[aur-dev] [PATCH v2 03/10] Add basic Git authentication/authorization scripts

Lukas Fleischer archlinux at cryptocrack.de
Sat Dec 27 11:51:39 UTC 2014


This adds two scripts to be used together with Git over SSH:

* git-auth.py is supposed to be used as AuthorizedKeysCommand. It checks
  whether the public key belongs to any AUR user and invokes
  git-serve.py, passing the name of the corresponding user as a command
  line argument, if any.

* git-serve.py is a wrapper around git-shell(1) that checks whether the
  user passed as command line argument has access to the Git repository
  that a push operation writes to.

Signed-off-by: Lukas Fleischer <archlinux at cryptocrack.de>
---
 conf/config.proto                    |  11 ++++
 scripts/git-integration/git-auth.py  |  41 ++++++++++++++
 scripts/git-integration/git-serve.py | 104 +++++++++++++++++++++++++++++++++++
 3 files changed, 156 insertions(+)
 create mode 100755 scripts/git-integration/git-auth.py
 create mode 100755 scripts/git-integration/git-serve.py

diff --git a/conf/config.proto b/conf/config.proto
index f00b352..13cafe0 100644
--- a/conf/config.proto
+++ b/conf/config.proto
@@ -26,3 +26,14 @@ max_rpc_results = 5000
 aur_request_ml = aur-requests at archlinux.org
 request_idle_time = 1209600
 auto_orphan_age = 15552000
+
+[auth]
+key-prefixes = ssh-rsa ssh-dss ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 ssh-ed25519
+username-regex = [a-zA-Z0-9]+[.\-_]?[a-zA-Z0-9]+$
+git-serve-cmd = /srv/http/aur/scripts/git-integration/git-serve.py
+ssh-options = no-port-forwarding,no-X11-forwarding,no-pty
+
+[serve]
+repo-base = /pub/git/
+repo-regex = [a-z0-9][a-z0-9.+_-]*$
+git-shell-cmd = /usr/bin/git-shell
diff --git a/scripts/git-integration/git-auth.py b/scripts/git-integration/git-auth.py
new file mode 100755
index 0000000..8701d5e
--- /dev/null
+++ b/scripts/git-integration/git-auth.py
@@ -0,0 +1,41 @@
+#!/usr/bin/python3
+
+import configparser
+import mysql.connector
+import os
+import re
+
+config = configparser.RawConfigParser()
+config.read(os.path.dirname(os.path.realpath(__file__)) + "/../../conf/config")
+
+aur_db_host = config.get('database', 'host')
+aur_db_name = config.get('database', 'name')
+aur_db_user = config.get('database', 'user')
+aur_db_pass = config.get('database', 'password')
+
+key_prefixes = config.get('auth', 'key-prefixes').split()
+username_regex = config.get('auth', 'username-regex')
+git_serve_cmd = config.get('auth', 'git-serve-cmd')
+ssh_opts = config.get('auth', 'ssh-options')
+
+pubkey = os.environ.get("SSH_KEY")
+valid_prefixes = tuple(p + " " for p in key_prefixes)
+if pubkey is None or not pubkey.startswith(valid_prefixes):
+    exit(1)
+
+db = mysql.connector.connect(host=aur_db_host, user=aur_db_user,
+                             passwd=aur_db_pass, db=aur_db_name,
+                             buffered=True)
+
+cur = db.cursor()
+cur.execute("SELECT Username FROM Users WHERE SSHPubKey = %s " +
+            "AND Suspended = 0", (pubkey,))
+
+if cur.rowcount != 1:
+    exit(1)
+
+user = cur.fetchone()[0]
+if not re.match(username_regex, user):
+    exit(1)
+
+print('command="%s %s",%s %s' % (git_serve_cmd, user, ssh_opts, pubkey))
diff --git a/scripts/git-integration/git-serve.py b/scripts/git-integration/git-serve.py
new file mode 100755
index 0000000..08132f2
--- /dev/null
+++ b/scripts/git-integration/git-serve.py
@@ -0,0 +1,104 @@
+#!/usr/bin/python3
+
+import configparser
+import mysql.connector
+import os
+import pygit2
+import re
+import shlex
+import sys
+
+config = configparser.RawConfigParser()
+config.read(os.path.dirname(os.path.realpath(__file__)) + "/../../conf/config")
+
+aur_db_host = config.get('database', 'host')
+aur_db_name = config.get('database', 'name')
+aur_db_user = config.get('database', 'user')
+aur_db_pass = config.get('database', 'password')
+
+repo_base_path = config.get('serve', 'repo-base')
+repo_regex = config.get('serve', 'repo-regex')
+git_shell_cmd = config.get('serve', 'git-shell-cmd')
+
+def repo_path_validate(path):
+    if not path.startswith(repo_base_path):
+        return False
+    if not path.endswith('.git/'):
+        return False
+    repo = path[len(repo_base_path):-5]
+    return re.match(repo_regex, repo)
+
+def repo_path_get_pkgbase(path):
+    pkgbase = path.rstrip('/').rpartition('/')[2]
+    if pkgbase.endswith('.git'):
+        pkgbase = pkgbase[:-4]
+    return pkgbase
+
+def setup_repo(repo, user):
+    if not re.match(repo_regex, repo):
+        die('invalid repository name: %s' % (repo))
+
+    db = mysql.connector.connect(host=aur_db_host, user=aur_db_user,
+                                 passwd=aur_db_pass, db=aur_db_name)
+    cur = db.cursor()
+
+    cur.execute("SELECT COUNT(*) FROM PackageBases WHERE Name = %s ", [repo])
+    if cur.fetchone()[0] > 0:
+        die('package base already exists: %s' % (repo))
+
+    cur.execute("SELECT ID FROM Users WHERE Username = %s ", [user])
+    userid = cur.fetchone()[0]
+    if userid == 0:
+        die('unknown user: %s' % (user))
+
+    cur.execute("INSERT INTO PackageBases (Name, SubmittedTS, ModifiedTS, " +
+                "SubmitterUID) VALUES (%s, UNIX_TIMESTAMP(), " +
+                "UNIX_TIMESTAMP(), %s)", [repo, userid])
+
+    db.commit()
+    db.close()
+
+    repo_path = repo_base_path + '/' + repo + '.git/'
+    pygit2.init_repository(repo_path, True)
+
+def check_permissions(pkgbase, user):
+    db = mysql.connector.connect(host=aur_db_host, user=aur_db_user,
+                                 passwd=aur_db_pass, db=aur_db_name,
+                                 buffered=True)
+    cur = db.cursor()
+
+    cur.execute("SELECT COUNT(*) FROM PackageBases INNER JOIN Users " +
+                "ON Users.ID = PackageBases.MaintainerUID OR " +
+                "PackageBases.MaintainerUID IS NULL WHERE " +
+                "Name = %s AND Username = %s", [pkgbase, user])
+    return cur.fetchone()[0] > 0
+
+def die(msg):
+    sys.stderr.write("%s\n" % (msg))
+    exit(1)
+
+user = sys.argv[1]
+cmd = os.environ.get("SSH_ORIGINAL_COMMAND")
+if not cmd:
+    die('no command specified')
+cmdargv = shlex.split(cmd)
+action = cmdargv[0]
+
+if action == 'git-upload-pack' or action == 'git-receive-pack':
+    path = cmdargv[1]
+    if not repo_path_validate(path):
+        die('invalid path: %s' % (path))
+    pkgbase = repo_path_get_pkgbase(path)
+    if action == 'git-receive-pack':
+        if not check_permissions(pkgbase, user):
+            die('permission denied: %s' % (user))
+    os.environ["AUR_USER"] = user
+    os.environ["AUR_GIT_DIR"] = path
+    os.environ["AUR_PKGBASE"] = pkgbase
+    os.execl(git_shell_cmd, git_shell_cmd, '-c', cmd)
+elif action == 'setup-repo':
+    if len(cmdargv) < 2:
+        die('missing repository name')
+    setup_repo(cmdargv[1], user)
+else:
+    die('invalid command: %s' % (action))
-- 
2.2.1


More information about the aur-dev mailing list