A developer gets a pull request merged, and approval automations fire like fireworks. But two hours later, artifacts vanish into thin air because someone’s S3 bucket credentials expired. That’s where Gerrit MinIO quietly saves the day.
Gerrit handles code review at scale. MinIO supplies the object storage, an S3-compatible warehouse for every build log, dependency, and verification artifact. Together they form a self-managed, private, high-performance workflow that keeps your source control close to your data. The key is wiring them with proper access logic so Gerrit can store and retrieve without becoming a security problem.
In practice, Gerrit MinIO integration works through service credentials that mimic cloud-based S3 permissions. You create an access policy in MinIO for Gerrit, give it a bucket for replication or artifact storage, and point Gerrit’s configuration at that endpoint. When reviewers push or verify patches, the system writes logs to MinIO instead of an external cloud account. The result: faster testing, reduced egress costs, and zero dependency on a third-party storage provider.
To keep it secure, treat MinIO as any resource under strict IAM. Assign fine-grained policies—read for reviewers, write for CI bots, admin for storage operators. Rotate keys using your identity provider, ideally via OIDC or short-lived tokens from something like AWS STS. Locking down the object layer ensures one compromised review server cannot leak every build artifact your company owns.
Quick answer: How do I connect Gerrit and MinIO?
Point Gerrit’s gerrit.store.path or replication bundles to the MinIO bucket’s S3 endpoint, add the credentials with least privilege, test uploads, then switch traffic live. If artifacts land successfully, your Gerrit MinIO setup is done.