Page MenuHomePhabricator

Proxy VCS HTTP requests
ClosedPublic

Authored by epriestley on Jan 25 2015, 4:42 PM.
Tags
None
Referenced Files
Unknown Object (File)
Wed, Dec 18, 10:25 AM
Unknown Object (File)
Fri, Dec 6, 6:37 AM
Unknown Object (File)
Wed, Dec 4, 1:07 AM
Unknown Object (File)
Thu, Nov 28, 7:52 AM
Unknown Object (File)
Thu, Nov 28, 7:52 AM
Unknown Object (File)
Thu, Nov 28, 7:43 AM
Unknown Object (File)
Thu, Nov 28, 7:33 AM
Unknown Object (File)
Oct 19 2024, 9:59 PM
Subscribers

Details

Reviewers
btrahan
Maniphest Tasks
T7019: Proxy HTTP VCS traffic
Commits
Restricted Diffusion Commit
rPfb5e50e6cc1f: Proxy VCS HTTP requests
Summary

Ref T7019. When we receive a git clone https:// (or git push on HTTP/S), and the repository is not local, proxy the request to the appropriate service.

This has scalability limits, but they are not more severe than the existing limits (T4369) and are about as abstracted as we can get them.

This doesn't fully work in a Phacility context because the commit hook does not know which instance it is running in, but that problem is not unique to HTTP.

Test Plan
  • Pushed and pulled a Git repo via proxy.
  • Pulled a Git repo normally.

Diff Detail

Repository
rP Phabricator
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

epriestley retitled this revision from to Proxy VCS HTTP requests.
epriestley updated this object.
epriestley edited the test plan for this revision. (Show Details)
epriestley added a reviewer: btrahan.

(To make this testable and less surprising, this follows the same proxying rules that the Conduit stuff does: if a repo is on a service, we always proxy, even if the service is locally.)

btrahan edited edge metadata.
This revision is now accepted and ready to land.Jan 27 2015, 10:22 PM
This revision was automatically updated to reflect the committed changes.