As we reevaluate how to best support and maintain Staging Ref in the future, we encourage development teams using this environment to highlight their use cases in the following issue: https://gitlab.com/gitlab-com/gl-infra/software-delivery/framework/software-delivery-framework-issue-tracker/-/issues/36.

Skip to content
Snippets Groups Projects
Select Git revision
  • main default protected
  • 608-improve-gitlab-shell-logging-structure
  • ashmckenzie/update-golangci-setup
  • 762_use_workhorse_ssh_endpoint
  • fix-issue-708
  • id-use-workhorse-git-ssh-rpc
  • ashmckenzie/debug-yamux-issues
  • ag-remove-geo-ffs
  • aakriti.gupta-main-patch-64039
  • ashmckenzie/gssapi-fixes
  • 671-race-golang-1-x-failed-with-stdin-send-error-eof
  • igor.drozdov-main-patch-82081
  • ashmckenzie/include-metadata-in-access-finish-log-line
  • 660-job-failed-4563144016
  • id-bump-logrus
  • sh-ssh-certificates
  • tmp-geo-push-poc
  • igor.drozdov-main-patch-40896
  • tmp-kerberos-testing
  • id-test-agains-1.19
  • v14.39.0
  • v14.38.0
  • v14.37.0
  • v14.36.0
  • v14.35.0
  • v14.34.0
  • v14.33.0
  • v14.32.0
  • v14.31.0
  • v14.30.1
  • v14.30.0
  • v14.29.0
  • v14.28.0
  • v14.27.0
  • v14.26.0
  • v14.25.0
  • v14.24.1
  • v14.24.0
  • v14.23.0
  • v14.22.0
40 results

gitlab-shell

  • Clone with SSH
  • Clone with HTTPS
  • Forked from Igor Drozdov / Gitlab Shell
    1026 commits behind the upstream repository.
    Igor Drozdov's avatar
    Igor Drozdov authored
    - Update .tool-versions to Go 1.18.7
    - Remove secret from request headers
    a8a2d4c2
    History
    stage: Create
    group: Source Code
    info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments

    GitLab Shell

    GitLab Shell handles git SSH sessions for GitLab

    GitLab Shell handles git SSH sessions for GitLab and modifies the list of authorized keys. GitLab Shell is not a Unix shell nor a replacement for Bash or Zsh.

    When you access the GitLab server over SSH then GitLab Shell will:

    1. Limit you to predefined git commands (git push, git pull).
    2. Call the GitLab Rails API to check if you are authorized, and what Gitaly server your repository is on
    3. Copy data back and forth between the SSH client and the Gitaly server

    If you access a GitLab server over HTTP(S) you end up in gitlab-workhorse.

    An overview of the four cases described above:

    1. git pull over SSH -> gitlab-shell -> API call to gitlab-rails (Authorization) -> accept or decline -> establish Gitaly session
    2. git push over SSH -> gitlab-shell (git command is not executed yet) -> establish Gitaly session -> (in Gitaly) gitlab-shell pre-receive hook -> API call to gitlab-rails (authorization) -> accept or decline push

    Full feature list

    Code status

    pipeline status coverage report Code Climate

    Requirements

    GitLab Shell is written in Go, and needs a Go compiler to build. It still requires Ruby to build and test, but not to run.

    Download and install the current version of Go from https://golang.org/dl/

    We follow the Golang Release Policy of supporting the current stable version and the previous two major versions.

    Rate Limiting

    GitLab Shell performs rate-limiting by user account and project for git operations. GitLab Shell accepts git operation requests and then makes a call to the Rails rate-limiter (backed by Redis). If the user + project exceeds the rate limit then GitLab Shell will then drop further connection requests for that user + project.

    The rate-limiter is applied at the git command (plumbing) level. Each command has a rate limit of 600/minute. For example, git push has 600/minute and git pull has another 600/minute.

    Because they are using the same plumbing command git-upload-pack, git pull and git clone are in effect the same command for the purposes of rate-limiting.

    There is also a rate-limiter in place in Gitaly, but the calls will never be made to Gitaly if the rate limit is exceeded in Gitlab Shell (Rails).

    GitLab SaaS

    A diagram of the flow of gitlab-shell on GitLab.com:

    graph LR
        a2 --> b2
        a2  --> b3
        a2 --> b4
        b2 --> c1
        b3 --> c1
        b4 --> c1
        c2 --> d1
        c2 --> d2
        c2 --> d3
        d1 --> e1
        d2 --> e1
        d3 --> e1
        a1[Cloudflare] --> a2[TCP<br/> load balancer]
        e1[Git]
    
        subgraph HAProxy Fleet
        b2[HAProxy]
        b3[HAProxy]
        b4[HAProxy]
        end
    
        subgraph GKE
        c1[Internal TCP<br/> load balancer<br/>port 2222] --> c2[GitLab-shell<br/> pods]
        end
    
        subgraph Gitaly
        d1[Gitaly]
        d2[Gitaly]
        d3[Gitaly]
        end

    Releasing

    See PROCESS.md

    Contributing

    License

    See LICENSE.