As we reevaluate how to best support and maintain Staging Ref in the future, we encourage development teams using this environment to highlight their use cases in the following issue: https://gitlab.com/gitlab-com/gl-infra/software-delivery/framework/software-delivery-framework-issue-tracker/-/issues/36.

Skip to content
Snippets Groups Projects
  1. Jan 02, 2024
  2. Nov 24, 2023
  3. Oct 12, 2023
  4. Sep 08, 2023
  5. Sep 07, 2023
  6. Sep 06, 2023
  7. Aug 02, 2023
  8. Jul 06, 2023
  9. Jun 29, 2023
  10. Jun 16, 2023
  11. Apr 13, 2023
  12. Apr 07, 2023
  13. Mar 07, 2023
  14. Feb 08, 2023
  15. Jan 27, 2023
  16. Jun 23, 2022
  17. May 05, 2022
  18. Apr 18, 2022
  19. Feb 02, 2022
  20. Sep 16, 2021
    • Kevin's avatar
      makefile: properly quote '$' in VERSION_STRING · 726945b3
      Kevin authored
      If git is not available or gitlab-shell is not built in a repository, it falls back the VERSION file. That command is not properly escaped and results in the message:
      
      > awk: cmd. line:1: Unexpected token
      
      When you remove the `2>/dev/null`. Escape the '$' characters to solve this.
      726945b3
  21. Sep 07, 2021
  22. Jul 26, 2021
  23. Jul 01, 2021
  24. May 17, 2021
    • Nick Thomas's avatar
      Fix opentracing setup for gitlab-sshd · de13980f
      Nick Thomas authored
      Previously, opentracing (if configured) was initialized late in the
      gitlab-shell process's lifespan, coming just before making a gRPC
      call to Gitaly.
      
      By moving the opentracing initialization to be at process startup, we
      make it available for the whole process lifecycle, which is very useful
      to gitlab-sshd, as it means we'll only call tracing.Initialize() once
      on process startup, rather than once per SSH connection.
      
      To get this working, we need to introduce a context to gitlab-sshd.
      This carries the client/service name, but also carries an initial
      correlation ID. The main outcome of this is that all calls to the
      authorized_keys endpoint from a given gitlab-sshd process will now
      share a correlation ID. I don't have a strong opinion about this either
      way.
      
      Changelog: fixed
      de13980f
  25. Apr 12, 2021
  26. Nov 05, 2020
  27. Oct 16, 2020
  28. Jun 06, 2020
  29. May 11, 2020
  30. Oct 18, 2019
  31. Oct 15, 2019
  32. Oct 08, 2019
  33. Aug 15, 2019
    • Patrick Bajao's avatar
      Replace symlinks with actual binaries · 41f919eb
      Patrick Bajao authored
      We had `gitlab-shell-authorized-keys-check` and
      `gitlab-shell-authorized-principals-check` as symlinks to
      `gitlab-shell` before.
      
      We determine the `Command` and `CommandArgs` that we build based
      on the `Name` of the `Executable`. We also use that to know which
      fallback ruby executable should we fallback to. We use
      `os.Executable()` to do that.
      
      `os.Executable()` behaves differently depending on OS. It may
      return the symlink or the target's name. That can result to a
      buggy behavior.
      
      The fix is to create binaries for each instead of using a symlink.
      That way we don't need to rely on `os.Executable()` to get the name.
      We pass the `Name` of the executable instead.
      41f919eb
  34. Jul 29, 2019
    • Patrick Bajao's avatar
      Support falling back to ruby version of checkers · aab85f36
      Patrick Bajao authored
      Rename the ruby scripts to have `-ruby` suffix and add a symlink
      for both to `./gitlab-shell`. The executable name will be used to
      determine how args will be parsed.
      
      For now, we only parse the arguments for gitlab-shell commands. If
      the executable is `gitlab-shell-authorized-keys-check` or
      `gitlab-shell-authorized-principals-check`, it'll always fallback
      to the ruby version.
      
      Ruby specs test the ruby script, the fallback from go to ruby and
      go implementation of both (still pending).
      aab85f36
  35. Jun 28, 2019
Loading