author | Paul Crowley <paul@ciphergoth.org> |
Fri, 18 Apr 2008 09:13:37 +0100 | |
changeset 13 | 1206ed37090a |
parent 12 | 834426fcbada |
child 14 | e7d5254cd0ca |
permissions | -rw-r--r-- |
13 | 1 |
hg-admin-tools |
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
2 |
|
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
3 |
A set of tools for managing authorization and access control for |
12 | 4 |
ssh-based Mercurial repositories |
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
5 |
|
12 | 6 |
Paul Crowley, paul@lshift.net, 2008 |
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
7 |
|
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
8 |
This software may be used and distributed according to the terms |
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
9 |
of the GNU General Public License, incorporated herein by reference. |
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
10 |
|
12 | 11 |
WHAT IT GIVES YOU |
12 |
||
13 |
You maintain a local Mercurial repository called "hgadmin" which |
|
14 |
controls what access is allowed to whom. When you push a new version |
|
15 |
of this repository to the repository host, changes take effect |
|
16 |
immediately, so familiar "hg" commands are all that are needed to |
|
17 |
maintain it. A "keys" directory contains the SSH keys of all the |
|
18 |
developers who have access, while "hg-ssh-access.conf" gives a set of |
|
19 |
rules defining who can do what to what. |
|
20 |
||
21 |
HOW IT WORKS |
|
22 |
||
23 |
The repository is owned by a single user (the "hg" user in what |
|
24 |
follows), but many remote users can act on it. We don't use file |
|
25 |
permissions to achieve that - instead, developers log in as the "hg" |
|
26 |
user when they connect to the repository host using ssh, using ssh |
|
27 |
URLs of the form "ssh://hg@repository-host/repository-name". A |
|
28 |
restricted shell prevents them from using this access for unauthorized |
|
29 |
purposes. |
|
30 |
||
31 |
Developers are authenticated only using SSH keys; no other form of |
|
32 |
authentication is supported. When a developer attempts to connect to |
|
33 |
a repository via ssh, the SSH daemon searches for a match for that |
|
34 |
user's key in ~hg/.ssh/authorized_keys. If the developer is |
|
35 |
authorised to connect to the repository they will have an entry in |
|
36 |
this file. The entry includes a "command" prefix which specifies that |
|
37 |
the restricted shell should be used; this shell is passed an argument |
|
38 |
identifying the developer. The shell parses the command the developer |
|
39 |
is trying to execute, and consults a rules file to see if that |
|
40 |
developer is allowed to perform that action on that repository. The |
|
41 |
bulk of the work of the restricted shell is done by the Python program |
|
42 |
"hg-ssh", but the shell script "hg-ssh-wrapper" sets up some |
|
43 |
configuration so that you can change it to suit your local installation. |
|
44 |
||
45 |
The file ~hg/.ssh/authorized_keys is generated by "refresh-auth", |
|
46 |
which recurses through a directory of files containing SSH keys and |
|
47 |
generates an entry in authorized_keys for each one, using the name of |
|
48 |
the key file as the identifier for the developer. These keys will |
|
49 |
live in the "keys" subdirectory of a repository, "hgadmin". A hook in |
|
50 |
this repository re-runs "refresh-auth" on the most recent version |
|
51 |
after every push. |
|
52 |
||
13 | 53 |
GETTING STARTED |
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
54 |
|
10 | 55 |
This is only one setup - it can be tweaked in many ways, and is as |
56 |
specific as it is only in the interests of brevity. |
|
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
57 |
|
10 | 58 |
You, and all users of your Hg repository, will need SSH public key |
59 |
authentication set up, preferably working with ssh-agent so you don't |
|
60 |
have to type in your passphrase all the time. I assume you've done |
|
61 |
that in what follows, so if you've done something different you'll |
|
62 |
need to change it appropriately. |
|
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
63 |
|
10 | 64 |
Create a user called "hg" on the machine where the repository will |
65 |
live. I used the command |
|
66 |
||
67 |
sudo adduser --system --shell /bin/sh --group --disabled-password \ |
|
68 |
--gecos "Mercural repository" hg |
|
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
69 |
|
12 | 70 |
Issue these commands to become the hg user and set up the repository. |
71 |
Use your own name in place of "myname". |
|
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
72 |
|
13 | 73 |
ssh-add -L >> /tmp/my-ssh-public-key |
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
74 |
sudo -u hg -s |
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
75 |
cd ~hg |
12 | 76 |
mkdir -p admin repos/hgadmin/keys/admin |
77 |
cd admin |
|
13 | 78 |
hg clone http://hg.opensource.lshift.net/hg-admin-tools |
12 | 79 |
cp hg-admin-tools/hg-ssh-wrapper ~ |
80 |
cd ../repos/hgadmin |
|
81 |
hg init . |
|
82 |
echo "init admin/* *" > hg-ssh-access.conf |
|
83 |
cp /tmp/my-ssh-public-key keys/admin/myname |
|
13 | 84 |
hg add |
85 |
hg commit |
|
12 | 86 |
cp ~/admin/hg-admin-tools/hgadmin-hgrc .hg/hgrc |
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
87 |
../../admin/hg-admin-tools/refresh-auth |
12 | 88 |
exit |
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
89 |
|
12 | 90 |
You should now have SSH access to this repository and full control. |
91 |
To administer these controls (and test your access), check out hgadmin: |
|
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
92 |
|
12 | 93 |
mkdir ~/hg |
94 |
cd ~/hg |
|
95 |
hg clone ssh://hg@repository-host-name/hgadmin |
|
96 |
cd hgadmin |
|
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
97 |
|
10 | 98 |
You can now add other users by putting their keys in an appropriate |
99 |
subdirectory of the "keys" directory, and control their access by |
|
100 |
editing hg-ssh-access.conf. Changes will take effect as soon as you |
|
13 | 101 |
push them to the remote repository. |
102 |
||
103 |
HG-SSH-ACCESS.CONF |
|
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
104 |
|
10 | 105 |
Each line of hg-ssh-access.conf has the following syntax: |
2
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
106 |
|
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
107 |
<rule> <keypattern> <repositorypattern> |
a69f7bea408c
added a README to describe how this works.
Paul Crowley <paul@lshift.net>
parents:
diff
changeset
|
108 |
|
10 | 109 |
The "rule" is either "init", "allow", or "deny". "keypattern" is a |
110 |
glob pattern matched against the name of the key used - for example, |
|
111 |
in our initial setup "admin/myname" matches "admin/*". |
|
112 |
"repositorypattern" is a pattern matched againt the repository name - |
|
113 |
so "hgadmin" matches "*". Only boring characters are allowed in |
|
114 |
patterns and key and repository names - see the source for details. |
|
13 | 115 |
Blank lines and lines that start with "#" are ignored. The first rule |
116 |
to match both the key and the repository applies: "deny" will deny all |
|
117 |
matching requests, "allow" allows read/write access to existing |
|
118 |
repositories, and "init" allows that and creation of new repositories. |