Revert "AsyncReceiveCommits: Move ReceiveCommits into Worker"

This reverts commit 095467aa8fa68a19749062517893601ef98072f9.

The reason for revert: pre-receive hook chain in ReceivePack must be
established before PreReceiveHook#onPreReceive() actually gets called
(in ctor of ARC) and not during the PreReceiveHook#onPreReceive() call.

rc.init() initializes the hooks and establishes the hook chain in
receive pack instance (eventually):

  void init() {
    for (ReceivePackInitializer i : initializers) {
      i.init(projectState.getNameKey(), rp);
    }
  }

SignedPushModule is one from the initializers:

  List<PreReceiveHook> hooks = new ArrayList<>(3);
  if (ps.isRequireSignedPush()) {
    hooks.add(SignedPushPreReceiveHook.Required.INSTANCE);
  }
  hooks.add(hook);
  hooks.add(rp.getPreReceiveHook());
  rp.setPreReceiveHook(PreReceiveHookChain.newChain(hooks));

However, after the move of rc.init() from ARC ctor to Worker ctor that
is called from onPreReceive(), the rc.init() gets actually called from
ReceivePack#service line 280:

  preReceive.onPreReceive(this, filterCommands(Result.NOT_ATTEMPTED));

The whole stack trace:

  AsyncReceiveCommits.onPreReceive(ReceivePack, Collection<ReceiveCommand>) line: 278
	ReceivePack.service() line: 280
	ReceivePack.receive(InputStream, OutputStream, OutputStream) line: 221
	Receive.runImpl() line: 104
	Receive(AbstractGitCommand).service() line: 97
	AbstractGitCommand.access$0(AbstractGitCommand) line: 86
	AbstractGitCommand$1.run() line: 63
	BaseCommand$TaskThunk.run() line: 456
	LoggingContextAwareRunnable.run() line: 83

So that the pre-receive chain is mutated as a side effect of
ReceiveCommits#init() in the preReceive instance variable of ReceivePack
instance but only during the invocation of the very first hook in this
class and thus this mutation became a no-op. As the consequence other
pre-receive hooks don't get called.

New acceptance test is added in follow-up change to avoid such
regression in future.

Test Plan:

1. Set up signed push for gerrit site
2. Enable signed push for project foo
3. Enable require signed push for project foo
4. Push to project foo without passing in --signed option should fail:

  $ git push gerrita HEAD:refs/for/master
  Counting objects: 3, done.
  Writing objects: 100% (3/3), 317 bytes | 317.00 KiB/s, done.
  Total 3 (delta 0), reused 0 (delta 0)
  remote: ERROR: Signed push is required

Bug: Issue 7750
Change-Id: Ia63ddb0554542a77d6c28b5d9e6093a0bbd56a0e
1 file changed
tree: 03331f9a9935aebccd0e6db0ac72c56897eb2702
  1. .settings/
  2. contrib/
  3. Documentation/
  4. gerrit-acceptance-framework/
  5. gerrit-acceptance-tests/
  6. gerrit-cache-h2/
  7. gerrit-cache-mem/
  8. gerrit-common/
  9. gerrit-elasticsearch/
  10. gerrit-extension-api/
  11. gerrit-gpg/
  12. gerrit-gwtdebug/
  13. gerrit-gwtexpui/
  14. gerrit-gwtui/
  15. gerrit-gwtui-common/
  16. gerrit-httpd/
  17. gerrit-index/
  18. gerrit-launcher/
  19. gerrit-lucene/
  20. gerrit-main/
  21. gerrit-oauth/
  22. gerrit-openid/
  23. gerrit-patch-commonsnet/
  24. gerrit-patch-jgit/
  25. gerrit-pgm/
  26. gerrit-plugin-api/
  27. gerrit-plugin-gwtui/
  28. gerrit-prettify/
  29. gerrit-reviewdb/
  30. gerrit-server/
  31. gerrit-sshd/
  32. gerrit-test-util/
  33. gerrit-util-cli/
  34. gerrit-util-http/
  35. gerrit-util-ssl/
  36. gerrit-war/
  37. lib/
  38. plugins/
  39. polygerrit-ui/
  40. ReleaseNotes/
  41. tools/
  42. website/
  43. .bazelproject
  44. .bazelrc
  45. .editorconfig
  46. .git-blame-ignore-revs
  47. .gitignore
  48. .gitmodules
  49. .mailmap
  50. .pydevproject
  51. 0001-Replace-native-http-git-_archive-with-Skylark-rules.patch
  52. BUILD
  53. COPYING
  54. INSTALL
  55. README.md
  56. SUBMITTING_PATCHES
  57. version.bzl
  58. WORKSPACE
README.md

Gerrit Code Review

Gerrit is a code review and project management tool for Git based projects.

Build Status

Objective

Gerrit makes reviews easier by showing changes in a side-by-side display, and allowing inline comments to be added by any reviewer.

Gerrit simplifies Git based project maintainership by permitting any authorized user to submit changes to the master Git repository, rather than requiring all approved changes to be merged in by hand by the project maintainer.

Documentation

For information about how to install and use Gerrit, refer to the documentation.

Source

Our canonical Git repository is located on googlesource.com. There is a mirror of the repository on Github.

Reporting bugs

Please report bugs on the issue tracker.

Contribute

Gerrit is the work of hundreds of contributors. We appreciate your help!

Please read the contribution guidelines.

Note that we do not accept Pull Requests via the Github mirror.

Getting in contact

The IRC channel on freenode is #gerrit. An archive is available at: echelog.com.

The Developer Mailing list is repo-discuss on Google Groups.

License

Gerrit is provided under the Apache License 2.0.

Build

Install Bazel and run the following:

    git clone --recursive https://gerrit.googlesource.com/gerrit
    cd gerrit && bazel build release

Install binary packages (Deb/Rpm)

The instruction how to configure GerritForge/BinTray repositories is here

On Debian/Ubuntu run:

    apt-get update & apt-get install gerrit=<version>-<release>

NOTE: release is a counter that starts with 1 and indicates the number of packages that have been released with the same version of the software.

On CentOS/RedHat run:

    yum clean all && yum install gerrit-<version>[-<release>]

On Fedora run:

    dnf clean all && dnf install gerrit-<version>[-<release>]

Use pre-built Gerrit images on Docker

Docker images of Gerrit are available on DockerHub

To run a CentOS 7 based Gerrit image:

    docker run -p 8080:8080 gerritforge/gerrit-centos7[:version]

To run a Ubuntu 15.04 based Gerrit image:

    docker run -p 8080:8080 gerritforge/gerrit-ubuntu15.04[:version]

NOTE: release is optional. Last released package of the version is installed if the release number is omitted.