Skip to content

Latest commit

 

History

History
613 lines (405 loc) · 20.3 KB

vcs.rst

File metadata and controls

613 lines (405 loc) · 20.3 KB

Version control integration

Weblate currently supports :ref:`vcs-git` (with extended support for :ref:`vcs-github`, :ref:`vcs-gitlab`, :ref:`vcs-gitea`, :ref:`vcs-gerrit`, :ref:`vcs-git-svn`, :ref:`vcs-bitbucket-cloud`, :ref:`vcs-bitbucket-server`, and :ref:`vcs-azure-devops`) and :ref:`vcs-mercurial` as version control back-ends.

Accessing repositories

The VCS repository you want to use has to be accessible to Weblate. With a publicly available repository you just need to enter the correct URL (for example https://github.com/WeblateOrg/weblate.git), but for private repositories or for push URLs the setup is more complex and requires authentication.

Accessing repositories from Hosted Weblate

For Hosted Weblate, there is a dedicated push user registered on GitHub, Bitbucket, Codeberg, and GitLab (with the username :guilabel:`weblate`, e-mail hosted@weblate.org, and a name or profile description :guilabel:`Weblate push user`).

Hint

There can be more Weblate users on the platforms, designated for other Weblate instances. Searching by e-mail hosted@weblate.org is recommended to find the correct user for Hosted Weblate.

You need to add this user as a collaborator and give it appropriate permissions to your repository (read-only is okay for cloning, write is required for pushing). Depending on the service and your organization’s settings, this happens immediately, or requires confirmation on the Weblate side.

The :guilabel:`weblate` user on GitHub accepts invitations automatically within five minutes. Manual processing might be needed on the other services, so please be patient.

Once the :guilabel:`weblate` user is added to your repository, you can configure :ref:`component-repo` and :ref:`component-push` using the SSH protocol (for example git@github.com:WeblateOrg/weblate.git).

Accessing repositories on code hosting sites (GitHub, GitLab, Bitbucket, Azure DevOps, ...)

Accessing repositories on code hosting sites is typically done by creating a dedicated user who is associated with a Weblate SSH key (see :ref:`weblate-ssh-key`). This way you associate Weblate SSH key with a single user (this of frequently enforced by the platform) and grant this user access to the repository. You can then use SSH URL to access the repository (see :ref:`ssh-repos`).

Hint

On a Hosted Weblate, this is pre-cofigured for most of the public sites, please see :ref:`hosted-push`.

SSH repositories

The most frequently used method to access private repositories is based on SSH. Authorize the public Weblate SSH key (see :ref:`weblate-ssh-key`) to access the upstream repository this way.

Warning

On GitHub, each key can only be used once, see :ref:`vcs-repos-github` and :ref:`hosted-push`.

Weblate also stores the host key fingerprint upon first connection, and fails to connect to the host should it be changed later (see :ref:`verify-ssh`).

In case adjustment is needed, do so from the Weblate admin interface:

/screenshots/ssh-keys.webp

Weblate SSH key

.. versionchanged:: 4.17

   Weblate now generates both RSA and Ed25519 SSH keys. Using Ed25519 is recommended for new setups.

The Weblate public key is visible to all users browsing the :guilabel:`About` page.

Admins can generate or display the public key currently used by Weblate in the connection (from :guilabel:`SSH keys`) on the admin interface landing page.

Note

The corresponding private SSH key can not currently have a password, so ensure it is well protected.

Hint

Make a backup of the generated private Weblate SSH key.

Verifying SSH host keys

Weblate automatically stores the SSH host keys on first access and remembers them for further use.

In case you want to verify the key fingerprint before connecting to the repository, add the SSH host keys of the servers you are going to access in :guilabel:`Add host key`, from the same section of the admin interface. Enter the hostname you are going to access (e.g. gitlab.com), and press :guilabel:`Submit`. Verify its fingerprint matches the server you added.

The added keys with fingerprints are shown in the confirmation message:

/screenshots/ssh-keys-added.webp

Connecting to legacy SSH servers

Recent OpenSSH releases (for example the one used in Weblate Docker container) disable RSA signatures using the SHA-1 hash algorithm by default. This change has been made as the SHA-1 hash algorithm is cryptographically broken, and it is possible to create chosen-prefix hash collisions for <USD$50K.

For most users, this change should be invisible and there is no need to replace ssh-rsa keys. OpenSSH has supported RFC8332 RSA/SHA-256/512 signatures since release 7.2 and existing ssh-rsa keys will automatically use the stronger algorithm where possible.

Incompatibility is more likely when connecting to older SSH implementations that have not been upgraded or have not closely tracked improvements in the SSH protocol. The SSH connection to such server will fail with:

no matching host key type found. Their offer: ssh-rsa

For these cases, it may be necessary to selectively re-enable RSA/SHA1 to allow connection and/or user authentication via the HostkeyAlgorithms and PubkeyAcceptedAlgorithms options. For example, the following stanza in :file:`DATA_DIR/ssh/config` will enable RSA/SHA1 for host and user authentication for a single destination host:

Host legacy-host
   HostkeyAlgorithms +ssh-rsa
   PubkeyAcceptedAlgorithms +ssh-rsa

We recommend enabling RSA/SHA1 only as a stopgap measure until legacy implementations can be upgraded or reconfigured with another key type (such as ECDSA or Ed25519).

GitHub repositories

Access via SSH is possible (see :ref:`ssh-repos`), but in case you need to access more than one repository, you will hit a GitHub limitation on allowed SSH key usage (since each key can be used only once).

In case the :ref:`component-push_branch` is not set, the project is forked and changes pushed through a fork. In case it is set, changes are pushed to the upstream repository and chosen branch.

For smaller deployments, use HTTPS authentication with a personal access token and your GitHub account, see Creating an access token for command-line use.

For bigger setups, it is usually better to create a dedicated user for Weblate, assign it the public SSH key generated in Weblate (see :ref:`weblate-ssh-key`) and grant it access to all the repositories you want to translate. This approach is also used for Hosted Weblate, there is dedicated :guilabel:`weblate` user for that.

.. seealso::

    :ref:`hosted-push`

Weblate internal URLs

Share one repository setup between different components by referring to its placement as weblate://project/component in other (linked) components. This way linked components use the VCS repository configuration of the main (referenced) component.

Warning

Removing main component also removes linked components.

Weblate automatically adjusts the repository URL when creating a component if it finds a component with a matching repository setup. You can override this in the last step of the component configuration.

Reasons to use this:

  • Saves disk space on the server, the repository is stored just once.
  • Makes the updates faster, only one repository is updated.
  • There is just single exported repository with Weblate translations (see :ref:`git-exporter`).
  • Some add-ons can operate on multiple components sharing one repository, for example :ref:`addon-weblate.git.squash`.

HTTPS repositories

To access protected HTTPS repositories, include the username and password in the URL. Don't worry, Weblate will strip this info when the URL is shown to users (if even allowed to see the repository URL at all).

For example the GitHub URL with authentication added might look like: https://user:your_access_token@github.com/WeblateOrg/weblate.git.

Note

If your username or password contains special characters, those have to be URL encoded, for example https://user%40example.com:%24password%23@bitbucket.org/….

Using proxy

If you need to access HTTP/HTTPS VCS repositories using a proxy server, configure the VCS to use it.

This can be done using the http_proxy, https_proxy, and all_proxy environment variables, (as described in the cURL documentation) or by enforcing it in the VCS configuration, for example:

git config --global http.proxy http://user:password@proxy.example.com:80

Note

The proxy configuration needs to be done under user running Weblate (see also :ref:`file-permissions`) and with HOME=$DATA_DIR/home (see :setting:`DATA_DIR`), otherwise Git executed by Weblate will not use it.

.. seealso::

    `The cURL manpage <https://curl.se/docs/manpage.html>`_,
    `Git config documentation <https://git-scm.com/docs/git-config>`_


Git

Hint

Weblate needs Git 2.12 or newer.

.. seealso::

    See :ref:`vcs-repos` for info on how to access different kinds of repositories.

Git with force push

This behaves exactly like Git itself, the only difference being that it always force pushes. This is intended only in the case of using a separate repository for translations.

Warning

Use with caution, as this easily leads to lost commits in your upstream repository.

Customizing Git configuration

Weblate invokes all VCS commands with HOME=$DATA_DIR/home (see :setting:`DATA_DIR`), therefore editing the user configuration needs to be done in DATA_DIR/home/.git.

Git remote helpers

You can also use Git remote helpers for additionally supporting other version control systems, but be prepared to debug problems this may lead to.

At this time, helpers for Bazaar and Mercurial are available within separate repositories on GitHub: git-remote-hg and git-remote-bzr. Download them manually and put somewhere in your search path (for example :file:`~/bin`). Make sure you have the corresponding version control systems installed.

Once you have these installed, such remotes can be used to specify a repository in Weblate.

To clone the gnuhello project from Launchpad using Bazaar:

bzr::lp:gnuhello

For the hello repository from selenic.com using Mercurial:

hg::http://selenic.com/repo/hello

Warning

The inconvenience of using Git remote helpers is for example with Mercurial, the remote helper sometimes creates a new tip when pushing changes back.

GitHub pull requests

This adds a thin layer atop :ref:`vcs-git` using the GitHub API to allow pushing translation changes as pull requests, instead of pushing directly to the repository.

:ref:`vcs-git` pushes changes directly to a repository, while :ref:`vcs-github` creates pull requests. The latter is not needed for merely accessing Git repositories.

You need to configure API credentials (:setting:`GITHUB_CREDENTIALS`) in the Weblate settings to make this work. Once configured, you will see a :guilabel:`GitHub` option when selecting :ref:`component-vcs`.

.. seealso::

   :ref:`push-changes`,
   :setting:`GITHUB_CREDENTIALS`

GitLab merge requests

This just adds a thin layer atop :ref:`vcs-git` using the GitLab API to allow pushing translation changes as merge requests instead of pushing directly to the repository.

There is no need to use this to access Git repositories, ordinary :ref:`vcs-git` works the same, the only difference is how pushing to a repository is handled. With :ref:`vcs-git` changes are pushed directly to the repository, while :ref:`vcs-gitlab` creates merge request.

You need to configure API credentials (:setting:`GITLAB_CREDENTIALS`) in the Weblate settings to make this work. Once configured, you will see a :guilabel:`GitLab` option when selecting :ref:`component-vcs`.

.. seealso::

   :ref:`push-changes`,
   :setting:`GITLAB_CREDENTIALS`

Gitea pull requests

.. versionadded:: 4.12

This just adds a thin layer atop :ref:`vcs-git` using the Gitea API to allow pushing translation changes as pull requests instead of pushing directly to the repository.

There is no need to use this to access Git repositories, ordinary :ref:`vcs-git` works the same, the only difference is how pushing to a repository is handled. With :ref:`vcs-git` changes are pushed directly to the repository, while :ref:`vcs-gitea` creates pull requests.

You need to configure API credentials (:setting:`GITEA_CREDENTIALS`) in the Weblate settings to make this work. Once configured, you will see a :guilabel:`Gitea` option when selecting :ref:`component-vcs`.

.. seealso::

   :ref:`push-changes`,
   :setting:`GITEA_CREDENTIALS`

Bitbucket Server pull requests

.. versionadded:: 4.16

This just adds a thin layer atop :ref:`vcs-git` using the Bitbucket Server API to allow pushing translation changes as pull requests instead of pushing directly to the repository.

Warning

This does not support Bitbucket Cloud API.

There is no need to use this to access Git repositories, ordinary :ref:`vcs-git` works the same, the only difference is how pushing to a repository is handled. With :ref:`vcs-git` changes are pushed directly to the repository, while :ref:`vcs-bitbucket-server` creates pull request.

You need to configure API credentials (:setting:`BITBUCKETSERVER_CREDENTIALS`) in the Weblate settings to make this work. Once configured, you will see a :guilabel:`Bitbucket Server` option when selecting :ref:`component-vcs`.

.. seealso::

   :ref:`push-changes`,
   :setting:`BITBUCKETSERVER_CREDENTIALS`

Bitbucket Cloud pull requests

.. versionadded:: 5.8

This just adds a thin layer atop :ref:`vcs-git` using the Bitbucket Cloud API to allow pushing translation changes as pull requests instead of pushing directly to the repository.

Warning

This is different from Bitbucket Server API.

There is no need to use this to access Git repositories, ordinary :ref:`vcs-git` works the same, the only difference is how pushing to a repository is handled. With :ref:`vcs-git` changes are pushed directly to the repository, while :ref:`vcs-bitbucket-cloud` creates pull request.

You need to configure API credentials (:setting:`BITBUCKETCLOUD_CREDENTIALS`) in the Weblate settings to make this work. Once configured, you will see a :guilabel:`Bitbucket Cloud` option when selecting :ref:`component-vcs`.

.. seealso::

   :ref:`push-changes`,
   :setting:`BITBUCKETCLOUD_CREDENTIALS`

Pagure merge requests

.. versionadded:: 4.3.2

This just adds a thin layer atop :ref:`vcs-git` using the Pagure API to allow pushing translation changes as merge requests instead of pushing directly to the repository.

There is no need to use this to access Git repositories, ordinary :ref:`vcs-git` works the same, the only difference is how pushing to a repository is handled. With :ref:`vcs-git` changes are pushed directly to the repository, while :ref:`vcs-pagure` creates merge request.

You need to configure API credentials (:setting:`PAGURE_CREDENTIALS`) in the Weblate settings to make this work. Once configured, you will see a :guilabel:`Pagure` option when selecting :ref:`component-vcs`.

.. seealso::

   :ref:`push-changes`,
   :setting:`PAGURE_CREDENTIALS`

Gerrit

Adds a thin layer atop :ref:`vcs-git` using the git-review tool to allow pushing translation changes as Gerrit review requests, instead of pushing them directly to the repository.

The Gerrit documentation has the details on the configuration necessary to set up such repositories.

Azure DevOps pull requests

This adds a thin layer atop :ref:`vcs-git` using the Azure DevOps API to allow pushing translation changes as pull requests, instead of pushing directly to the repository.

:ref:`vcs-git` pushes changes directly to a repository, while :ref:`vcs-azure-devops` creates pull requests. The latter is not needed for merely accessing Git repositories.

You need to configure API credentials (:setting:`AZURE_DEVOPS_CREDENTIALS`) in the Weblate settings to make this work. Once configured, you will see a :guilabel:`Azure DevOps` option when selecting :ref:`component-vcs`.

.. seealso::

   :ref:`push-changes`,
   :setting:`AZURE_DEVOPS_CREDENTIALS`

Mercurial

Mercurial is another VCS you can use directly in Weblate.

Note

It should work with any Mercurial version, but there are sometimes incompatible changes to the command-line interface which breaks Weblate integration.

.. seealso::

    See :ref:`vcs-repos` for info on how to access different kinds of
    repositories.

Subversion

Weblate uses git-svn to interact with subversion repositories. It is a Perl script that lets subversion be used by a Git client, enabling users to maintain a full clone of the internal repository and commit locally.

Note

Weblate tries to detect Subversion repository layout automatically - it supports both direct URLs for branch or repositories with standard layout (branches/, tags/ and trunk/). More info about this is to be found in the git-svn documentation. If your repository does not have a standard layout and you encounter errors, try including the branch name in the repository URL and leaving branch empty.

Subversion credentials

Weblate expects you to have accepted the certificate up-front (and your credentials if needed). It will look to insert them into the :setting:`DATA_DIR` directory. Accept the certificate by using svn once with the $HOME environment variable set to the :setting:`DATA_DIR`:

# Use DATA_DIR as configured in Weblate settings.py, it is /app/data in the Docker
HOME=${DATA_DIR}/home svn co https://svn.example.com/example
.. seealso::

    :setting:`DATA_DIR`


Local files

Hint

Underneath, this uses :ref:`vcs-git`. It requires Git installed and allows you to switch to using Git natively with full history of your translations.

Weblate can also operate without a remote VCS. The initial translations are imported by uploading them. Later you can replace individual files by file upload, or add translation strings directly from Weblate (currently available only for monolingual translations).

In the background Weblate creates a Git repository for you and all changes are tracked in. In case you later decide to use a VCS to store the translations, you already have a repository within Weblate can base your integration on.