The Gerrit server functionality can be extended by installing plugins. This page describes how plugins for Gerrit can be developed. See the overall Plugin Lifecycle document for how plugins can be hosted on gerrit-review.googlesource.com.
For JavaScript plugin development, consult with JavaScript Plugin Development guide.
Depending on how tightly the extension code is coupled with the Gerrit
server code, there is a distinction between plugins
and extensions
.
A plugin
in Gerrit is tightly coupled code that runs in the same
JVM as Gerrit. It has full access to all server internals. Plugins
are tightly coupled to a specific major.minor server version and
may require source code changes to compile against a different
server version.
Plugins may require a specific major.minor.patch server version and may need rebuild and revalidation across different patch levels. A different patch level may only add new API interfaces and never change or extend existing ones.
An extension
in Gerrit runs inside of the same JVM as Gerrit
in the same way as a plugin, but has limited visibility to the
server’s internals. The limited visibility reduces the extension’s
dependencies, enabling it to be compatible across a wider range
of server versions.
Most of this documentation refers to either type as a plugin.
Getting started
To get started with the development of a plugin, take a look at the samples in the examples plugin project.
This is a project that demonstrates the various features of the plugin API. It can be taken as an example to develop an own plugin.
When starting from this example one should take care to adapt the
Gerrit-ApiVersion
in the BUILD
to the version of Gerrit for which
the plugin is developed.
API
There are two different API formats offered against which plugins can be developed:
- gerrit-extension-api.jar
-
A stable but thin interface. Suitable for extensions that need to be notified of events, but do not require tight coupling to the internals of Gerrit. Extensions built against this API can expect to be binary compatible across a wide range of server versions.
- gerrit-plugin-api.jar
-
The complete internals of the Gerrit server, permitting a plugin to tightly couple itself and provide additional functionality that is not possible as an extension. Plugins built against this API are expected to break at the source code level between every major.minor Gerrit release. A plugin that compiles against 2.5 will probably need source code level changes to work with 2.6, 2.7, and so on.
Manifest
Plugins may provide optional description information with standard manifest fields:
Implementation-Title: Example plugin showing examples Implementation-Version: 1.0 Implementation-Vendor: Example, Inc.
ApiType
Plugins using the tightly coupled gerrit-plugin-api.jar
must
declare this API dependency in the manifest to gain access to server
internals. If no Gerrit-ApiType
is specified the stable extension
API will be assumed. This may cause ClassNotFoundExceptions when
loading a plugin that needs the plugin API.
Gerrit-ApiType: plugin
Explicit Registration
Plugins that use explicit Guice registration must name the Guice
modules in the manifest. Up to three modules can be named in the
manifest. Gerrit-Module
supplies bindings to the core server;
Gerrit-SshModule
supplies SSH commands to the SSH server (if
enabled); Gerrit-HttpModule
supplies servlets and filters to the HTTP
server (if enabled). If no modules are named automatic registration
will be performed by scanning all classes in the plugin JAR for
@Listen
and @Export("")
annotations.
Gerrit-Module: tld.example.project.CoreModuleClassName Gerrit-SshModule: tld.example.project.SshModuleClassName Gerrit-HttpModule: tld.example.project.HttpModuleClassName
Batch runtime
Gerrit can be run as a server, serving HTTP or SSH requests, or as an
offline program. Plugins can contribute Guice modules to this batch
runtime by binding Gerrit-BatchModule
to one of their classes.
The Guice injector is bound to less classes, and some Gerrit features
will be absent - on purpose.
This feature was originally introduced to support plugins during an offline reindexing task.
Gerrit-BatchModule: tld.example.project.CoreModuleClassName
In this runtime, only the module designated by Gerrit-BatchModule
is
enabled, not Gerrit-SysModule
.
Cross-Plugin communication
A plugin can optionally declare an API to be used by other plugins.
Gerrit-ApiModule: tld.example.project.APIClassName ---
Notably, when injecting 'DynamicItem,' 'DynamicSet,' or 'DynamicMap' defined by the API, a plugin can register new concrete implementations or replace existing ones. However, these are not the only classes available for consumption; API plugins can also define and provide interfaces and concrete classes for other plugins.
This enables plugins to influence other plugins by customizing or extending the their behaviour.
Gotchas and Limitations:
-
A
plugin A
depending on aplugin B
(declaring aGerrit-ApiModule
), should includeplugin B
as aneverlink
library in its BUILD file, as follows:``` java_library( name = "gerrit-pluginB-neverlink", neverlink = True, exports = ["//plugins/pluginB"], ) ```
The reason is that the `plugin B` dependency should not be included as a shaded jar of the plugin: Gerrit will load the dependency dynamically at runtime instead of packaging it in the consumer plugin fat jar.
-
Removing/renaming the plugin jar that defines the classes declared in the
Gerrit-ApiModule
is currently not supported. The behaviour in this case is unpredictable and depends on the specifics of the classes involved. -
An API plugin cannot depend on another API plugin.
Gerrit CI and Validation:
To build this as part of the gerrit-ci the plugin Api (in our example,
plugin B
) needs to be added as a dependency via the extra-plugins
property.
For example:
project:
name: plugin-A
jobs:
- 'plugin-{name}-bazel-{branch}':
extra-plugins: 'plugin-B'
branch:
- master
Additionally, for plugin A
to be verified by the gerrit-ci, the Jenkinsfile
also needs to be inclusive of the API dependency, as such:
pluginPipeline(
formatCheckId: 'gerritforge:plugin-A-format-3852e64366bb37d13b8baf8af9b15cfd38eb9227',
buildCheckId: 'gerritforge:plugin-A-3852e64366bb37d13b8baf8af9b15cfd38eb9227',
extraPlugins: ['plugin-B'])
Plugin Name
A plugin can optionally provide its own plugin name.
Gerrit-PluginName: replication
This is useful for plugins that contribute plugin-owned capabilities that
are stored in the project.config
file. Another use case is to be able to put
project specific plugin configuration section in project.config
. In this
case it is advantageous to reserve the plugin name to access the configuration
section in the project.config
file.
If Gerrit-PluginName
is omitted, then the plugin’s name is determined from
the plugin file name.
If a plugin provides its own name, then that plugin cannot be deployed multiple times under different file names on one Gerrit site.
For Maven driven plugins, the following line must be included in the pom.xml file:
<manifestEntries>
<Gerrit-PluginName>name</Gerrit-PluginName>
</manifestEntries>
For Bazel driven plugins, the following line must be included in the BUILD configuration file:
manifest_entries = [
'Gerrit-PluginName: name',
]
A plugin can get its own name injected at runtime:
public class MyClass {
private final String pluginName;
@Inject
public MyClass(@PluginName String pluginName) {
this.pluginName = pluginName;
}
[...]
}
A plugin can get its canonical web URL injected at runtime:
public class MyClass {
private final String url;
@Inject
public MyClass(@PluginCanonicalWebUrl String url) {
this.url = url;
}
[...]
}
The URL is composed of the server’s canonical web URL and the plugin’s
name, i.e. http://review.example.com:8080/plugin-name
.
The canonical web URL may be injected into any .jar plugin regardless of whether or not the plugin provides an HTTP servlet.
Plugin resources
Plugins are able to access their own resources without having to go through the implementation details on how they are packaged or deployed to Gerrit.
The following example shows a MyClass in a plugin that is able to access the last modified time of the "myresource" loaded.
public class MyClass {
@Inject
public MyClass(Plugin plugin) {
long myresourceTime = plugin.getContentScanner().getEntry("myresource").getTime();
}
[...]
}
Reload Method
If a plugin holds an exclusive resource that must be released before
loading the plugin again (for example listening on a network port or
acquiring a file lock) the manifest must declare Gerrit-ReloadMode
to be restart
. Otherwise the preferred method of reload
will
be used, as it enables the server to hot-patch an updated plugin
with no down time.
Gerrit-ReloadMode: restart
In either mode ('restart' or 'reload') any plugin or extension can be updated without restarting the Gerrit server. The difference is how Gerrit handles the upgrade:
- restart
-
The old plugin is completely stopped. All registrations of SSH commands and HTTP servlets are removed. All registrations of any extension points are removed. All registered LifecycleListeners have their
stop()
method invoked in reverse order. The new plugin is started, and registrations are made from the new plugin. There is a brief window where neither the old nor the new plugin is connected to the server. This means SSH commands and HTTP servlets will return not found errors, and the plugin will not be notified of events that occurred during the restart. - reload
-
The new plugin is started. Its LifecycleListeners are permitted to perform their
start()
methods. All SSH and HTTP registrations are atomically swapped out from the old plugin to the new plugin, ensuring the server never returns a not found error. All extension point listeners are atomically swapped out from the old plugin to the new plugin, ensuring no events are missed (however some events may still route to the old plugin if the swap wasn’t complete yet). The old plugin is stopped.
To reload/restart a plugin the plugin reload command can be used.
Init step
Plugins can contribute their own "init step" during the Gerrit init wizard. This is useful for guiding the Gerrit administrator through the settings needed by the plugin to work properly.
For instance plugins to integrate Jira issues to Gerrit changes may contribute their own "init step" to allow configuring the Jira URL, credentials and possibly verify connectivity to validate them.
Gerrit-InitStep: tld.example.project.MyInitStep
MyInitStep needs to follow the standard Gerrit InitStep syntax and behavior: writing to the console using the injected ConsoleUI and accessing / changing configuration settings using Section.Factory.
In addition to the standard Gerrit init injections, plugins receive the @PluginName String injection containing their own plugin name.
During their initialization plugins may get access to the
project.config
file of the All-Projects
project and they are able
to store configuration parameters in it. For this a plugin InitStep
can get com.google.gerrit.pgm.init.api.AllProjectsConfig
injected:
public class MyInitStep implements InitStep {
private final String pluginName;
private final ConsoleUI ui;
private final AllProjectsConfig allProjectsConfig;
@Inject
public MyInitStep(@PluginName String pluginName, ConsoleUI ui,
AllProjectsConfig allProjectsConfig) {
this.pluginName = pluginName;
this.ui = ui;
this.allProjectsConfig = allProjectsConfig;
}
@Override
public void run() throws Exception {
}
@Override
public void postRun() throws Exception {
ui.message("\n");
ui.header(pluginName + " Integration");
boolean enabled = ui.yesno(true, "By default enabled for all projects");
Config cfg = allProjectsConfig.load().getConfig();
if (enabled) {
cfg.setBoolean("plugin", pluginName, "enabled", enabled);
} else {
cfg.unset("plugin", pluginName, "enabled");
}
allProjectsConfig.save(pluginName, "Initialize " + pluginName + " Integration");
}
}
Bear in mind that the Plugin’s InitStep class will be loaded but the standard Gerrit runtime environment is not available and the plugin’s own Guice modules were not initialized. This means the InitStep for a plugin is not executed in the same way that the plugin executes within the server, and may mean a plugin author cannot trivially reuse runtime code during init.
For instance a plugin that wants to verify connectivity may need to statically call the constructor of their connection class, passing in values obtained from the Section.Factory rather than from an injected Config object.
Plugins' InitSteps are executed during the "Gerrit Plugin init" phase, after
the extraction of the plugins embedded in the distribution .war file into
$GERRIT_SITE/plugins
and before the site initialization or upgrade.
A plugin’s InitStep cannot refer to any Gerrit runtime objects injected at startup.
public class MyInitStep implements InitStep {
private final ConsoleUI ui;
private final Section.Factory sections;
private final String pluginName;
@Inject
public GitBlitInitStep(final ConsoleUI ui, Section.Factory sections, @PluginName String pluginName) {
this.ui = ui;
this.sections = sections;
this.pluginName = pluginName;
}
@Override
public void run() throws Exception {
ui.header("\nMy plugin");
Section mySection = getSection("myplugin", null);
mySection.string("Link name", "linkname", "MyLink");
}
@Override
public void postRun() throws Exception {
}
}
Classpath
Each plugin is loaded into its own ClassLoader, isolating plugins
from each other. A plugin or extension inherits the Java runtime
and the Gerrit API chosen by Gerrit-ApiType
(extension or plugin)
from the hosting server.
Plugins are loaded from a single JAR file. If a plugin needs additional libraries, it must include those dependencies within its own JAR. Plugins built using Maven may be able to use the shade plugin to package additional dependencies. Relocating (or renaming) classes should not be necessary due to the ClassLoader isolation.
Listening to Events
Certain operations in Gerrit trigger events. Plugins may receive notifications of these events by implementing the corresponding listeners.
-
com.google.gerrit.server.events.EventListener
:Allows to listen to events without user visibility restrictions. These are the same events that are also streamed by the gerrit stream-events command.
-
com.google.gerrit.server.events.UserScopedEventListener
:Allows to listen to events visible to the specified user. These are the same events that are also streamed by the gerrit stream-events command.
-
com.google.gerrit.extensions.events.AccountActivationListener
:User account got activated or deactivated
-
com.google.gerrit.extensions.events.LifecycleListener
:Plugin start and stop
-
com.google.gerrit.extensions.events.NewProjectCreatedListener
:Project creation
-
com.google.gerrit.extensions.events.ProjectDeletedListener
:Project deletion
-
com.google.gerrit.extensions.events.HeadUpdatedListener
:Update of HEAD on a project
-
com.google.gerrit.extensions.events.UsageDataPublishedListener
:Publication of usage data
-
com.google.gerrit.extensions.events.GitReferenceUpdatedListener
:A git reference was updated. A separate event for every ref updated in a BatchRefUpdate will be fired.
-
com.google.gerrit.extensions.events.GitBatchRefUpdateListener
:One or more git references were updated. Alternative to GitReferenceUpdatedListener. A single event will inform about all refs updated by a BatchRefUpdate. Will also be fired, if only a single ref was updated.
-
com.google.gerrit.extensions.events.GarbageCollectorListener
:Garbage collection ran on a project
-
com.google.gerrit.server.extensions.events.ChangeIndexedListener
:Update of the change secondary index
-
com.google.gerrit.server.extensions.events.CustomKeyedValueValidationListener
:Updates to custom keyed values
-
com.google.gerrit.server.extensions.events.AccountIndexedListener
:Update of the account secondary index
-
com.google.gerrit.server.extensions.events.GroupIndexedListener
:Update of the group secondary index
-
com.google.gerrit.server.extensions.events.ProjectIndexedListener
:Update of the project secondary index
-
com.google.gerrit.httpd.WebLoginListener
:User login or logout interactively on the Web user interface.
The event listener is under the Gerrit http package to automatically inherit the javax.servlet.http dependencies and allowing to influence the login or logout flow with additional redirections.
Sending Events to the Events Stream
Plugins may send events to the events stream where consumers of
Gerrit’s stream-events
ssh command will receive them.
To send an event, the plugin must invoke one of the postEvent
methods in the EventDispatcher
interface, passing an instance of
its own custom event class derived from
com.google.gerrit.server.events.Event
.
import com.google.gerrit.common.EventDispatcher;
import com.google.gerrit.exceptions.StorageException;
import com.google.gerrit.extensions.registration.DynamicItem;
import com.google.inject.Inject;
class MyPlugin {
private final DynamicItem<EventDispatcher> eventDispatcher;
@Inject
myPlugin(DynamicItem<EventDispatcher> eventDispatcher) {
this.eventDispatcher = eventDispatcher;
}
private void postEvent(MyPluginEvent event) {
try {
eventDispatcher.get().postEvent(event);
} catch (StorageException e) {
// error handling
}
}
}
Plugins which define new Events should register them via the
com.google.gerrit.server.events.EventTypes.register()
method.
This will make the EventType known to the system. Deserializing
events with the
com.google.gerrit.server.events.EventDeserializer
class requires
that the event be registered in EventTypes.
Modifying the Stream Event Flow
It is possible to modify the stream event flow from plugins by registering
an com.google.gerrit.server.events.EventDispatcher
. A plugin may register
a Dispatcher class to replace the internal Dispatcher. EventDispatcher is
a DynamicItem, so Gerrit may only have one copy.
Validation Listeners
Certain operations in Gerrit can be validated by plugins by implementing the corresponding listeners.
WorkQueue.TaskListeners
It is possible for plugins to listen to
com.google.gerrit.server.git.WorkQueue$Task`s directly before they run, and
directly after they complete. This may be used to delay task executions based
on custom criteria by blocking, likely on a lock or semaphore, inside
onStart(), and a lock/semaphore release in onStop(). Plugins may listen to
tasks by implementing a `com.google.gerrit.server.git.WorkQueue$TaskListener
and registering the new listener like this:
bind(TaskListener.class)
.annotatedWith(Exports.named("MyListener"))
.to(MyListener.class);
Change Message Modifier
com.google.gerrit.server.git.ChangeMessageModifier
:
plugins implementing this can modify commit message of the change being
submitted by Rebase Always and Cherry Pick submit strategies as well as
change being queried with COMMIT_FOOTERS option.
Merge Super Set Computation
The algorithm to compute the merge super set to detect changes that
should be submitted together can be customized by implementing
com.google.gerrit.server.git.MergeSuperSetComputation
.
MergeSuperSetComputation is a DynamicItem, so Gerrit may only have one
implementation.
Receive Pack Initializers
Plugins may provide ReceivePackInitializer instances, which will be invoked by Gerrit just before a ReceivePack instance will be used. Usually, plugins will make use of the setXXX methods on the ReceivePack to set additional properties on it.
The interactions with the core Gerrit ReceivePack initialization and between ReceivePackInitializers can be complex. Please read the ReceivePack Javadoc and Gerrit AsyncReceiveCommits implementation carefully.
Post Receive-Pack Hooks
Plugins may register PostReceiveHook instances in order to get notified when JGit successfully receives a pack. This may be useful for those plugins which would like to monitor changes in Git repositories.
Upload Pack Initializers
Plugins may provide UploadPackInitializer instances, which will be invoked by Gerrit just before a UploadPack instance will be used. Usually, plugins will make use of the setXXX methods on the UploadPack to set additional properties on it.
The interactions with the core Gerrit UploadPack initialization and between UploadPackInitializers can be complex. Please read the UploadPack Javadoc and Gerrit Upload/UploadFactory implementations carefully.
Pre Upload-Pack Hooks
Plugins may register PreUploadHook instances in order to get notified when JGit is about to upload a pack. This may be useful for those plugins which would like to monitor usage in Git repositories.
Post Upload-Pack Hooks
Plugins may register PostUploadHook instances in order to get notified after JGit is done uploading a pack.
SSH Commands
Plugins may provide commands that can be accessed through the SSH interface (extensions do not have this option).
Command implementations must extend the base class SshCommand:
import com.google.gerrit.sshd.SshCommand;
import com.google.gerrit.sshd.CommandMetaData;
@CommandMetaData(name="print", description="Print hello command")
class PrintHello extends SshCommand {
@Override
protected void run() {
stdout.print("Hello\n");
}
}
If no Guice modules are declared in the manifest, SSH commands may
use auto-registration by providing an @Export
annotation:
import com.google.gerrit.extensions.annotations.Export;
import com.google.gerrit.sshd.SshCommand;
@Export("print")
class PrintHello extends SshCommand {
@Override
protected void run() {
stdout.print("Hello\n");
}
}
If explicit registration is being used, a Guice module must be
supplied to register the SSH command and declared in the manifest
with the Gerrit-SshModule
attribute:
import com.google.gerrit.sshd.PluginCommandModule;
class MyCommands extends PluginCommandModule {
@Override
protected void configureCommands() {
command(PrintHello.class);
}
}
For a plugin installed as name helloworld
, the command implemented
by PrintHello class will be available to users as:
$ ssh -p 29418 review.example.com helloworld print
Multiple Commands bound to one implementation
Multiple SSH commands can be bound to the same implementation class. For example a Gerrit Shell plugin can bind different shell commands to the same implementation class:
public class SshShellModule extends PluginCommandModule {
@Override
protected void configureCommands() {
command("ls").to(ShellCommand.class);
command("ps").to(ShellCommand.class);
[...]
}
}
With the possible implementation:
public class ShellCommand extends SshCommand {
@Override
protected void run() throws UnloggedFailure {
String cmd = getName().substring(getPluginName().length() + 1);
ProcessBuilder proc = new ProcessBuilder(cmd);
Process cmd = proc.start();
[...]
}
}
And the call:
$ ssh -p 29418 review.example.com shell ls $ ssh -p 29418 review.example.com shell ps
Root Level Commands
Single command plugins are also supported. In this scenario plugin binds
SSH command to its own name. SshModule
must inherit from
SingleCommandPluginModule
class:
public class SshModule extends SingleCommandPluginModule {
@Override
protected void configure(LinkedBindingBuilder<Command> b) {
b.to(ShellCommand.class);
}
}
If the plugin above is deployed under sh.jar file in $site/plugins
directory, generic commands can be called without specifying the
actual SSH command. Note in the example below, that the called commands
ls
and ps
was not explicitly bound:
$ ssh -p 29418 review.example.com sh ls $ ssh -p 29418 review.example.com sh ps
Search Operators
Plugins can define new search operators to extend change searching by
implementing the ChangeQueryBuilder.ChangeOperatorFactory
interface
and registering it to an operator name in the plugin module’s
configure()
method. The search operator name is defined during
registration via the DynamicMap annotation mechanism. The plugin
name will get appended to the annotated name, with an underscore
in between, leading to the final operator name. An example
registration looks like this:
bind(ChangeOperatorFactory.class)
.annotatedWith(Exports.named("sample"))
.to(SampleOperator.class);
If this is registered in the myplugin
plugin, then the resulting
operator will be named sample_myplugin
.
The search operator itself is implemented by ensuring that the
create()
method of the class implementing the
ChangeQueryBuilder.ChangeOperatorFactory
interface returns a
Predicate<ChangeData>
. Here is a sample operator factory
definition which creates a MyPredicate
:
public class SampleOperator
implements ChangeQueryBuilder.ChangeOperatorFactory {
public static class MyPredicate extends PostFilterPredicate<ChangeData> {
...
}
@Override
public Predicate<ChangeData> create(ChangeQueryBuilder builder, String value)
throws QueryParseException {
return new MyPredicate(value);
}
}
Search Operands
Plugins can define new search operands to extend change searching.
Plugin methods implementing search operands (returning a
Predicate<ChangeData>
), must be defined on a class implementing
one of the ChangeQueryBuilder.ChangeOperandsFactory
interfaces
(.e.g., ChangeQueryBuilder.ChangeHasOperandFactory or
ChangeQueryBuilder.ChangeIsOperandFactory). The specific
ChangeOperandFactory
class must also be bound to the DynamicSet
from
a module’s configure()
method in the plugin.
The new operand, when used in a search would appear as:
operatorName:operandName_pluginName
A sample ChangeHasOperandFactory
class implementing, and registering, a
new has:sample_pluginName
operand is shown below:
public class SampleHasOperand implements ChangeHasOperandFactory {
public static class Module extends AbstractModule {
@Override
protected void configure() {
bind(ChangeHasOperandFactory.class)
.annotatedWith(Exports.named("sample")
.to(SampleHasOperand.class);
}
}
@Override
public Predicate<ChangeData> create(ChangeQueryBuilder builder)
throws QueryParseException {
return new HasSamplePredicate();
}
}
Command Options
Plugins can provide additional options for each of the gerrit ssh and the
REST API commands by implementing the DynamicBean interface and registering
it to a command class name in the plugin module’s configure()
method. The
plugin’s name will be prepended to the name of each @Option annotation found
on the DynamicBean object provided by the plugin. The example below shows a
plugin that adds an option to log a value from the gerrit 'ban-commits'
ssh command.
public class SshModule extends AbstractModule {
private static final FluentLogger logger = FluentLogger.forEnclosingClass();
@Override
protected void configure() {
bind(DynamicOptions.DynamicBean.class)
.annotatedWith(Exports.named(
com.google.gerrit.sshd.commands.BanCommitCommand.class))
.to(BanOptions.class);
}
public static class BanOptions implements DynamicOptions.DynamicBean {
@Option(name = "--log", aliases = { "-l" }, usage = "Say Hello in the Log")
private void parse(String arg) {
logger.atSevere().log("Say Hello in the Log %s", arg);
}
}
}
To provide additional Guice bindings for options to a command in another classloader, bind a ModulesClassNamesProvider which provides the name of your Modules needed for your DynamicBean in the other classLoader.
Do this by binding to the name of the command you are going to bind to and providing an Iterable of Module names to instantiate and add to the Injector used to instantiate the DynamicBean in the other classLoader. This interface supports running LifecycleListeners which are defined by the Modules being provided. The duration of the lifecycle starts when a ssh or http request starts and ends when the request completes.
bind(DynamicOptions.DynamicBean.class)
.annotatedWith(Exports.named(
"com.google.gerrit.plugins.otherplugin.command"))
.to(MyOptionsModulesClassNamesProvider.class);
static class MyOptionsModulesClassNamesProvider implements DynamicOptions.ModulesClassNamesProvider {
@Override
public String getClassName() {
return "com.googlesource.gerrit.plugins.myplugin.CommandOptions";
}
@Override
public Iterable<String> getModulesClassNames()() {
return "com.googlesource.gerrit.plugins.myplugin.MyOptionsModule";
}
}
Plugins can receive a bean object for each of the gerrit ssh and the REST API
commands by implementing BeanParseListener interface and registering it to a
command class name in the plugin module’s configure()
method. The below
example shows a plugin that always limits the number of projects returned
by the ls-projects SSH command.
protected static class PluginModule extends AbstractModule {
@Override
public void configure() {
bind(DynamicOptions.DynamicBean.class)
.annotatedWith(Exports.named(ListProjectsCommand.class))
.to(ListProjectsCommandBeanListener.class);
}
protected static class ListProjectsCommandBeanListener
implements DynamicOptions.BeanParseListener {
@Override
public void onBeanParseStart(String plugin, Object bean) {
ListProjectsCommand command = (ListProjectsCommand) bean;
command.impl.setLimit(1);
}
@Override
public void onBeanParseEnd(String plugin, Object bean) {}
}
}
The below example shows a plugin that always limits the number of projects returned by the /projects/ REST API.
protected static class PluginModule extends AbstractModule {
@Override
public void configure() {
bind(DynamicOptions.DynamicBean.class)
.annotatedWith(Exports.named(ListProjects.class))
.to(ListProjectsBeanListener.class);
}
protected static class ListProjectsBeanListener
implements DynamicOptions.BeanParseListener {
@Override
public void onBeanParseStart(String plugin, Object bean) {
ListProjects listProjects = (ListProjects) bean;
listProjects.setLimit(1);
}
@Override
public void onBeanParseEnd(String plugin, Object bean) {}
}
}
Calling Command Options
Within an OptionHandler, during the processing of an option, plugins can provide and call extra parameters on the current command during parsing simulating as if they had been passed from the command line originally.
To call additional parameters from within an option handler, instantiate the com.google.gerrit.util.cli.CmdLineParser.Parameters class with the existing parameters, and then call callParameters() with the additional parameters to be parsed. OptionHandlers may optionally pass this class to other methods which may then both parse/consume more parameters and call additional parameters.
When calling command options not provided by your plugin, there is always a risk that the options may not exist, perhaps because the options being called are to be provided by another plugin, and said plugin is not currently installed. To protect against this situation, it is possible to define an option as being dependent on other options using the @RequiresOptions() annotation. If the required options are not all not currently present, then the dependent option will not be available or visible in the help.
The example below shows a plugin that adds a "--special" option (perhaps for use with the Query command) that calls (and requires) the "--format json" option.
public class JsonOutputOptionHandler<T> extends OptionHandler<T> {
protected com.google.gerrit.util.cli.CmdLineParser.MyParser myParser;
public JsonOutputOptionHandler(CmdLineParser parser, OptionDef option, Setter<? super T> setter) {
super(parser, option, setter);
myParser = (com.google.gerrit.util.cli.CmdLineParser.MyParser) owner;
}
@Override
public int parseArguments(org.kohsuke.args4j.spi.Parameters params) throws CmdLineException {
new Parameters(params, myParser).callParameters("--format", "json");
setter.addValue(true);
return 0; // we didn't consume any additional args
}
@Override
public String getDefaultMetaVariable() {
...
}
}
@RequiresOptions("--format")
@Option(
name = "--special",
usage = "output results using json",
handler = JsonOutputOptionHandler.class
)
boolean json;
Change Attributes
ChangePluginDefinedInfoFactory
Plugins can provide additional attributes to be returned from the Get Change and
Query Change APIs by implementing the ChangePluginDefinedInfoFactory
interface
and adding it to the DynamicSet
in the plugin module’s configure()
method.
The new attribute(s) will be output under a plugin
attribute in the change
output. This can be further controlled by registering a class containing @Option
declarations as a DynamicBean
, annotated with the HTTP/SSH commands on
which the options should be available.
The example below shows a plugin that adds two attributes (exampleName
and
changeValue
), to the change query output, when the query command is provided
the --myplugin-name—all
option.
public class Module extends AbstractModule {
@Override
protected void configure() {
// Register attribute factory.
DynamicSet.bind(binder(), ChangePluginDefinedInfoFactory.class)
.to(AttributeFactory.class);
// Register options for GET /changes/X/change and /changes/X/detail.
bind(DynamicBean.class)
.annotatedWith(Exports.named(GetChange.class))
.to(MyChangeOptions.class);
// Register options for GET /changes/?q=...
bind(DynamicBean.class)
.annotatedWith(Exports.named(QueryChanges.class))
.to(MyChangeOptions.class);
// Register options for ssh gerrit query.
bind(DynamicBean.class)
.annotatedWith(Exports.named(Query.class))
.to(MyChangeOptions.class);
}
}
public class MyChangeOptions implements DynamicBean {
@Option(name = "--all", usage = "Include plugin output")
public boolean all = false;
}
public class AttributeFactory implements ChangePluginDefinedInfoFactory {
protected MyChangeOptions options;
public class PluginAttribute extends PluginDefinedInfo {
public String exampleName;
public String changeValue;
public PluginAttribute(ChangeData c) {
this.exampleName = "Attribute Example";
this.changeValue = Integer.toString(c.getId().get());
}
}
@Override
public Map<Change.Id, PluginDefinedInfo> createPluginDefinedInfos(
Collection<ChangeData> cds, BeanProvider bp, String plugin) {
if (options == null) {
options = (MyChangeOptions) bp.getDynamicBean(plugin);
}
Map<Change.Id, PluginDefinedInfo> out = new HashMap<>();
if (options.all) {
cds.forEach(cd -> out.put(cd.getId(), new PluginAttribute(cd)));
return out;
}
return ImmutableMap.of();
}
}
Example:
$ ssh -p 29418 localhost gerrit query --myplugin-name--all "change:1" --format json { "url" : "http://localhost:8080/1", "plugins" : [ { "name" : "myplugin-name", "exampleName" : "Attribute Example", "changeValue" : "1" } ], ... } $ curl http://localhost:8080/changes/1?myplugin-name--all { "_number": 1, ... "plugins": [ { "name": "myplugin-name", "example_name": "Attribute Example", "change_value": "1" } ], ... }
Runtime exceptions generated by the implementors of ChangePluginDefinedInfoFactory are encapsulated in PluginDefinedInfo objects which are part of SSH/REST query output.
Implementors of the ChangePluginDefinedInfoFactory
interface should check whether
they need to contribute to the change ETag computation
to prevent callers using ETags from potentially seeing outdated plugin attributes.
Simple Configuration in gerrit.config
In Gerrit, global configuration is stored in the gerrit.config
file.
If a plugin needs global configuration, this configuration should be
stored in a plugin
subsection in the gerrit.config
file.
This approach of storing the plugin configuration is only suitable for
plugins that have a simple configuration that only consists of
key-value pairs. With this approach it is not possible to have
subsections in the plugin configuration. Plugins that require a complex
configuration need to store their configuration in their
own configuration file where they can make use of
subsections. On the other hand storing the plugin configuration in a
'plugin' subsection in the gerrit.config
file has the advantage that
administrators have all configuration parameters in one file, instead
of having one configuration file per plugin.
To avoid conflicts with other plugins, it is recommended that plugins
only use the plugin
subsection with their own name. For example the
helloworld
plugin should store its configuration in the
plugin.helloworld
subsection:
[plugin "helloworld"] language = Latin
Via the com.google.gerrit.server.config.PluginConfigFactory
class a
plugin can easily access its configuration and there is no need for a
plugin to parse the gerrit.config
file on its own:
@Inject
private com.google.gerrit.server.config.PluginConfigFactory cfg;
[...]
String language = cfg.getFromGerritConfig("helloworld")
.getString("language", "English");
Configuration in own config file
Plugins can store their configuration in an own configuration file.
This makes sense if the plugin configuration is rather complex and
requires the usage of subsections. Plugins that have a simple
key-value pair configuration can store their configuration in a
plugin
subsection of the gerrit.config
file.
The plugin configuration file must be named after the plugin and must
be located in the etc
folder of the review site. For example a
configuration file for a default-reviewer
plugin could look like
this:
[branch "refs/heads/master"] reviewer = Project Owners reviewer = john.doe@example.com [match "file:^.*\.txt"] reviewer = My Info Developers
Plugins that have sensitive configuration settings can store those settings in
an own secure configuration file. The plugin’s secure configuration file must be
named after the plugin and must be located in the etc
folder of the review
site. For example a secure configuration file for a default-reviewer
plugin
could look like this:
[auth] password = secret
Via the com.google.gerrit.server.config.PluginConfigFactory
class a
plugin can easily access its configuration:
@Inject
private com.google.gerrit.server.config.PluginConfigFactory cfg;
[...]
String[] reviewers = cfg.getGlobalPluginConfig("default-reviewer")
.getStringList("branch", "refs/heads/master", "reviewer");
String password = cfg.getGlobalPluginConfig("default-reviewer")
.getString("auth", null, "password");
Simple Project Specific Configuration in project.config
In Gerrit, project specific configuration is stored in the project’s
project.config
file on the refs/meta/config
branch. If a plugin
needs configuration on project level (e.g. to enable its functionality
only for certain projects), this configuration should be stored in a
plugin
subsection in the project’s project.config
file.
This approach of storing the plugin configuration is only suitable for
plugins that have a simple configuration that only consists of
key-value pairs. With this approach it is not possible to have
subsections in the plugin configuration. Plugins that require a complex
configuration need to store their configuration in their
own configuration file where they
can make use of subsections. On the other hand storing the plugin
configuration in a 'plugin' subsection in the project.config
file has
the advantage that project owners have all configuration parameters in
one file, instead of having one configuration file per plugin.
To avoid conflicts with other plugins, it is recommended that plugins
only use the plugin
subsection with their own name. For example the
helloworld
plugin should store its configuration in the
plugin.helloworld
subsection:
[plugin "helloworld"] enabled = true
Via the com.google.gerrit.server.config.PluginConfigFactory
class a
plugin can easily access its project specific configuration and there
is no need for a plugin to parse the project.config
file on its own:
@Inject
private com.google.gerrit.server.config.PluginConfigFactory cfg;
[...]
boolean enabled = cfg.getFromProjectConfig(project, "helloworld")
.getBoolean("enabled", false);
It is also possible to get missing configuration parameters inherited from the parent projects:
@Inject
private com.google.gerrit.server.config.PluginConfigFactory cfg;
[...]
boolean enabled = cfg.getFromProjectConfigWithInheritance(project, "helloworld")
.getBoolean("enabled", false);
Project owners can edit the project configuration by fetching the
refs/meta/config
branch, editing the project.config
file and
pushing the commit back.
Plugin configuration values that are stored in the project.config
file can be exposed in the ProjectInfoScreen to allow project owners
to see and edit them from the UI.
For this an instance of ProjectConfigEntry
needs to be bound for each
parameter. The export name must be a valid Git variable name. The
variable name is case-insensitive, allows only alphanumeric characters
and '-', and must start with an alphabetic character.
The example below shows how the parameters plugin.helloworld.enabled
and plugin.helloworld.language
are bound to be editable from the
Web UI. For the parameter plugin.helloworld.enabled
"Enable Greeting"
is provided as display name and the default value is set to true
.
For the parameter plugin.helloworld.language
"Preferred Language"
is provided as display name and "en" is set as default value.
class Module extends AbstractModule {
@Override
protected void configure() {
bind(ProjectConfigEntry.class)
.annotatedWith(Exports.named("enabled"))
.toInstance(new ProjectConfigEntry("Enable Greeting", true));
bind(ProjectConfigEntry.class)
.annotatedWith(Exports.named("language"))
.toInstance(new ProjectConfigEntry("Preferred Language", "en"));
}
}
By overwriting the onUpdate
method of ProjectConfigEntry
plugins
can be notified when this configuration parameter is updated on a
project.
Referencing groups in project.config
Plugins can refer to groups so that when they are renamed, the project
config will also be updated in this section. The proper format to use is
the same as for any other group reference in the project.config
, as shown below.
group group_name
The file groups
must also contains the mapping of the group name and its UUID,
refer to file groups
Project Specific Configuration in own config file
Plugins can store their project specific configuration in an own
configuration file in the projects refs/meta/config
branch.
This makes sense if the plugins project specific configuration is
rather complex and requires the usage of subsections. Plugins that
have a simple key-value pair configuration can store their project
specific configuration in a
plugin
subsection of the project.config
file.
The plugin configuration file in the refs/meta/config
branch must be
named after the plugin. For example a configuration file for a
default-reviewer
plugin could look like this:
[branch "refs/heads/master"] reviewer = Project Owners reviewer = john.doe@example.com [match "file:^.*\.txt"] reviewer = My Info Developers
Via the com.google.gerrit.server.config.PluginConfigFactory
class a
plugin can easily access its project specific configuration:
@Inject
private com.google.gerrit.server.config.PluginConfigFactory cfg;
[...]
String[] reviewers = cfg.getProjectPluginConfig(project, "default-reviewer")
.getStringList("branch", "refs/heads/master", "reviewer");
It is also possible to get missing configuration parameters inherited from the parent projects:
@Inject
private com.google.gerrit.server.config.PluginConfigFactory cfg;
[...]
String[] reviewers = cfg.getProjectPluginConfigWithInheritance(project, "default-reviewer")
.getStringList("branch", "refs/heads/master", "reviewer");
Project owners can edit the project configuration by fetching the
refs/meta/config
branch, editing the <plugin-name>.config
file and
pushing the commit back.
React on changes in project configuration
If a plugin wants to react on changes in the project configuration, it
can implement a GitReferenceUpdatedListener
and filter on events for
the refs/meta/config
branch:
public class MyListener implements GitReferenceUpdatedListener {
private final MetaDataUpdate.Server metaDataUpdateFactory;
@Inject
MyListener(MetaDataUpdate.Server metaDataUpdateFactory) {
this.metaDataUpdateFactory = metaDataUpdateFactory;
}
@Override
public void onGitReferenceUpdated(Event event) {
if (event.getRefName().equals(RefNames.REFS_CONFIG)) {
Project.NameKey p = new Project.NameKey(event.getProjectName());
try {
ProjectConfig oldCfg = parseConfig(p, event.getOldObjectId());
ProjectConfig newCfg = parseConfig(p, event.getNewObjectId());
if (oldCfg != null && newCfg != null
&& !oldCfg.getProject().getSubmitType().equals(newCfg.getProject().getSubmitType())) {
// submit type has changed
...
}
} catch (IOException | ConfigInvalidException e) {
...
}
}
}
private ProjectConfig parseConfig(Project.NameKey p, String idStr)
throws IOException, ConfigInvalidException, RepositoryNotFoundException {
ObjectId id = ObjectId.fromString(idStr);
if (ObjectId.zeroId().equals(id)) {
return null;
}
return ProjectConfig.read(metaDataUpdateFactory.create(p), id);
}
}
Trace Event origin
When plugins are installed in a multi-master setups it can be useful to know
the Gerrit instanceId
of the server that has generated an Event.
E.g. A plugin that sends an instance message for every comment on a change may want to react only if the event is generated on the local Gerrit master, for avoiding duplicating the notifications.
If instanceId is set, each Event will contain its
origin in the instanceId
field.
Here and example of ref-updated JSON event payload with instanceId
:
{
"submitter": {
"name": "Administrator",
"email": "admin@example.com",
"username": "admin"
},
"refUpdate": {
"oldRev": "a69fc95c7aad5ad41c618d31548b8af835d2959a",
"newRev": "31da6556d638a74e5370b62f83e8007f94abb7c6",
"refName": "refs/changes/01/1/meta",
"project": "test"
},
"type": "ref-updated",
"eventCreatedOn": 1588849085,
"instanceId": "instance1"
}
Plugin Owned Capabilities
Plugins may provide their own capabilities and restrict usage of SSH
commands or UiAction
to the users who are granted those capabilities.
Plugins define the capabilities by overriding the CapabilityDefinition
abstract class:
public class PrintHelloCapability extends CapabilityDefinition {
@Override
public String getDescription() {
return "Print Hello";
}
}
If no Guice modules are declared in the manifest, capability may
use auto-registration by providing an @Export
annotation:
@Export("printHello")
public class PrintHelloCapability extends CapabilityDefinition {
[...]
}
Otherwise the capability must be bound in a plugin module:
public class HelloWorldModule extends AbstractModule {
@Override
protected void configure() {
bind(CapabilityDefinition.class)
.annotatedWith(Exports.named("printHello"))
.to(PrintHelloCapability.class);
}
}
With a plugin-owned capability defined in this way, it is possible to restrict
usage of an SSH command or UiAction
to members of the group that were granted
this capability in the usual way, using the RequiresCapability
annotation:
@RequiresCapability("printHello")
@CommandMetaData(name="print", description="Print greeting in different languages")
public final class PrintHelloWorldCommand extends SshCommand {
[...]
}
Or with UiAction
:
@RequiresCapability("printHello")
public class SayHelloAction extends UiAction<RevisionResource>
implements RestModifyView<RevisionResource, SayHelloAction.Input> {
[...]
}
Capability scope was introduced to differentiate between plugin-owned
capabilities and core capabilities. Per default the scope of the
@RequiresCapability
annotation is CapabilityScope.CONTEXT
, that means:
-
when
@RequiresCapability
is used within a plugin the scope of the capability is assumed to be that plugin. -
If
@RequiresCapability
is used within the core Gerrit Code Review server (and thus is outside of a plugin) the scope is the core server and will use theGlobalCapability
known to Gerrit Code Review server.
If a plugin needs to use a core capability name (e.g. "administrateServer")
this can be specified by setting scope = CapabilityScope.CORE
:
@RequiresCapability(value = "administrateServer", scope =
CapabilityScope.CORE)
[...]
Post Review Extensions
By implementing the com.google.gerrit.server.restapi.change.OnPostReview
interface plugins can extend the change message that is being posted when the
post review REST endpoint is invoked.
This is useful if certain approvals have a special meaning (e.g. custom logic that is implemented in Prolog submit rules, signal for triggering an action like running CI etc.), as it allows the plugin to tell users about this meaning in the change message. This makes the effect of a given approval more transparent to the user.
UI Extension
Actions
Plugins can contribute UI actions on core Gerrit pages. This is useful for workflow customization or exposing plugin functionality through the UI in addition to SSH commands and the REST API.
For instance a plugin to integrate Jira with Gerrit changes may contribute a "File bug" button to allow filing a bug from the change page or plugins to integrate continuous integration systems may contribute a "Schedule" button to allow a CI build to be scheduled manually from the patch set panel.
Two different places on core Gerrit pages are supported:
-
Change screen
-
Project info screen
Plugins contribute UI actions by implementing the UiAction
interface:
@RequiresCapability("printHello")
class HelloWorldAction implements UiAction<RevisionResource>,
RestModifyView<RevisionResource, HelloWorldAction.Input> {
static class Input {
boolean french;
String message;
}
private Provider<CurrentUser> user;
@Inject
HelloWorldAction(Provider<CurrentUser> user) {
this.user = user;
}
@Override
public String apply(RevisionResource rev, Input input) {
final String greeting = input.french
? "Bonjour"
: "Hello";
return String.format("%s %s from change %s, patch set %d!",
greeting,
Strings.isNullOrEmpty(input.message)
? Objects.firstNonNull(user.get().getUserName(), "world")
: input.message,
rev.getChange().getId().toString(),
rev.getPatchSet().getPatchSetId());
}
@Override
public Description getDescription(
RevisionResource resource) {
return new Description()
.setLabel("Say hello")
.setTitle("Say hello in different languages");
}
}
Sometimes plugins may want to be able to change the state of a patch set or
change in the UiAction.apply()
method and reflect these changes on the core
UI. For example a buildbot plugin which exposes a 'Schedule' button on the
patch set panel may want to disable that button after the build was scheduled
and update the tooltip of that button. But because of Gerrit’s caching
strategy the following must be taken into consideration.
The browser is allowed to cache the UiAction
information until something on
the change is modified. More accurately the change row needs to be modified in
the database to have a more recent lastUpdatedOn
or a new rowVersion
, or
the refs/meta/config of the project or any parents needs to change to a new
SHA-1. The ETag SHA-1 computation code can be found in the
ChangeResource.getETag()
method.
The easiest way to accomplish this is to update lastUpdatedOn
of the change:
@Override
public Object apply(RevisionResource rcrs, Input in) {
// schedule a build
[...]
// update change
try (BatchUpdate bu = batchUpdateFactory.create(
project.getNameKey(), user, TimeUtil.nowTs())) {
bu.addOp(change.getId(), new BatchUpdate.Op() {
@Override
public boolean updateChange(ChangeContext ctx) {
return true;
}
});
bu.execute();
}
[...]
}
UiAction
must be bound in a plugin module:
public class Module extends AbstractModule {
@Override
protected void configure() {
install(new RestApiModule() {
@Override
protected void configure() {
post(REVISION_KIND, "say-hello")
.to(HelloWorldAction.class);
}
});
}
}
The module above must be declared in the pom.xml
for Maven driven
plugins:
<manifestEntries>
<Gerrit-Module>com.googlesource.gerrit.plugins.cookbook.Module</Gerrit-Module>
</manifestEntries>
or in the BUILD
configuration file for Bazel driven plugins:
manifest_entries = [
'Gerrit-Module: com.googlesource.gerrit.plugins.cookbook.Module',
]
In some use cases more user input must be gathered, for that UiAction
can be
combined with the JavaScript API. This would display a small popup near the
activation button to gather additional input from the user. The JS file is
typically put in the static
folder within the plugin’s directory:
Gerrit.install(function(self) {
function onSayHello(c) {
var f = c.textfield();
var t = c.checkbox();
var b = c.button('Say hello', {onclick: function(){
c.call(
{message: f.value, french: t.checked},
function(r) {
c.hide();
window.alert(r);
c.refresh();
});
}});
c.popup(c.div(
c.prependLabel('Greeting message', f),
c.br(),
c.label(t, 'french'),
c.br(),
b));
f.focus();
}
self.onAction('revision', 'say-hello', onSayHello);
});
The JS module must be exposed as a WebUiPlugin
and bound as
an HTTP Module:
public class HttpModule extends ServletModule {
@Override
protected void configureServlets() {
DynamicSet.bind(binder(), WebUiPlugin.class)
.toInstance(new JavaScriptPlugin("hello.js"));
}
}
The HTTP module above must be declared in the pom.xml
for Maven
driven plugins:
<manifestEntries>
<Gerrit-HttpModule>com.googlesource.gerrit.plugins.cookbook.HttpModule</Gerrit-HttpModule>
</manifestEntries>
or in the BUILD
configuration file for Bazel driven plugins
manifest_entries = [
'Gerrit-HttpModule: com.googlesource.gerrit.plugins.cookbook.HttpModule',
]
If UiAction
is annotated with the @RequiresCapability
annotation, then the
capability check is done during the UiAction
gathering, so the plugin author
doesn’t have to set UiAction.Description.setVisible()
explicitly in this
case.
The following prerequisites must be met, to satisfy the capability check:
-
user is authenticated
-
user is a member of a group which has the
Administrate Server
capability, or -
user is a member of a group which has the required capability
The apply
method is called when the button is clicked. If UiAction
is
combined with JavaScript API (its own JavaScript function is provided),
then a popup dialog is normally opened to gather additional user input.
A new button is placed on the popup dialog to actually send the request.
Every UiAction
exposes a REST API endpoint. The endpoint from the example above
can be accessed from any REST client, i. e.:
$ curl -X POST -H "Content-Type: application/json" \ -d '{message: "François", french: true}' \ --user joe:secret \ http://host:port/a/changes/1/revisions/1/cookbook~say-hello "Bonjour François from change 1, patch set 1!"
A special case is to bind an endpoint without a view name. This is
particularly useful for DELETE
requests:
public class Module extends AbstractModule {
@Override
protected void configure() {
install(new RestApiModule() {
@Override
protected void configure() {
delete(PROJECT_KIND)
.to(DeleteProject.class);
}
});
}
}
For a UiAction
bound this way, a JS API function can be provided.
Currently only one restriction exists: per plugin only one UiAction
can be bound per resource without view name. To define a JS function
for the UiAction
, "/" must be used as the name:
Gerrit.install(function(self) {
function onDeleteProject(c) {
[...]
}
self.onAction('project', '/', onDeleteProject);
});
Action Visitors
In addition to providing new actions, plugins can have fine-grained control over the ActionInfo map, modifying or removing existing actions, including those contributed by core.
Visitors are provided the ActionInfo,
which is mutable, along with copies of the
ChangeInfo and
RevisionInfo. They can modify the
action, or return false
to exclude it from the resulting map.
These operations only affect the action buttons that are displayed in the UI; the underlying REST API endpoints are not affected. Multiple plugins may implement the visitor interface, but the order in which they are run is undefined.
For example, to exclude "Cherry-Pick" only from certain projects, and rename "Abandon":
public class MyActionVisitor implements ActionVisitor {
@Override
public boolean visit(String name, ActionInfo actionInfo,
ChangeInfo changeInfo) {
if (name.equals("abandon")) {
actionInfo.label = "Drop";
}
return true;
}
@Override
public boolean visit(String name, ActionInfo actionInfo,
ChangeInfo changeInfo, RevisionInfo revisionInfo) {
if (project.startsWith("some-team/") && name.equals("cherrypick")) {
return false;
}
return true;
}
}
Top Menu Extensions
Plugins can contribute items to Gerrit’s top menu.
A single top menu extension can have multiple elements and will be put as the last element in Gerrit’s top menu.
Plugins define the top menu entries by implementing TopMenu
interface:
public class MyTopMenuExtension implements TopMenu {
@Override
public List<MenuEntry> getEntries() {
return Lists.newArrayList(
new MenuEntry("Top Menu Entry", Lists.newArrayList(
new MenuItem("Gerrit", "http://gerrit.googlecode.com/"))));
}
}
Plugins can also add additional menu items to Gerrit’s top menu entries
by defining a MenuEntry
that has the same name as a Gerrit top menu
entry:
public class MyTopMenuExtension implements TopMenu {
@Override
public List<MenuEntry> getEntries() {
return Lists.newArrayList(
new MenuEntry(GerritTopMenu.PROJECTS, Lists.newArrayList(
new MenuItem("Browse Repositories", "https://gerrit.googlesource.com/"))));
}
}
MenuItems
that are bound for the MenuEntry
with the name
GerritTopMenu.PROJECTS
can contain a ${projectName}
placeholder
which is automatically replaced by the actual project name.
E.g. plugins may register an HTTP Servlet to handle project specific requests and add an menu item for this:
new MenuItem("My Screen", "/plugins/myplugin/project/${projectName}");
This also enables plugins to provide menu items for project aware screens:
new MenuItem("My Screen", "/x/my-screen/for/${projectName}");
If no Guice modules are declared in the manifest, the top menu extension may use
auto-registration by providing an @Listen
annotation:
@Listen
public class MyTopMenuExtension implements TopMenu {
[...]
}
Otherwise the top menu extension must be bound in the plugin module used for the Gerrit system injector (Gerrit-Module entry in MANIFEST.MF):
package com.googlesource.gerrit.plugins.helloworld;
public class HelloWorldModule extends AbstractModule {
@Override
protected void configure() {
DynamicSet.bind(binder(), TopMenu.class).to(MyTopMenuExtension.class);
}
}
Gerrit-ApiType: plugin
Gerrit-Module: com.googlesource.gerrit.plugins.helloworld.HelloWorldModule
It is also possible to show some menu entries only if the user has a certain capability:
public class MyTopMenuExtension implements TopMenu {
private final String pluginName;
private final Provider<CurrentUser> userProvider;
private final List<MenuEntry> menuEntries;
@Inject
public MyTopMenuExtension(@PluginName String pluginName,
Provider<CurrentUser> userProvider) {
this.pluginName = pluginName;
this.userProvider = userProvider;
menuEntries = new ArrayList<TopMenu.MenuEntry>();
// add menu entry that is only visible to users with a certain capability
if (canSeeMenuEntry()) {
menuEntries.add(new MenuEntry("Top Menu Entry", Collections
.singletonList(new MenuItem("Gerrit", "http://gerrit.googlecode.com/"))));
}
// add menu entry that is visible to all users (even anonymous users)
menuEntries.add(new MenuEntry("Top Menu Entry", Collections
.singletonList(new MenuItem("Documentation", "/plugins/myplugin/"))));
}
private boolean canSeeMenuEntry() {
if (userProvider.get().isIdentifiedUser()) {
CapabilityControl ctl = userProvider.get().getCapabilities();
return ctl.canPerform(pluginName + "-" + MyCapability.ID)
|| ctl.canAdministrateServer();
} else {
return false;
}
}
@Override
public List<MenuEntry> getEntries() {
return menuEntries;
}
}
Plugin Settings Screen
If a plugin implements a screen for administrating its settings that is available under "#/x/<plugin-name>/settings" it is automatically linked from the plugin list screen.
HTTP Servlets
Plugins or extensions may register additional HTTP servlets, and wrap them with HTTP filters.
Servlets may use auto-registration to declare the URL they handle:
import com.google.gerrit.extensions.annotations.Export;
import com.google.inject.Singleton;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
@Export("/print")
@Singleton
class HelloServlet extends HttpServlet {
protected void doGet(HttpServletRequest req, HttpServletResponse res) throws IOException {
res.setContentType("text/plain");
res.setCharacterEncoding("UTF-8");
res.getWriter().write("Hello");
}
}
The auto registration only works for standard servlet mappings like
/foo
or /foo/*
. Regex style bindings must use a Guice ServletModule
to register the HTTP servlets and declare it explicitly in the manifest
with the Gerrit-HttpModule
attribute:
import com.google.inject.servlet.ServletModule;
class MyWebUrls extends ServletModule {
protected void configureServlets() {
serve("/print").with(HelloServlet.class);
}
}
For a plugin installed as name helloworld
, the servlet implemented
by HelloServlet class will be available to users as:
$ curl http://review.example.com/plugins/helloworld/print
Data Directory
Plugins can request a data directory with a @PluginData
Path (or File,
deprecated) dependency. A data directory will be created automatically
by the server in $site_path/data/$plugin_name
and passed to the
plugin.
Plugins can use this to store any data they want.
@Inject
MyType(@PluginData java.nio.file.Path myDir) {
this.in = Files.newInputStream(myDir.resolve("my.config"));
}
SecureStore
SecureStore allows to change the way Gerrit stores sensitive data like passwords.
In order to replace the default SecureStore (no-op) implementation,
a class that extends com.google.gerrit.server.securestore.SecureStore
needs to be provided (with dependencies) in a separate jar file. Then
SwitchSecureStore must be run to
switch implementations.
The SecureStore implementation is instantiated using a Guice injector
which binds the File
annotated with the @SitePath
annotation.
This means that a SecureStore implementation class can get access to
the site_path
like in the following example:
@Inject
MySecureStore(@SitePath java.io.File sitePath) {
// your code
}
No Guice bindings or modules are required. Gerrit will automatically discover and bind the implementation.
Gerrit Replica
Gerrit can be run as a read-only replica. Some plugins may need to know
whether Gerrit is run as a primary- or a replica instance. For that purpose
Gerrit exposes the @GerritIsReplica
annotation. A boolean annotated with
this annotation will indicate whether Gerrit is run as a replica.
Account Creation
Plugins can hook into the
account creation REST API and
inject additional external identifiers for an account that represents a user
in some external user store. For that, an implementation of the extension
point com.google.gerrit.server.account.AccountExternalIdCreator
must be registered.
class MyExternalIdCreator implements AccountExternalIdCreator {
@Override
public List<AccountExternalId> create(Account.Id id, String username,
String email) {
// your code
}
}
bind(AccountExternalIdCreator.class)
.annotatedWith(UniqueAnnotations.create())
.to(MyExternalIdCreator.class);
Download Commands
Gerrit offers commands for downloading changes and cloning projects
using different download schemes (e.g. for downloading via different
network protocols). Plugins can contribute download schemes, download
commands and clone commands by implementing
com.google.gerrit.extensions.config.DownloadScheme
,
com.google.gerrit.extensions.config.DownloadCommand
and
com.google.gerrit.extensions.config.CloneCommand
.
The download schemes, download commands and clone commands which are
used most often are provided by the Gerrit core plugin
download-commands
.
Included In
For merged changes the Included In drop-down panel shows the branches and tags in which the change is included.
Plugins can add additional systems in which the change can be included
by implementing com.google.gerrit.extensions.config.ExternalIncludedIn
,
e.g. a plugin can provide a list of servers on which the change was
deployed.
Change Report Formatting
When a change is pushed for review from the command line, Gerrit reports the change(s) received with their URL and subject.
By implementing the
com.google.gerrit.server.git.ChangeReportFormatter
interface, a plugin
may change the formatting of the report.
URL Formatting
URLs to various parts of Gerrit are usually formed by adding suffixes to the canonical web URL.
By implementing the
com.google.gerrit.server.config.UrlFormatter
interface, a plugin may
change the format of the URL.
Links To External Tools
Gerrit has extension points that enables development of a light-weight plugin that links commits to external tools (GitBlit, CGit, company specific resources etc).
PatchSetWebLinks will appear to the right of the commit-SHA-1 in the UI.
import com.google.gerrit.extensions.annotations.Listen;
import com.google.gerrit.extensions.webui.PatchSetWebLink;;
@Listen
public class MyWeblinkPlugin implements PatchSetWebLink {
private String name = "MyLink";
private String placeHolderUrlProjectCommit =
"http://my.tool.com/project=%s/commit=%s/changeKey=%s/numericChangeId=%s";
private String imageUrl = "http://placehold.it/16x16.gif";
@Override
public WebLinkInfo getPatchSetWebLink(String projectName, String commit,
String commitMessage, String branchName, String changeKey, int
numericChangeId) {
return new WebLinkInfo(name,
imageUrl,
String.format(placeHolderUrlProjectCommit, project, commit, changeKey,
numericChangeId));
}
}
ParentWebLinks will appear to the right of the SHA-1 of the parent revisions in the UI. The implementation should in most use cases direct to the same external service as PatchSetWebLink; it is provided as a separate interface because not all users want to have links for the parent revisions.
FileWebLinks will appear in the side-by-side diff screen on the right side of the patch selection on each side.
DiffWebLinks will appear in the side-by-side and unified diff screen in the header next to the navigation icons.
EditWebLinks will appear in the top-right part of the file diff page.
ProjectWebLinks will appear in the project list in the
Repository Browser
column.
BranchWebLinks will appear in the branch list in the last column.
FileHistoryWebLinks will appear on the access rights screen.
TagWebLinks will appear in the tag list in the last column.
If a get*WebLink
implementation returns null
, the link will be omitted. This
allows the plugin to selectively "enable" itself on a per-project/branch/file
basis.
LFS Storage Plugins
Gerrit provides an extension point that enables development of
LFS (Large File Storage) storage plugins. Gerrit core exposes the default LFS
protocol endpoint <project-name>/info/lfs/objects/batch
and forwards the requests
to the configured lfs.plugin plugin which implements
the LFS protocol. By exposing the default LFS endpoint, the git-lfs client can be
used without any configuration.
/** Provide an LFS protocol implementation */
import org.eclipse.jgit.lfs.server.LargeFileRepository;
import org.eclipse.jgit.lfs.server.LfsProtocolServlet;
@Singleton
public class LfsApiServlet extends LfsProtocolServlet {
private static final long serialVersionUID = 1L;
private final S3LargeFileRepository repository;
@Inject
LfsApiServlet(S3LargeFileRepository repository) {
this.repository = repository;
}
@Override
protected LargeFileRepository getLargeFileRepository() {
return repository;
}
}
/** Register the LfsApiServlet to listen on the default LFS protocol endpoint */
import static com.google.gerrit.httpd.plugins.LfsPluginServlet.URL_REGEX;
import com.google.inject.servlet.ServletModule;
public class HttpModule extends ServletModule {
@Override
protected void configureServlets() {
serveRegex(URL_REGEX).with(LfsApiServlet.class);
}
}
/** Provide an implementation of the LargeFileRepository */
import org.eclipse.jgit.lfs.server.s3.S3Repository;
public class S3LargeFileRepository extends S3Repository {
...
}
Metrics
Metrics Reporting
To send Gerrit’s metrics data to an external reporting backend, a plugin can
get a MetricRegistry
injected and register an instance of a class that
implements the Reporter
interface from
DropWizard Metrics.
There is also a working example of reporting metrics to the console in the cookbook plugin.
Providing own metrics
Plugins may provide metrics to be dispatched to external reporting services by
getting a MetricMaker
injected and creating instances of specific types of
metric:
-
Counter
Metric whose value increments during the life of the process.
-
Timer
Metric recording time spent on an operation.
-
Histogram
Metric recording statistical distribution (rate) of values.
Note that metrics cannot be recorded from plugin init steps that are run during site initialization.
By default, plugin metrics are recorded under
plugins/${plugin-name}/${metric-name}
. This can be changed by
setting plugins.${plugin-name}.metricsPrefix
in the gerrit.config
file. For example:
[plugin "my-plugin"] metricsPrefix = my-metrics
will cause the metrics to be recorded under my-metrics/${metric-name}
.
Note that metric name can be expressed through a limited set of characters
[a-zA-Z0-9_-]+(/[a-zA-Z0-9_-]+)*
therefore one should either ensure it
or call
sanitizeMetricName to have it enforced.
The sanitizeMetricName performs the following modifications:
-
leading
/
is replaced with_
-
doubled (or repeated more times)
/
are reduced to a single/
-
ending
/
is removed -
all characters that are not
/a-zA-Z0-9_-
are replaced with_0x[HEX CODE]_
(code is capitalized) -
if the replacement prefix (
_0x
) is found then it is prepended with another replacement prefix
See the replication metrics in the replication plugin for an example of usage.
AccountPatchReviewStore
The AccountPatchReviewStore is used to store reviewed flags on changes. A reviewed flag is a tuple of (patch set ID, file, account ID) and records whether the user has reviewed a file in a patch set. Each user can easily have thousands of reviewed flags and the number of reviewed flags is growing without bound. The store must be able handle this data volume efficiently.
Gerrit implements this extension point, but plugins may bind another implementation, e.g. one that supports cluster setup with multiple primary Gerrit nodes handling write operations.
DynamicItem.bind(binder(), AccountPatchReviewStore.class)
.to(MultiMasterAccountPatchReviewStore.class);
...
public class MultiMasterAccountPatchReviewStore
implements AccountPatchReviewStore {
...
}
Documentation
If a plugin does not register a filter or servlet to handle URLs
/Documentation/*
or /static/*
, the core Gerrit server will
automatically export these resources over HTTP from the plugin JAR.
Static resources under the static/
directory in the JAR will be
available as /plugins/helloworld/static/resource
. This prefix is
configurable by setting the Gerrit-HttpStaticPrefix
attribute.
Documentation files under the Documentation/
directory in the JAR
will be available as /plugins/helloworld/Documentation/resource
. This
prefix is configurable by setting the Gerrit-HttpDocumentationPrefix
attribute.
Documentation may be written in the Markdown flavor
flexmark-java
if the file name ends with .md
. Gerrit will automatically convert
Markdown to HTML if accessed with extension .html
.
Within the Markdown documentation files macros can be used that allow to write documentation with reasonably accurate examples that adjust automatically based on the installation.
The following macros are supported:
Macro | Replacement |
---|---|
@PLUGIN@ |
name of the plugin |
@URL@ |
Gerrit Web URL |
@SSH_HOST@ |
SSH Host |
@SSH_PORT@ |
SSH Port |
The macros will be replaced when the documentation files are rendered from Markdown to HTML.
Macros that start with \
such as \@KEEP@
will render as @KEEP@
even if there is an expansion for KEEP
in the future.
Documentation should typically contain the following content:
File | Content |
---|---|
|
Home page of the plugin when browsing its source code on Git |
|
Open-source license |
|
Overview of the plugin and its purpose |
|
Plugin configuration settings and sample configs |
|
How to build the plugin |
|
SSH commands |
|
REST API |
|
HTTP Servlets |
The documentation under resources/Documentation may contain macro that will be included and expanded by Gerrit once the plugin is loaded.
The files in the root directory are not included in the plugin package and must not have any macro for expansion. It may also collect additional information that would make the plugin more discoverable, such as a more user-friendly description of its use-cases.
The documentation can also include images that can help understanding more visually how the plugin can interact with the other Gerrit components.
Automatic Index
If a plugin does not handle its /
URL itself, Gerrit will
redirect clients to the plugin’s /Documentation/index.html
.
Requests for /Documentation/
(bare directory) will also redirect
to /Documentation/index.html
.
If neither resource Documentation/index.html
or
Documentation/index.md
exists in the plugin JAR, Gerrit will
automatically generate an index page.
The generated index page contains 3 sections:
-
Manifest section
Some optional information from the manifest is extracted and displayed as part of the index page, if present in the manifest:
Field Source Attribute Name
Implementation-Title
Vendor
Implementation-Vendor
Version
Implementation-Version
URL
Implementation-URL
API Version
Gerrit-ApiVersion
-
About section
If an
about.md
orabout.html
file exists, its content will be inserted in an 'About' section.If both
about.md
andabout.html
exist, only the first discovered file will be used. -
TOC section
If a
toc.md
ortoc.html
file exists, its content will be inserted in a 'Documentation' section.toc.md
ortoc.html
is a manually maintained index of the documentation pages that exist in the plugin. Having a manually maintained index has the advantage that you can group the documentation pages by topic and sort them by importance.If both
toc.md
andtoc.html
exist, only the first discovered file will be used.If no
toc
file is present the TOC section is automatically generated by scanning every*.md
and*.html
file in theDocumentation/
directory.For any discovered Markdown (
*.md
) file, Gerrit will parse the header of the file and extract the first level one title. This title text will be used as display text for a link to the HTML version of the page.For any discovered HTML (
*.html
) file, Gerrit will use the name of the file, minus the*.html
extension, as the link text. Any hyphens in the file name will be replaced with spaces.If a discovered file name beings with
cmd-
it will be clustered into a 'Commands' section of the generated index page.If a discovered file name beings with
servlet-
it will be clustered into a 'Servlets' section of the generated index page.If a discovered file name beings with
rest-api-
it will be clustered into a 'REST APIs' section of the generated index page.All other files are clustered under a 'Documentation' section.
Deployment
Compiled plugins and extensions can be deployed to a running Gerrit server using the plugin install command.
Web UI plugins distributed as a single .js
file can be deployed without the
overhead of JAR packaging. For more information refer to
plugin install command.
Plugins can also be copied directly into the server’s directory at
$site_path/plugins/$name.(jar|js)
. For Web UI plugins, the name
of the file, minus the .js
extension, will be used as the
plugin name. For JAR plugins, the value of the Gerrit-PluginName
manifest attribute will be used, if provided, otherwise the name of
the file, minus the .jar
extension, will be used.
For JAR plugins, the version is taken from the Version
attribute in the
manifest.
Unless disabled, servers periodically scan the $site_path/plugins
directory for updated plugins. The time can be adjusted by
plugins.checkFrequency.
For disabling plugins the plugin remove command can be used.
Disabled plugins can be re-enabled using the plugin enable command.
Reviewer Suggestion Plugins
Gerrit provides an extension point that enables Plugins to rank the list of reviewer suggestion a user receives upon clicking "Add Reviewer" on the change screen.
Gerrit supports both a default suggestion that appears when the user has not yet typed anything and a filtered suggestion that is shown as the user starts typing.
Plugins receive a candidate list and can return a Set
of suggested reviewers
containing the Account.Id
and a score for each reviewer. The candidate list is
non-binding and plugins can choose to return reviewers not initially contained in
the candidate list.
Server administrators can configure the overall weight of each plugin by setting
the addreviewer.pluginName-exportName.weight
value in gerrit.config
.
import com.google.gerrit.common.Nullable;
import com.google.gerrit.entities.Account;
import com.google.gerrit.entities.Change;
import com.google.gerrit.entities.Project;
import com.google.gerrit.extensions.annotations.ExtensionPoint;
import java.util.Set;
public class MyPlugin implements ReviewerSuggestion {
public Set<SuggestedReviewer> suggestReviewers(Project.NameKey project,
@Nullable Change.Id changeId, @Nullable String query,
Set<Account.Id> candidates) {
Set<SuggestedReviewer> suggestions = new HashSet<>();
// Implement your ranking logic here
return suggestions;
}
}
Mail Filter Plugins
Gerrit provides an extension point that enables Plugins to discard incoming messages and prevent further processing by Gerrit.
This can be used to implement spam checks, signature validations or organization specific checks like IP filters.
import com.google.gerrit.extensions.annotations.ExtensionPoint;
import com.google.gerrit.mail.MailMessage;
public class MyPlugin implements MailFilter {
public boolean shouldProcessMessage(MailMessage message) {
// Implement your filter logic here
return true;
}
}
Account Tag Plugins
Gerrit provides an extension point that enables Plugins to supply additional tags on an account.
import com.google.gerrit.entities.Account;
import com.google.gerrit.server.account.AccountTagProvider;
import java.util.List;
public class MyPlugin implements AccountTagProvider {
public List<String> getTags(Account.Id id) {
// Implement your logic here
}
}
SSH Command Creation Interception
Gerrit provides an extension point that allows a plugin to intercept creation of SSH commands and override the functionality with its own implementation.
import com.google.gerrit.sshd.SshCreateCommandInterceptor;
class MyCommandInterceptor implements SshCreateCommandInterceptor {
@Override
public String intercept(String in) {
return pluginName + " mycommand";
}
}
SSH Command Execution Interception
Gerrit provides an extension point that enables plugins to check and prevent an SSH command from being run.
import com.google.gerrit.sshd.SshExecuteCommandInterceptor;
@Singleton
public class SshExecuteCommandInterceptorImpl implements SshExecuteCommandInterceptor {
private final Provider<SshSession> sessionProvider;
@Inject
SshExecuteCommandInterceptorImpl(Provider<SshSession> sessionProvider) {
this.sessionProvider = sessionProvider;
}
@Override
public boolean accept(String command, List<String> arguments) {
if (command.startsWith("gerrit") && !"10.1.2.3".equals(sessionProvider.get().getRemoteAddressAsString())) {
return false;
}
return true;
}
}
And then declare it in your SSH module:
DynamicSet.bind(binder(), SshExecuteCommandInterceptor.class)
.to(SshExecuteCommandInterceptorImpl.class);
Pre-submit Validation Plugins
Gerrit provides an extension point that enables plugins to prevent a change from being submitted.
Important
|
This extension point must NOT be used for long or slow operations, like calling external programs or content, running unit tests… Slow operations will hurt the whole Gerrit instance. |
This can be used to implement custom rules that changes have to match to become submittable. A more concrete example: the Prolog rules engine can be implemented using this.
Gerrit calls the plugins once per change and caches the results. Although it is possible to predict when this interface will be triggered, this should not be considered as a feature. Plugins should only rely on the internal state of the ChangeData, not on external values like date and time, remote content or randomness.
Plugins are expected to support rules inheritance themselves, providing ways to configure it and handling the logic behind it. Please note that no inheritance is sometimes better than badly handled inheritance: miscommunication and strange behaviors caused by inheritance may and will confuse the users. Each plugins is responsible for handling the project hierarchy and taking wise actions. Gerrit does not enforce it.
Once Gerrit has gathered every plugins' SubmitRecords, it stores them.
Plugins accept or reject a given change using SubmitRecord.Status
.
If a change is ready to be submitted, OK
. If it is not ready and requires
modifications, NOT_READY
. Other statuses are available for particular cases.
A change can be submitted if all the plugins accept the change.
Plugins may also decide not to vote on a given change by returning an
Optional.empty()
(ie: the plugin is not enabled for this repository).
If a plugin decides not to vote, its name will not be displayed in the UI and it will not be recoded in the database.
Plugin A | Plugin B | Plugin C | Final decision |
---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This makes composing plugins really easy.
-
If a plugin places a veto on a change, it can’t be submitted.
-
If a plugin isn’t enabled for a project (or isn’t needed for this change), it returns an empty collection.
-
If all the plugins answer
OK
, the change can be submitted.
A more rare case, but worth documenting: if there are no installed plugins, the labels will be compared to the rules defined in the project’s config, and the permission system will be used to allow or deny a submit request.
Some rules are defined internally to provide a common base ground (and sanity): changes that are marked as WIP or that are closed (abandoned, merged) can’t be merged.
import java.util.Optional;
import com.google.gerrit.entities.SubmitRecord;
import com.google.gerrit.entities.SubmitRecord.Status;
import com.google.gerrit.server.query.change.ChangeData;
import com.google.gerrit.server.rules.SubmitRule;
public class MyPluginRules implements SubmitRule {
public Optional<SubmitRecord> evaluate(ChangeData changeData) {
// Implement your submitability logic here
// Assuming we want to prevent this change from being submitted:
SubmitRecord record = new SubmitRecord();
record.status = Status.NOT_READY;
return Optional.of(record);
}
}
Don’t forget to register your class!
import com.google.gerrit.extensions.annotations.Exports;
import com.google.inject.AbstractModule;
public class MyPluginModule extends AbstractModule {
@Override
protected void configure() {
bind(SubmitRule.class).annotatedWith(Exports.named("myPlugin")).to(MyPluginRules.class);
}
}
Plugin authors should also consider binding their SubmitRule using a Gerrit-BatchModule
.
See Batch runtime for more informations.
The SubmitRule extension point allows you to write complex rules, but writing small self-contained rules should be preferred: doing so allows end users to compose several rules to form more complex submit checks.
The SubmitRequirement
class allows rules to communicate what the user needs
to change in order to be compliant. These requirements should be kept once they
are met, but marked as OK
. If the requirements were not displayed, reviewers
would need to use their precious time to manually check that they were met.
Implementors of the SubmitRule
interface should check whether they need to
contribute to the change ETag computation to
prevent callers using ETags from potentially seeing outdated submittability
information.
SubmitRule
interface will soon deprecated. Instead, a global SubmitRequirement
can be bound by plugin.
import com.google.gerrit.extensions.annotations.Exports;
import com.google.inject.AbstractModule;
public class MyPluginModule extends AbstractModule {
@Override
protected void configure() {
bind(SubmitRequirement.class).annotatedWith(Exports.named("myPlugin"))
.toInstance(myPluginSubmitRequirement);
}
}
Change ETag Computation
By implementing the com.google.gerrit.server.change.ChangeETagComputation
interface plugins can contribute a value to the change ETag computation.
Plugins can affect the result of the get change / get change details REST endpoints by:
-
providing plugin defined attributes in ChangeInfo
-
implementing a pre-submit evaluator which affects the computation of
submittable
field in ChangeInfo
If the plugin defined part of ChangeInfo depends on plugin specific data, callers that use change ETags to avoid unneeded recomputations of ChangeInfos may see outdated plugin attributes and/or outdated submittable information, because a ChangeInfo is only reloaded if the change ETag changes.
By implementating the com.google.gerrit.server.change.ChangeETagComputation
interface plugins can contribute to the ETag computation and thus ensure that
the change ETag changes when the plugin data was changed. This way it can be
ensured that callers do not see outdated ChangeInfos.
Important
|
Change ETags are computed very frequently and the computation must be cheap. Take good care to not perform any expensive computations when implementing this. |
import static java.nio.charset.StandardCharsets.UTF_8;
import com.google.common.hash.Hasher;
import com.google.gerrit.entities.Change;
import com.google.gerrit.entities.Project;
import com.google.gerrit.server.change.ChangeETagComputation;
public class MyPluginChangeETagComputation implements ChangeETagComputation {
public String getETag(Project.NameKey projectName, Change.Id changeId) {
Hasher hasher = Hashing.murmur3_128().newHasher();
// Add hashes for all plugin-specific data that affects change infos.
hasher.putString(sha1OfPluginSpecificChangeRef, UTF_8);
return hasher.hash().toString();
}
}
ExceptionHook
An ExceptionHook
allows implementors to control how certain
exceptions should be handled.
This interface is intended to be implemented for multi-master setups to control the behavior for handling exceptions that are thrown by a lower layer that handles the consensus and synchronization between different server nodes. E.g. if an operation fails because consensus for a Git update could not be achieved (e.g. due to slow responding server nodes) this interface can be used to retry the request instead of failing it immediately.
It also allows implementors to group exceptions that have the same cause into one metric bucket.
MailSoyTemplateProvider
This extension point allows to provide soy templates for registration so that they can be used for sending emails from a plugin.
Quota Enforcer
Gerrit provides an extension point that allows a plugin to enforce quota. This documentation page has a list of all quota requests that Gerrit core issues. Plugins can choose to respond to all or just a subset of requests. Some implementations might want to keep track of user quota in buckets, others might just check against instance or project state to enforce limits on how many projects can be created or how large a repository can become.
Checking against instance state can be racy for concurrent requests as the server does not refill tokens if the action fails in a later stage (e.g. database failure). If plugins want to guarantee an absolute maximum on a resource, they have to do their own book-keeping.
import com.google.server.quota.QuotaEnforcer;
class ProjectLimiter implements QuotaEnforcer {
private final long maxNumberOfProjects = 100;
@Override
QuotaResponse requestTokens(String quotaGroup, QuotaRequestContext ctx, long numTokens) {
if (!"/projects/create".equals(quotaGroup)) {
return QuotaResponse.noOp();
}
// No deduction because we always check against the instance state (racy but fine for
// this plugin)
if (currentNumberOfProjects() + numTokens > maxNumberOfProjects) {
return QuotaResponse.error("too many projects");
}
return QuotaResponse.ok();
}
@Override
QuotaResponse dryRun(String quotaGroup, QuotaRequestContext ctx, long numTokens) {
// Since we are not keeping any state in this enforcer, we can simply call requestTokens().
return requestTokens(quotaGroup, ctx, numTokens);
}
void refill(String quotaGroup, QuotaRequestContext ctx, long numTokens) {
// No-op
}
}
import com.google.server.quota.QuotaEnforcer;
class ApiQpsEnforcer implements QuotaEnforcer {
// AutoRefillingPerUserBuckets is a imaginary bucket implementation that could be based on
// a loading cache or a commonly used bucketing algorithm.
private final AutoRefillingPerUserBuckets<CurrentUser, Long> buckets;
@Override
QuotaResponse requestTokens(String quotaGroup, QuotaRequestContext ctx, long numTokens) {
if (!quotaGroup.startsWith("/restapi/")) {
return QuotaResponse.noOp();
}
boolean success = buckets.deduct(ctx.user(), numTokens);
if (!success) {
return QuotaResponse.error("user sent too many qps, please wait for 5 minutes");
}
return QuotaResponse.ok();
}
@Override
QuotaResponse dryRun(String quotaGroup, QuotaRequestContext ctx, long numTokens) {
if (!quotaGroup.startsWith("/restapi/")) {
return QuotaResponse.noOp();
}
boolean success = buckets.checkOnly(ctx.user(), numTokens);
if (!success) {
return QuotaResponse.error("user sent too many qps, please wait for 5 minutes");
}
return QuotaResponse.ok();
}
@Override
void refill(String quotaGroup, QuotaRequestContext ctx, long numTokens) {
if (!quotaGroup.startsWith("/restapi/")) {
return;
}
buckets.add(ctx.user(), numTokens);
}
}
Performance Logger
com.google.gerrit.server.logging.PerformanceLogger
is an extension point that
is invoked for all operations for which the execution time is measured. The
invocation of the extension point does not happen immediately, but only at the
end of a request (REST call, SSH call, git push). Implementors can write the
execution times into a performance log for further analysis.
Request Listener
com.google.gerrit.server.RequestListener
is an extension point that is
invoked each time the server executes a request from a user.
Custom Keyed values
It is possible to associate custom keyed values with a change. This is a map from string to string, allowing for the storage of small keys and values. An example would be for storing an associated workspace with the given change.
As an example:
private void setWorkspace(ChangeResource rsrc, String workspaceId)
throws RestApiException, UpdateException {
try (RefUpdateContext pluginCtx = RefUpdateContext.open(PLUGIN);
RefUpdateContext ctx = RefUpdateContext.open(CHANGE_MODIFICATION);
BatchUpdate bu =
updateFactory.create(rsrc.getChange().getProject(), rsrc.getUser(), TimeUtil.now())) {
SetCustomKeyedValuesOp op =
customKeyedValuesFactory.create(
new CustomKeyedValuesInput(ImmutableMap.of("workspace", workspaceId)));
bu.addOp(rsrc.getId(), op);
bu.execute();
}
}
These custom-keyed-values can be fetched by passing the option o=CUSTOM_KEYED_VALUES
to a change details fetch.
Diff Validators
com.google.gerrit.server.patch.DiffValidator
is an extension point that is
invoked after the file diff is computed through the
Get Diff REST endpoint.
Implementors can write logic to validate the diff before it’s returned on the API.