1
0
Fork 0
mirror of https://we.phorge.it/source/phorge.git synced 2024-11-10 00:42:41 +01:00

Update repository hosting documentation for all the issues users have hit

Summary:
Ref T4151. Addresses these issues:

  - Mentions `diffusion.ssh-user`.
  - Mentions `/etc/shadow` and `!!`.
  - Mentions `/etc/passwd` and shell.
  - Mentions `sshd -d -d -d`.
  - Mentions `Defaults requiretty`.
  - Adds `AllowUsers` to default configuration.
  - Mentions `sudo -E ...` as a troubleshooting step.
  - Mentions multiple VCS binaries.
  - Fixes `sshd` paths to be absolute.
  - Fixes example path in `sshd_config` template.
  - Mentions `GIT_CURL_VERBOSE`.
  - Walks users through cloning.
  - Adds documentation for custom hooks.
  - Mentions that only `daemon-user` interacts with repositories.
  - Added general troubleshooting guide.

I didn't fix these:

  - Weird one-time issue with `sudoers.d/`. We tell you to edit `/etc/sudoers` directly anyway.
  - Insane `#includedir` magic, as above.
  - Confusion around `vcs-user` for HTTP, since I think this is fairly clear.
  - Confusion around parent directory permissions -- not sure about this one, `sshd` normally runs as root?

I added an `ssh-shell` as a safer alternative to `/bin/sh`. I need to test this a bit more.

Test Plan:
  - Read documentation.
  - Will test `ssh-shell`.

Reviewers: btrahan, chad

Reviewed By: chad

Subscribers: bluehawk, mbishopim3, epriestley

Maniphest Tasks: T4151

Differential Revision: https://secure.phabricator.com/D8586
This commit is contained in:
epriestley 2014-03-26 06:44:18 -07:00
parent fc3b5ddce6
commit 2e0301d647
3 changed files with 223 additions and 12 deletions

View file

@ -3,8 +3,9 @@
# NOTE: Edit these to the correct values for your setup. # NOTE: Edit these to the correct values for your setup.
AuthorizedKeysCommand /etc/phabricator-ssh-hook.sh AuthorizedKeysCommand /usr/libexec/phabricator-ssh-hook.sh
AuthorizedKeysCommandUser vcs-user AuthorizedKeysCommandUser vcs-user
AllowUsers vcs-user
# You may need to tweak these options, but mostly they just turn off everything # You may need to tweak these options, but mostly they just turn off everything
# dangerous. # dangerous.

View file

@ -0,0 +1,52 @@
@title Diffusion User Guide: Commit Hooks
@group userguide
Guide to commit hooks in hosted repositories.
= Overview =
Phabricator installs pre-receive/pre-commit hooks in hosted repositories
automatically. They enforce a few rules automatically (like preventing
dangerous changes unless a repository is configured to allow them). They can
also enforce more complex rules via Herald, using the "Commit Hook:
Branches/Tags/Bookmarks" and "Commit Hook: Commit Content" rule types.
Herald rules are flexible, and can express many of the most common hooks that
are often installed on repositories (like protecting branches, restricting
access to repositories, and requiring review).
However, if Herald isn't powerful enough to enforce everything you want to
check, you can install additional custom hooks. These work mostly like normal
hooks, but with a few differences.
= Installing Custom Hooks =
With hosted repositories, you can install hooks by dropping them into the
relevant directory of the repository on disk:
- **SVN** Put hooks in `hooks/pre-commit-phabricator.d/`.
- **Git** Put hooks in `hooks/pre-receive-phabricator.d/`.
- **Mercurial** Phabricator does not currently support custom hooks in
Mercurial.
These hooks act like normal `pre-commit` or `pre-receive` hooks:
- Executables in these directories will be run one at a time, in alphabetical
order.
- They'll be passed the arguments and environment that normal hooks are
passed.
- They should emit output and return codes like normal hooks do.
- These hooks will run only after all the Herald rules have passed and
Phabricator is otherwise ready to accept the commit or push.
These additional variables will be available in the environment, in addition
to the variables the VCS normally provides:
- `PHABRICATOR_REPOSITORY` The callsign of the repository the hook is
executing for.
- `PHABRICATOR_USER` The Phabricator username that the session is
authenticated under.
- `PHABRICATOR_REMOTE_ADDRESS` The connection's remote address (that is,
the IP address of whoever is pushing or committing).
- `PHABRICATOR_REMOTE_PROTOCOL` The protocol the connection is using (for
example, "ssh" or "http").

View file

@ -9,9 +9,6 @@ Phabricator can host repositories and provide authenticated read and write
access to them over HTTP and SSH. This document describes how to configure access to them over HTTP and SSH. This document describes how to configure
repository hosting. repository hosting.
NOTE: This feature is new and has some rough edges. Let us know if you run into
issues (see @{article:Give Feedback! Get Support!}).
= Understanding Supported Protocols = = Understanding Supported Protocols =
Phabricator supports hosting over these protocols: Phabricator supports hosting over these protocols:
@ -53,7 +50,10 @@ machine Phabricator runs on, not Phabricator user accounts.
The system accounts are: The system accounts are:
- The user the daemons run as. We'll call this `daemon-user`. For more - The user the daemons run as. We'll call this `daemon-user`. For more
information on the daemons, see @{article:Managing Daemons with phd}. information on the daemons, see @{article:Managing Daemons with phd}. This
user is the only user which will interact with the repositories directly.
Other accounts will `sudo` to this account in order to perform VCS
operations.
- The user the webserver runs as. We'll call this `www-user`. If you do not - The user the webserver runs as. We'll call this `www-user`. If you do not
plan to make repositories available over HTTP, you do not need to perform plan to make repositories available over HTTP, you do not need to perform
any special configuration for this user. any special configuration for this user.
@ -91,16 +91,45 @@ not use.
Adding these commands to `sudoers` will allow the daemon and webserver users to Adding these commands to `sudoers` will allow the daemon and webserver users to
write to repositories as the daemon user. write to repositories as the daemon user.
Finally, once you've configured `sudoers`, set `phd.user` to the `daemon-user`: Before saving and closing `/etc/sudoers`, look for this line:
Defaults requiretty
If it's present, comment it out by putting a `#` at the beginning of the line.
With this option enabled, VCS SSH sessions won't be able to use `sudo`.
If you're planning to use SSH, you should also edit `/etc/passwd` and
`/etc/shadow` to make sure the `vcs-user` account is set up correctly.
- Open `/etc/shadow` and find the line for the `vcs-user` account.
- The second field (which is the password field) must not be set to
`!!`. This value will prevent login. If it is set to `!!`, edit it
and set it to `NP` ("no password") instead.
- Open `/etc/passwd` and find the line for the `vcs-user` account.
- The last field (which is the login shell) must be set to a real shell.
If it is set to something like `/bin/false`, then `sshd` will not be able
to execute commands. Instead, you should set it to a real shell, like
`/bin/sh`.
Finally, once you've configured `/etc/sudoers`, `/etc/shadow` and `/etc/passwd`,
set `phd.user` to the `daemon-user`:
phabricator/ $ ./bin/config set phd.user daemon-user phabricator/ $ ./bin/config set phd.user daemon-user
If you're using a `vcs-user`, you should also configure that here:
phabricator/ $ ./bin/config set diffusion.ssh-user vcs-user
= Configuring HTTP = = Configuring HTTP =
If you plan to use authenticated HTTP, you need to set If you plan to use authenticated HTTP, you need to set
`diffusion.allow-http-auth` in Config. If you don't plan to use HTTP, or plan to `diffusion.allow-http-auth` in Config. If you don't plan to use HTTP, or plan to
use only anonymous HTTP, you can leave this setting disabled. use only anonymous HTTP, you can leave this setting disabled.
If you plan to use authenticated HTTP, you'll also need to configure a VCS
password in "Settings" -> "VCS Password". This is a different password than
your main Phabricator password primarily for security reasons.
Otherwise, if you've configured system accounts above, you're all set. No Otherwise, if you've configured system accounts above, you're all set. No
additional server configuration is required to make HTTP work. additional server configuration is required to make HTTP work.
@ -111,7 +140,7 @@ works:
- You'll move the normal `sshd` daemon to another port, like `222`. When - You'll move the normal `sshd` daemon to another port, like `222`. When
connecting to the machine to administrate it, you'll use this alternate connecting to the machine to administrate it, you'll use this alternate
port. port to get a normal login shell.
- You'll run a highly restricted `sshd` on port 22, with a special locked-down - You'll run a highly restricted `sshd` on port 22, with a special locked-down
configuration that uses Phabricator to authorize users and execute commands. configuration that uses Phabricator to authorize users and execute commands.
- The `sshd` on port 22 **MUST** be 6.2 or newer, because Phabricator relies - The `sshd` on port 22 **MUST** be 6.2 or newer, because Phabricator relies
@ -128,7 +157,7 @@ automatically repairs configuration unless stopped.
To smoke-test a configuration, just start another `sshd` using the `-f` flag: To smoke-test a configuration, just start another `sshd` using the `-f` flag:
sudo sshd -f /path/to/config_file.edited sudo /path/to/sshd -f /path/to/config_file.edited
You can then connect and make sure the edited config file is valid before You can then connect and make sure the edited config file is valid before
replacing your primary configuration file. replacing your primary configuration file.
@ -177,12 +206,13 @@ If you don't do this, `sshd` will refuse to execute the hook.
`phabricator/resources/sshd/sshd_config.phabricator.example` to somewhere like `phabricator/resources/sshd/sshd_config.phabricator.example` to somewhere like
`/etc/ssh/sshd_config.phabricator`. `/etc/ssh/sshd_config.phabricator`.
Open the file and edit the `AuthorizedKeysCommand` and Open the file and edit the `AuthorizedKeysCommand`,
`AuthorizedKeysCommandUser` settings to be correct for your system. `AuthorizedKeysCommandUser`, and `AllowUsers` settings to be correct for your
system.
**Start SSHD**: Now, start the Phabricator `sshd`: **Start SSHD**: Now, start the Phabricator `sshd`:
sudo sshd -f /path/to/sshd_config.phabricator sudo /path/to/sshd -f /path/to/sshd_config.phabricator
If you did everything correctly, you should be able to run this: If you did everything correctly, you should be able to run this:
@ -193,7 +223,8 @@ If you did everything correctly, you should be able to run this:
{"result":"orbital","error_code":null,"error_info":null} {"result":"orbital","error_code":null,"error_info":null}
(If you get an authentication error, make sure you added your public key in (If you get an authentication error, make sure you added your public key in
**Settings > SSH Public Keys**.) **Settings > SSH Public Keys**.) If you're having trouble, check the
troubleshooting section below.
= Authentication Over HTTP = = Authentication Over HTTP =
@ -205,3 +236,130 @@ is enabled.
To authenticate over SSH, users should add **SSH Public Keys** in the To authenticate over SSH, users should add **SSH Public Keys** in the
**Settings** screen. **Settings** screen.
= Cloning a Repository =
If you've already set up a hosted repository, you can try cloning it now. To
do this, browse to the repository's main screen in Diffusion. You should see
clone commands at the top of the page.
To clone the repository, just run the appropriate command.
If you don't see the commands or running them doesn't work, see below for tips
on troubleshooting.
= Troubleshooting HTTP =
Some general tips for troubleshooting problems with HTTP:
- Make sure `diffusion.allow-http-auth` is enabled in your Phabricator config.
- Make sure HTTP serving is enabled for the repository you're trying to clone.
You can find this in "Edit Repository" -> "Hosting".
- Make sure you've configured a VCS password. This is separate from your main
account password. You can configure this in "Settings" -> "VCS Password".
- Make sure the main repository screen in Diffusion shows a clone/checkout
command for HTTP. If it doesn't, something above isn't set up correctly:
double-check your configuration. You should see a `svn checkout http://...`,
`git clone http://...` or `hg clone http://...` command. Run that command
verbatim to clone the repository.
If you're using Git, using `GIT_CURL_VERBOSE` may help assess login failures.
To do so, specify it on the command line before the `git clone` command, like
this:
$ GIT_CURL_VERBOSE=1 git clone ...
This will make `git` print out a lot more information. Particularly, the line
with the HTTP response is likely to be useful:
< HTTP/1.1 403 Invalid credentials.
In many cases, this can give you more information about what's wrong.
= Troubleshooting SSH =
Some general tips for troubleshooting problems with SSH:
- Check that you've configured `diffusion.ssh-user`.
- Check that you've configured `phd.user`.
- Make sure SSH serving is enabled for the repository you're trying to clone.
You can find this in "Edit Repository" -> "Hosting".
- Make sure you've added an SSH public key to your account. You can do this
in "Settings" -> "SSH Keys".
- Make sure the main repository screen in Diffusion shows a clone/checkout
command for SSH. If it doesn't, something above isn't set up correctly.
You should see an `svn checkout svn+ssh://...`, `git clone ssh://...` or
`hg clone ssh://...` command. Run that command verbatim to clone the
repository.
To troubleshoot SSH setup: connect to the server with `ssh`, without running
a command. You may need to use the `-T` flag. You should see a message like
this one:
$ ssh -T dweller@secure.phabricator.com
phabricator-ssh-exec: Welcome to Phabricator.
You are logged in as alincoln.
You haven't specified a command to run. This means you're requesting an
interactive shell, but Phabricator does not provide an interactive shell over
SSH.
Usually, you should run a command like `git clone` or `hg push` rather than
connecting directly with SSH.
Supported commands are: conduit, git-receive-pack, git-upload-pack, hg,
svnserve.
If you see this message, all your SSH stuff is configured correctly. **If you
get a login shell instead, you've missed some major setup step: review the
documentation above.** If you get some other sort of error, double check these
settings:
- You're connecting as the `vcs-user`.
- The `vcs-user` has `NP` in `/etc/shadow`.
- The `vcs-user` has `/bin/sh` or some other valid shell in `/etc/passwd`.
- Your SSH key is correct, and you've added it to Phabricator in the Settings
panel.
If you can get this far, but can't execute VCS commands like `git clone`, there
is probably an issue with your `sudoers` configuration. Check:
- Your `sudoers` file is set up as instructed above.
- You've commented out `Defaults requiretty` in `sudoers`.
- You don't have multiple copies of the VCS binaries (like `git-upload-pack`)
on your system. You may have granted sudo access to one, while the VCS user
is trying to run a different one.
- You've configured `phd.user`.
- The `phd.user` has read and write access to the repositories.
It may also be helpful to run `sshd` in debug mode:
$ /path/to/sshd -d -d -d -f /path/to/sshd_config.phabricator
This will run it in the foreground and emit a large amount of debugging
information.
Finally, you can usually test that `sudoers` is configured correctly by
doing something like this:
$ su vcs-user
$ sudo -E -n -u daemon-user -- /path/to/some/vcs-binary --help
That will try to run the binary via `sudo` in a manner similar to the way that
Phabricator will run it. This can give you better error messages about issues
with `sudoers` configuration.
= Miscellaneous Troubleshooting =
- If you're getting an error about `svnlook` not being found, add the path
where `svnlook` is located to the Phabricator configuration
`environment.append-paths` (even if it already appears in PATH). This issue
is caused by SVN wiping the environment (including PATH) when invoking
commit hooks.
= Next Steps =
Once hosted repositories are set up:
- learn about commit hooks with @{Diffusion User Guide: Commit Hooks}.