controlling access to git repositories, for >> example, to give users access but prevent some of the following >> dangerous operations? > Related to this,

Re: git dangerous operations on alioth

2013-03-01 Thread Thomas Goirand
On 02/28/2013 08:33 PM, Andrew Shadura wrote: > we'd have both hg and git in one unified interface. That is a very nice feature. I saw few sites having that, for example bitbucket, unfortunatley, bitbucket doesn't allow git anonymous checkout over http (it's only available with hg, if I understood

Re: git dangerous operations on alioth

2013-03-01 Thread Holger Levsen
On Donnerstag, 28. Februar 2013, Holger Levsen wrote: > signed commits, so you can identify unwanted bits and clean up in the very > care case that's actually needed? ^^ rare case -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact

Re: git dangerous operations on alioth

2013-02-28 Thread Henrique de Moraes Holschuh
On Thu, 28 Feb 2013, Holger Levsen wrote: > signed commits, so you can identify unwanted bits and clean up in the very > care case that's actually needed? Indeed. Secure git workflows are possible, although it is a relatively new development. Signed commits and pull requests are a very big part

Re: git dangerous operations on alioth

2013-02-28 Thread Holger Levsen
Hi, signed commits, so you can identify unwanted bits and clean up in the very care case that's actually needed? cheer,s Holger -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: htt

Re: git dangerous operations on alioth

2013-02-28 Thread Philipp Kern
On Thu, Feb 28, 2013 at 04:01:34PM +0600, Andrey Rahmatullin wrote: > On Thu, Feb 28, 2013 at 10:45:35AM +0100, Tollef Fog Heen wrote: > > > Has anybody had experience controlling access to git repositories, for > > > example, to give users access but prevent some of the following > > > dangerous o

Re: git dangerous operations on alioth

2013-02-28 Thread Daniel Pocock
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 28/02/13 20:20, Jonas Smedegaard wrote: > Quoting Daniel Pocock (2013-02-28 19:20:09) >> On 28/02/13 13:15, Simon McVittie wrote: >>> On 28/02/13 09:39, Daniel Pocock wrote: Has anybody had experience controlling access to git repositori

Re: git dangerous operations on alioth

2013-02-28 Thread Jonas Smedegaard
Quoting Daniel Pocock (2013-02-28 19:20:09) > On 28/02/13 13:15, Simon McVittie wrote: > > On 28/02/13 09:39, Daniel Pocock wrote: > >> Has anybody had experience controlling access to git repositories, > >> for example, to give users access but prevent some of the following > >> dangerous operat

Re: git dangerous operations on alioth

2013-02-28 Thread Daniel Pocock
On 28/02/13 13:15, Simon McVittie wrote: > On 28/02/13 09:39, Daniel Pocock wrote: >> Has anybody had experience controlling access to git repositories, for >> example, to give users access but prevent some of the following >> dangerous operations? > > If you look at it from the appropriate angle

Re: git dangerous operations on alioth

2013-02-28 Thread gregor herrmann
On Thu, 28 Feb 2013 12:51:33 +0100, Arno Töll wrote: > On 28.02.2013 11:07, Stefano Zacchiroli wrote: > > On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: > >> Has anybody had experience controlling access to git repositories, for > >> example, to give users access but prevent some o

Re: git dangerous operations on alioth

2013-02-28 Thread Andrew Shadura
Hello. On 28 February 2013 12:51, Arno Töll wrote: > Having that said the risk is real and it may be time to reconsider some > choices including the use of Alioth itself for those who do not believe > in openness. Chances are #700630 is going to rescue us all on that. > Maybe we could set-up our

Re: git dangerous operations on alioth

2013-02-28 Thread Simon McVittie
On 28/02/13 09:39, Daniel Pocock wrote: > Has anybody had experience controlling access to git repositories, for > example, to give users access but prevent some of the following > dangerous operations? Do you consider this to be a strong security measure against malicious changes, or a weak safet

Re: git dangerous operations on alioth

2013-02-28 Thread Arno Töll
Hi, On 28.02.2013 11:07, Stefano Zacchiroli wrote: > On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: >> Has anybody had experience controlling access to git repositories, for >> example, to give users access but prevent some of the following >> dangerous operations? > > Related to

Re: git dangerous operations on alioth

2013-02-28 Thread Stefano Zacchiroli
On Thu, Feb 28, 2013 at 10:39:26AM +0100, Daniel Pocock wrote: > Has anybody had experience controlling access to git repositories, for > example, to give users access but prevent some of the following > dangerous operations? Related to this, there is also the risk that a user will ssh on alioth a

Re: git dangerous operations on alioth

2013-02-28 Thread Andrey Rahmatullin
On Thu, Feb 28, 2013 at 10:45:35AM +0100, Tollef Fog Heen wrote: > > Has anybody had experience controlling access to git repositories, for > > example, to give users access but prevent some of the following > > dangerous operations? > > > > - prevent users pushing with the `--force' option > > (fr

Re: git dangerous operations on alioth

2013-02-28 Thread Dmitrijs Ledkovs
On 28 February 2013 09:39, Daniel Pocock wrote: > > > There was recently some discussion in pkg-javascript about how to give > more people access to the VCS (e.g. keeping the git repositories > logically organised under the pkg-javascript tree, but making write > access available to all DDs + alio

Re: git dangerous operations on alioth

2013-02-28 Thread Tollef Fog Heen
]] Daniel Pocock > Has anybody had experience controlling access to git repositories, for > example, to give users access but prevent some of the following > dangerous operations? > > - prevent users pushing with the `--force' option > (from the man page for git-push: "This can cause the remote r

git dangerous operations on alioth

2013-02-28 Thread Daniel Pocock
There was recently some discussion in pkg-javascript about how to give more people access to the VCS (e.g. keeping the git repositories logically organised under the pkg-javascript tree, but making write access available to all DDs + alioth guest users and not just those in the pkg-javascript UNI