Book Image

Learning Gerrit Code Review

By : Luca Milanesio
Book Image

Learning Gerrit Code Review

By: Luca Milanesio

Overview of this book

<p>Developing software is now more than ever before a globally distributed activity: agile methodologies that worked well enough with co-located teams now need to be empowered with additional tools such as Gerrit code review to allow the developers to share, discuss, and cooperate in a more social way, even with GitHub.</p> <p>Learning Gerrit Code Review is a practical guide that provides you with step-by-step instructions for the installation, configuration, and use of Gerrit code review. Using this book speeds up your adoption of Gerrit through the use of a unique, consolidated set of recipes ready to be used for LDAP authentication and to integrate Gerrit with Jenkins and GitHub.</p> <p>Learning Gerrit Code Review looks at the workflow benefits of code review in an agile development team, breaks it down into simple steps, and puts it into action without any hassle. It will guide you through the installation steps of Gerrit by showing you the most typical setup and configuration schemes used in private networks.</p> <p>You will also learn how to effectively use Gerrit with GitHub in order to provide the ability to add more consistent code review functionality to the social collaboration tools provided by the GitHub platform. Using the two tools together, you will be able to reuse your existing accounts and integrate your GitHub community into the development lifecycle while keeping in touch with external contributors.</p>
Table of Contents (17 chapters)
Learning Gerrit Code Review
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Third-party authentication options


At the time of writing this book, the support for third-party authentication systems outside the ones already mentioned is still quite limited. The next forthcoming Version 2.8 of Gerrit will introduce the concept of "pluggable authentication backend" that would provide a real integration with any external authentication system.

With this in mind, the only option is to put another HTTP frontend reverse proxy in front of Gerrit and manage the authentication externally. Gerrit will then get the user identity from a trusted HTTP header generated securely by the HTTP frontend.

Example – Apache HTTP frontend

By using Apache 2.4 as a HTTP frontend, we can use the following available authentication modules:

  • SQL database (mod_authn_dbd.c)

  • DBM files (mod_authn_dbm.c)

  • Password file (mod_authn_file.c)

  • Radius (mod_auth_radius.c)

  • Kerberos (mod_auth_kerb.so)

In addition to these free authentication modules, there are a number of existing commercial modules that also integrate...