mirror of
https://we.phorge.it/source/phorge.git
synced 2024-11-10 00:42:41 +01:00
Update repository hosting documentation for all the issues users have hit
Summary: Ref T4151. Addresses these issues: - Mentions `diffusion.ssh-user`. - Mentions `/etc/shadow` and `!!`. - Mentions `/etc/passwd` and shell. - Mentions `sshd -d -d -d`. - Mentions `Defaults requiretty`. - Adds `AllowUsers` to default configuration. - Mentions `sudo -E ...` as a troubleshooting step. - Mentions multiple VCS binaries. - Fixes `sshd` paths to be absolute. - Fixes example path in `sshd_config` template. - Mentions `GIT_CURL_VERBOSE`. - Walks users through cloning. - Adds documentation for custom hooks. - Mentions that only `daemon-user` interacts with repositories. - Added general troubleshooting guide. I didn't fix these: - Weird one-time issue with `sudoers.d/`. We tell you to edit `/etc/sudoers` directly anyway. - Insane `#includedir` magic, as above. - Confusion around `vcs-user` for HTTP, since I think this is fairly clear. - Confusion around parent directory permissions -- not sure about this one, `sshd` normally runs as root? I added an `ssh-shell` as a safer alternative to `/bin/sh`. I need to test this a bit more. Test Plan: - Read documentation. - Will test `ssh-shell`. Reviewers: btrahan, chad Reviewed By: chad Subscribers: bluehawk, mbishopim3, epriestley Maniphest Tasks: T4151 Differential Revision: https://secure.phabricator.com/D8586
This commit is contained in:
parent
fc3b5ddce6
commit
2e0301d647
3 changed files with 223 additions and 12 deletions
|
@ -3,8 +3,9 @@
|
||||||
|
|
||||||
# NOTE: Edit these to the correct values for your setup.
|
# NOTE: Edit these to the correct values for your setup.
|
||||||
|
|
||||||
AuthorizedKeysCommand /etc/phabricator-ssh-hook.sh
|
AuthorizedKeysCommand /usr/libexec/phabricator-ssh-hook.sh
|
||||||
AuthorizedKeysCommandUser vcs-user
|
AuthorizedKeysCommandUser vcs-user
|
||||||
|
AllowUsers vcs-user
|
||||||
|
|
||||||
# You may need to tweak these options, but mostly they just turn off everything
|
# You may need to tweak these options, but mostly they just turn off everything
|
||||||
# dangerous.
|
# dangerous.
|
||||||
|
|
52
src/docs/user/userguide/diffusion_hooks.diviner
Normal file
52
src/docs/user/userguide/diffusion_hooks.diviner
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
@title Diffusion User Guide: Commit Hooks
|
||||||
|
@group userguide
|
||||||
|
|
||||||
|
Guide to commit hooks in hosted repositories.
|
||||||
|
|
||||||
|
= Overview =
|
||||||
|
|
||||||
|
Phabricator installs pre-receive/pre-commit hooks in hosted repositories
|
||||||
|
automatically. They enforce a few rules automatically (like preventing
|
||||||
|
dangerous changes unless a repository is configured to allow them). They can
|
||||||
|
also enforce more complex rules via Herald, using the "Commit Hook:
|
||||||
|
Branches/Tags/Bookmarks" and "Commit Hook: Commit Content" rule types.
|
||||||
|
|
||||||
|
Herald rules are flexible, and can express many of the most common hooks that
|
||||||
|
are often installed on repositories (like protecting branches, restricting
|
||||||
|
access to repositories, and requiring review).
|
||||||
|
|
||||||
|
However, if Herald isn't powerful enough to enforce everything you want to
|
||||||
|
check, you can install additional custom hooks. These work mostly like normal
|
||||||
|
hooks, but with a few differences.
|
||||||
|
|
||||||
|
= Installing Custom Hooks =
|
||||||
|
|
||||||
|
With hosted repositories, you can install hooks by dropping them into the
|
||||||
|
relevant directory of the repository on disk:
|
||||||
|
|
||||||
|
- **SVN** Put hooks in `hooks/pre-commit-phabricator.d/`.
|
||||||
|
- **Git** Put hooks in `hooks/pre-receive-phabricator.d/`.
|
||||||
|
- **Mercurial** Phabricator does not currently support custom hooks in
|
||||||
|
Mercurial.
|
||||||
|
|
||||||
|
These hooks act like normal `pre-commit` or `pre-receive` hooks:
|
||||||
|
|
||||||
|
- Executables in these directories will be run one at a time, in alphabetical
|
||||||
|
order.
|
||||||
|
- They'll be passed the arguments and environment that normal hooks are
|
||||||
|
passed.
|
||||||
|
- They should emit output and return codes like normal hooks do.
|
||||||
|
- These hooks will run only after all the Herald rules have passed and
|
||||||
|
Phabricator is otherwise ready to accept the commit or push.
|
||||||
|
|
||||||
|
These additional variables will be available in the environment, in addition
|
||||||
|
to the variables the VCS normally provides:
|
||||||
|
|
||||||
|
- `PHABRICATOR_REPOSITORY` The callsign of the repository the hook is
|
||||||
|
executing for.
|
||||||
|
- `PHABRICATOR_USER` The Phabricator username that the session is
|
||||||
|
authenticated under.
|
||||||
|
- `PHABRICATOR_REMOTE_ADDRESS` The connection's remote address (that is,
|
||||||
|
the IP address of whoever is pushing or committing).
|
||||||
|
- `PHABRICATOR_REMOTE_PROTOCOL` The protocol the connection is using (for
|
||||||
|
example, "ssh" or "http").
|
|
@ -9,9 +9,6 @@ Phabricator can host repositories and provide authenticated read and write
|
||||||
access to them over HTTP and SSH. This document describes how to configure
|
access to them over HTTP and SSH. This document describes how to configure
|
||||||
repository hosting.
|
repository hosting.
|
||||||
|
|
||||||
NOTE: This feature is new and has some rough edges. Let us know if you run into
|
|
||||||
issues (see @{article:Give Feedback! Get Support!}).
|
|
||||||
|
|
||||||
= Understanding Supported Protocols =
|
= Understanding Supported Protocols =
|
||||||
|
|
||||||
Phabricator supports hosting over these protocols:
|
Phabricator supports hosting over these protocols:
|
||||||
|
@ -53,7 +50,10 @@ machine Phabricator runs on, not Phabricator user accounts.
|
||||||
The system accounts are:
|
The system accounts are:
|
||||||
|
|
||||||
- The user the daemons run as. We'll call this `daemon-user`. For more
|
- The user the daemons run as. We'll call this `daemon-user`. For more
|
||||||
information on the daemons, see @{article:Managing Daemons with phd}.
|
information on the daemons, see @{article:Managing Daemons with phd}. This
|
||||||
|
user is the only user which will interact with the repositories directly.
|
||||||
|
Other accounts will `sudo` to this account in order to perform VCS
|
||||||
|
operations.
|
||||||
- The user the webserver runs as. We'll call this `www-user`. If you do not
|
- The user the webserver runs as. We'll call this `www-user`. If you do not
|
||||||
plan to make repositories available over HTTP, you do not need to perform
|
plan to make repositories available over HTTP, you do not need to perform
|
||||||
any special configuration for this user.
|
any special configuration for this user.
|
||||||
|
@ -91,16 +91,45 @@ not use.
|
||||||
Adding these commands to `sudoers` will allow the daemon and webserver users to
|
Adding these commands to `sudoers` will allow the daemon and webserver users to
|
||||||
write to repositories as the daemon user.
|
write to repositories as the daemon user.
|
||||||
|
|
||||||
Finally, once you've configured `sudoers`, set `phd.user` to the `daemon-user`:
|
Before saving and closing `/etc/sudoers`, look for this line:
|
||||||
|
|
||||||
|
Defaults requiretty
|
||||||
|
|
||||||
|
If it's present, comment it out by putting a `#` at the beginning of the line.
|
||||||
|
With this option enabled, VCS SSH sessions won't be able to use `sudo`.
|
||||||
|
|
||||||
|
If you're planning to use SSH, you should also edit `/etc/passwd` and
|
||||||
|
`/etc/shadow` to make sure the `vcs-user` account is set up correctly.
|
||||||
|
|
||||||
|
- Open `/etc/shadow` and find the line for the `vcs-user` account.
|
||||||
|
- The second field (which is the password field) must not be set to
|
||||||
|
`!!`. This value will prevent login. If it is set to `!!`, edit it
|
||||||
|
and set it to `NP` ("no password") instead.
|
||||||
|
- Open `/etc/passwd` and find the line for the `vcs-user` account.
|
||||||
|
- The last field (which is the login shell) must be set to a real shell.
|
||||||
|
If it is set to something like `/bin/false`, then `sshd` will not be able
|
||||||
|
to execute commands. Instead, you should set it to a real shell, like
|
||||||
|
`/bin/sh`.
|
||||||
|
|
||||||
|
Finally, once you've configured `/etc/sudoers`, `/etc/shadow` and `/etc/passwd`,
|
||||||
|
set `phd.user` to the `daemon-user`:
|
||||||
|
|
||||||
phabricator/ $ ./bin/config set phd.user daemon-user
|
phabricator/ $ ./bin/config set phd.user daemon-user
|
||||||
|
|
||||||
|
If you're using a `vcs-user`, you should also configure that here:
|
||||||
|
|
||||||
|
phabricator/ $ ./bin/config set diffusion.ssh-user vcs-user
|
||||||
|
|
||||||
= Configuring HTTP =
|
= Configuring HTTP =
|
||||||
|
|
||||||
If you plan to use authenticated HTTP, you need to set
|
If you plan to use authenticated HTTP, you need to set
|
||||||
`diffusion.allow-http-auth` in Config. If you don't plan to use HTTP, or plan to
|
`diffusion.allow-http-auth` in Config. If you don't plan to use HTTP, or plan to
|
||||||
use only anonymous HTTP, you can leave this setting disabled.
|
use only anonymous HTTP, you can leave this setting disabled.
|
||||||
|
|
||||||
|
If you plan to use authenticated HTTP, you'll also need to configure a VCS
|
||||||
|
password in "Settings" -> "VCS Password". This is a different password than
|
||||||
|
your main Phabricator password primarily for security reasons.
|
||||||
|
|
||||||
Otherwise, if you've configured system accounts above, you're all set. No
|
Otherwise, if you've configured system accounts above, you're all set. No
|
||||||
additional server configuration is required to make HTTP work.
|
additional server configuration is required to make HTTP work.
|
||||||
|
|
||||||
|
@ -111,7 +140,7 @@ works:
|
||||||
|
|
||||||
- You'll move the normal `sshd` daemon to another port, like `222`. When
|
- You'll move the normal `sshd` daemon to another port, like `222`. When
|
||||||
connecting to the machine to administrate it, you'll use this alternate
|
connecting to the machine to administrate it, you'll use this alternate
|
||||||
port.
|
port to get a normal login shell.
|
||||||
- You'll run a highly restricted `sshd` on port 22, with a special locked-down
|
- You'll run a highly restricted `sshd` on port 22, with a special locked-down
|
||||||
configuration that uses Phabricator to authorize users and execute commands.
|
configuration that uses Phabricator to authorize users and execute commands.
|
||||||
- The `sshd` on port 22 **MUST** be 6.2 or newer, because Phabricator relies
|
- The `sshd` on port 22 **MUST** be 6.2 or newer, because Phabricator relies
|
||||||
|
@ -128,7 +157,7 @@ automatically repairs configuration unless stopped.
|
||||||
|
|
||||||
To smoke-test a configuration, just start another `sshd` using the `-f` flag:
|
To smoke-test a configuration, just start another `sshd` using the `-f` flag:
|
||||||
|
|
||||||
sudo sshd -f /path/to/config_file.edited
|
sudo /path/to/sshd -f /path/to/config_file.edited
|
||||||
|
|
||||||
You can then connect and make sure the edited config file is valid before
|
You can then connect and make sure the edited config file is valid before
|
||||||
replacing your primary configuration file.
|
replacing your primary configuration file.
|
||||||
|
@ -177,12 +206,13 @@ If you don't do this, `sshd` will refuse to execute the hook.
|
||||||
`phabricator/resources/sshd/sshd_config.phabricator.example` to somewhere like
|
`phabricator/resources/sshd/sshd_config.phabricator.example` to somewhere like
|
||||||
`/etc/ssh/sshd_config.phabricator`.
|
`/etc/ssh/sshd_config.phabricator`.
|
||||||
|
|
||||||
Open the file and edit the `AuthorizedKeysCommand` and
|
Open the file and edit the `AuthorizedKeysCommand`,
|
||||||
`AuthorizedKeysCommandUser` settings to be correct for your system.
|
`AuthorizedKeysCommandUser`, and `AllowUsers` settings to be correct for your
|
||||||
|
system.
|
||||||
|
|
||||||
**Start SSHD**: Now, start the Phabricator `sshd`:
|
**Start SSHD**: Now, start the Phabricator `sshd`:
|
||||||
|
|
||||||
sudo sshd -f /path/to/sshd_config.phabricator
|
sudo /path/to/sshd -f /path/to/sshd_config.phabricator
|
||||||
|
|
||||||
If you did everything correctly, you should be able to run this:
|
If you did everything correctly, you should be able to run this:
|
||||||
|
|
||||||
|
@ -193,7 +223,8 @@ If you did everything correctly, you should be able to run this:
|
||||||
{"result":"orbital","error_code":null,"error_info":null}
|
{"result":"orbital","error_code":null,"error_info":null}
|
||||||
|
|
||||||
(If you get an authentication error, make sure you added your public key in
|
(If you get an authentication error, make sure you added your public key in
|
||||||
**Settings > SSH Public Keys**.)
|
**Settings > SSH Public Keys**.) If you're having trouble, check the
|
||||||
|
troubleshooting section below.
|
||||||
|
|
||||||
= Authentication Over HTTP =
|
= Authentication Over HTTP =
|
||||||
|
|
||||||
|
@ -205,3 +236,130 @@ is enabled.
|
||||||
|
|
||||||
To authenticate over SSH, users should add **SSH Public Keys** in the
|
To authenticate over SSH, users should add **SSH Public Keys** in the
|
||||||
**Settings** screen.
|
**Settings** screen.
|
||||||
|
|
||||||
|
= Cloning a Repository =
|
||||||
|
|
||||||
|
If you've already set up a hosted repository, you can try cloning it now. To
|
||||||
|
do this, browse to the repository's main screen in Diffusion. You should see
|
||||||
|
clone commands at the top of the page.
|
||||||
|
|
||||||
|
To clone the repository, just run the appropriate command.
|
||||||
|
|
||||||
|
If you don't see the commands or running them doesn't work, see below for tips
|
||||||
|
on troubleshooting.
|
||||||
|
|
||||||
|
= Troubleshooting HTTP =
|
||||||
|
|
||||||
|
Some general tips for troubleshooting problems with HTTP:
|
||||||
|
|
||||||
|
- Make sure `diffusion.allow-http-auth` is enabled in your Phabricator config.
|
||||||
|
- Make sure HTTP serving is enabled for the repository you're trying to clone.
|
||||||
|
You can find this in "Edit Repository" -> "Hosting".
|
||||||
|
- Make sure you've configured a VCS password. This is separate from your main
|
||||||
|
account password. You can configure this in "Settings" -> "VCS Password".
|
||||||
|
- Make sure the main repository screen in Diffusion shows a clone/checkout
|
||||||
|
command for HTTP. If it doesn't, something above isn't set up correctly:
|
||||||
|
double-check your configuration. You should see a `svn checkout http://...`,
|
||||||
|
`git clone http://...` or `hg clone http://...` command. Run that command
|
||||||
|
verbatim to clone the repository.
|
||||||
|
|
||||||
|
If you're using Git, using `GIT_CURL_VERBOSE` may help assess login failures.
|
||||||
|
To do so, specify it on the command line before the `git clone` command, like
|
||||||
|
this:
|
||||||
|
|
||||||
|
$ GIT_CURL_VERBOSE=1 git clone ...
|
||||||
|
|
||||||
|
This will make `git` print out a lot more information. Particularly, the line
|
||||||
|
with the HTTP response is likely to be useful:
|
||||||
|
|
||||||
|
< HTTP/1.1 403 Invalid credentials.
|
||||||
|
|
||||||
|
In many cases, this can give you more information about what's wrong.
|
||||||
|
|
||||||
|
= Troubleshooting SSH =
|
||||||
|
|
||||||
|
Some general tips for troubleshooting problems with SSH:
|
||||||
|
|
||||||
|
- Check that you've configured `diffusion.ssh-user`.
|
||||||
|
- Check that you've configured `phd.user`.
|
||||||
|
- Make sure SSH serving is enabled for the repository you're trying to clone.
|
||||||
|
You can find this in "Edit Repository" -> "Hosting".
|
||||||
|
- Make sure you've added an SSH public key to your account. You can do this
|
||||||
|
in "Settings" -> "SSH Keys".
|
||||||
|
- Make sure the main repository screen in Diffusion shows a clone/checkout
|
||||||
|
command for SSH. If it doesn't, something above isn't set up correctly.
|
||||||
|
You should see an `svn checkout svn+ssh://...`, `git clone ssh://...` or
|
||||||
|
`hg clone ssh://...` command. Run that command verbatim to clone the
|
||||||
|
repository.
|
||||||
|
|
||||||
|
To troubleshoot SSH setup: connect to the server with `ssh`, without running
|
||||||
|
a command. You may need to use the `-T` flag. You should see a message like
|
||||||
|
this one:
|
||||||
|
|
||||||
|
$ ssh -T dweller@secure.phabricator.com
|
||||||
|
phabricator-ssh-exec: Welcome to Phabricator.
|
||||||
|
|
||||||
|
You are logged in as alincoln.
|
||||||
|
|
||||||
|
You haven't specified a command to run. This means you're requesting an
|
||||||
|
interactive shell, but Phabricator does not provide an interactive shell over
|
||||||
|
SSH.
|
||||||
|
|
||||||
|
Usually, you should run a command like `git clone` or `hg push` rather than
|
||||||
|
connecting directly with SSH.
|
||||||
|
|
||||||
|
Supported commands are: conduit, git-receive-pack, git-upload-pack, hg,
|
||||||
|
svnserve.
|
||||||
|
|
||||||
|
If you see this message, all your SSH stuff is configured correctly. **If you
|
||||||
|
get a login shell instead, you've missed some major setup step: review the
|
||||||
|
documentation above.** If you get some other sort of error, double check these
|
||||||
|
settings:
|
||||||
|
|
||||||
|
- You're connecting as the `vcs-user`.
|
||||||
|
- The `vcs-user` has `NP` in `/etc/shadow`.
|
||||||
|
- The `vcs-user` has `/bin/sh` or some other valid shell in `/etc/passwd`.
|
||||||
|
- Your SSH key is correct, and you've added it to Phabricator in the Settings
|
||||||
|
panel.
|
||||||
|
|
||||||
|
If you can get this far, but can't execute VCS commands like `git clone`, there
|
||||||
|
is probably an issue with your `sudoers` configuration. Check:
|
||||||
|
|
||||||
|
- Your `sudoers` file is set up as instructed above.
|
||||||
|
- You've commented out `Defaults requiretty` in `sudoers`.
|
||||||
|
- You don't have multiple copies of the VCS binaries (like `git-upload-pack`)
|
||||||
|
on your system. You may have granted sudo access to one, while the VCS user
|
||||||
|
is trying to run a different one.
|
||||||
|
- You've configured `phd.user`.
|
||||||
|
- The `phd.user` has read and write access to the repositories.
|
||||||
|
|
||||||
|
It may also be helpful to run `sshd` in debug mode:
|
||||||
|
|
||||||
|
$ /path/to/sshd -d -d -d -f /path/to/sshd_config.phabricator
|
||||||
|
|
||||||
|
This will run it in the foreground and emit a large amount of debugging
|
||||||
|
information.
|
||||||
|
|
||||||
|
Finally, you can usually test that `sudoers` is configured correctly by
|
||||||
|
doing something like this:
|
||||||
|
|
||||||
|
$ su vcs-user
|
||||||
|
$ sudo -E -n -u daemon-user -- /path/to/some/vcs-binary --help
|
||||||
|
|
||||||
|
That will try to run the binary via `sudo` in a manner similar to the way that
|
||||||
|
Phabricator will run it. This can give you better error messages about issues
|
||||||
|
with `sudoers` configuration.
|
||||||
|
|
||||||
|
= Miscellaneous Troubleshooting =
|
||||||
|
|
||||||
|
- If you're getting an error about `svnlook` not being found, add the path
|
||||||
|
where `svnlook` is located to the Phabricator configuration
|
||||||
|
`environment.append-paths` (even if it already appears in PATH). This issue
|
||||||
|
is caused by SVN wiping the environment (including PATH) when invoking
|
||||||
|
commit hooks.
|
||||||
|
|
||||||
|
= Next Steps =
|
||||||
|
|
||||||
|
Once hosted repositories are set up:
|
||||||
|
|
||||||
|
- learn about commit hooks with @{Diffusion User Guide: Commit Hooks}.
|
||||||
|
|
Loading…
Reference in a new issue