Sophie

Sophie

distrib > Fedora > 14 > x86_64 > media > updates > by-pkgid > ba9fe7781d529b2e7b31d8489f5e0b8e > files > 17

gitolite-1.5.3-2.fc14.noarch.rpm

<h1>ssh troubleshooting</h1>

<p>In this document:</p>

<ul>
<li><a href="#the_most_common_problems_that_an_admin_will_see">the most common problems that an admin will see</a></li>
<li><a href="#basic_ssh_troubleshooting">basic ssh troubleshooting</a>
<ul>
<li><a href="#passphrases_versus_passwords">passphrases versus passwords</a></li>
<li><a href="#ssh_agent_problems">ssh-agent problems</a></li>
<li><a href="#basic_ssh_troubleshooting_for_the_main_admin">basic ssh troubleshooting for the main admin</a></li>
<li><a href="#basic_ssh_troubleshooting_for_a_normal_user">basic ssh troubleshooting for a normal user</a></li>
</ul></li>
<li><a href="#windows_issues">windows issues</a></li>
<li><a href="#details">details</a>
<ul>
<li><a href="#files_on_the_server">files on the server</a></li>
<li><a href="#files_on_client">files on client</a></li>
<li><a href="#why_two_keys_on_client">why two keys on client</a></li>
</ul></li>
<li><a href="#some_other_tips_and_tricks">some other tips and tricks</a>
<ul>
<li><a href="#giving_shell_access_to_gitolite_users">giving shell access to gitolite users</a></li>
<li><a href="#losing_your_admin_key">losing your admin key</a></li>
<li><a href="#simulating_ssh_copy_id">simulating ssh-copy-id</a></li>
</ul></li>
</ul>

<hr />

<p>This document should help you troubleshoot ssh-related problems in accessing
gitolite <em>after</em> the install has completed successfully.</p>

<p>In addition, I <strong>strongly</strong> recommend reading
<a href="http://github.com/sitaramc/gitolite/blob/pu/doc/9-gitolite-and-ssh.mkd">doc/9-gitolite-and-ssh.mkd</a>, which is a very detailed look at how
gitolite uses ssh's features on the server side.  Most people don't know ssh
as well as they <em>think</em> they do; even if you don't have any problems right
now, it's worth skimming over.</p>

<p>In addition to both these documents, there's now a program called
<code>sshkeys-lint</code> that you can run on your client.  Run it without arguments to
get help on how to run it and what inputs it needs.</p>

<p><a name="the_most_common_problems_that_an_admin_will_see"></a></p>

<h3>the most common problems that an admin will see</h3>

<p>Ironically, these problems <strong>only</strong> happen to the person who installed
gitolite using easy-install (the "from-client" method in
<a href="http://github.com/sitaramc/gitolite/blob/pu/doc/0-INSTALL.mkd">doc/0-INSTALL.mkd</a>), and has <strong>utterly failed</strong> to read/heed the
message that shows up at the end of running that command.  This is because
only the admin has <em>two</em> ssh keys to the server (see "basic ssh
troubleshooting for the main admin" section below for more on this).</p>

<p>Both these problems are caused by using the wrong key, thus <strong>bypassing gitolite
completely</strong>:</p>

<ul>
<li><p>you get <code>fatal: 'reponame' does not appear to be a git repository</code>, and
yet you are sure 'reponame' exists, you haven't mis-spelled it, etc.</p></li>
<li><p>you are able to clone repositories but are unable to push changes back
(the error complains about the <code>GL_RC</code> environment variable not being set,
and the <code>hooks/update</code> failing in some way).</p></li>
</ul>

<p>Let us recap the message that appears on a successful run of the "easy-install"
program; it looks something like this (with suitable values substituted for
<code>&lt;user&gt;</code>, <code>&lt;server&gt;</code>, and <code>&lt;port&gt;</code>):</p>

<pre><code>IMPORTANT NOTE -- PLEASE READ!!!
    *Your* URL for cloning any repo on this server will be
        gitolite:reponame.git

    *Other* users you set up will have to use
        &lt;user&gt;@&lt;server&gt;:reponame.git
    However, if your server uses a non-standard ssh port, they should use
        ssh://&lt;user&gt;@&lt;server&gt;:&lt;port&gt;/reponame.git

    If this is your first time installing gitolite, please also:
        tail -31 src/gl-easy-install
    for next steps.
</code></pre>

<p>The first error above happens if you use <code>git@server:reponame</code> instead of
<code>gitolite:reponame</code>.  All your repos are actually in a subdirectory pointed to
by <code>$REPO_BASE</code> in the rc file (default: <code>repositories</code>).  Gitolite internally
prefixes this before calling the actual git command you invoked, but since
you're bypassing gitolite completely, this prefixing does not happen, and so
the repo is not found.</p>

<p>The second error happens if you use <code>git@server:repositories/reponame.git</code>
(assuming default <code>$REPO_BASE</code> setting)  -- that is, you used the full unix
path.  Since the "prefixing" mentioned above is not required, the shell finds
the repo and clones ok.  But when you push, gitolite's <strong>update hook</strong> kicks
in, and fails to run because you some of the environment variables it is
expecting are not present.</p>

<p><a name="basic_ssh_troubleshooting"></a></p>

<h3>basic ssh troubleshooting</h3>

<p>I assume the gitolite server is called "server" and the user hosting all the
gitolite repos is "git".  I will also be using "sitaram" as the <em>gitolite
username</em> of the admin.</p>

<p>Unless specifically mentioned, all these commands are run on the user's or
admin's workstation, not on the server.</p>

<p><a name="passphrases_versus_passwords"></a></p>

<h4>passphrases versus passwords</h4>

<p>When you create an ssh keypair, you have the option of protecting it with a
passphrase.  When you subsequently use that keypair to access a remote host,
your <em>local</em> ssh client needs to unlock the corresponding private key, and ssh
will probably ask for the passphrase you set when you created the keypair.</p>

<p>Do not confuse or mistake this prompt (<code>Enter passphrase for key
'/home/sitaram/.ssh/id_rsa':</code>) for a password prompt from the remote server!</p>

<p>You have two choices to avoid this prompt every time you try to access the
remote.  The first is to create keypairs <em>without</em> a passphrase (just hit
enter when prompted for one).  <strong>Be sure to add a passphrase later, once
everything is working, using <code>ssh-keygen -p</code></strong>.</p>

<p>The second is to use <code>ssh-agent</code> (or <code>keychain</code>, which in turn uses
<code>ssh-agent</code>) or something like that to manage your keys.  Other than the next
section, further discussion of this is out of scope of this document.</p>

<p><a name="ssh_agent_problems"></a></p>

<h4>ssh-agent problems</h4>

<ol>
<li><p>Run <code>ssh-add -l</code>.  If this responds with either "The agent has no
identities." or "Could not open a connection to your authentication
agent.", skip this section.</p></li>
<li><p>However, if it lists some keys, like this:</p>

<pre><code>2048 fc:c1:48:1e:06:31:97:a4:8b:fc:37:b2:76:14:c7:53 /home/sitaram/.ssh/id_rsa (RSA)
2048 d2:e0:7f:fa:1a:89:22:41:bb:06:d9:ff:a7:27:36:5c /home/sitaram/.ssh/sitaram (RSA)
</code></pre>

<p>then run <code>ls ~/.ssh</code> and make sure that all the keypairs you have there
are represented in the <code>ssh-add -l</code> output.</p></li>
<li><p>If you find any keypairs in <code>~/.ssh</code> that are not represented in the
<code>ssh-add -l</code> output, add them.  For instance, if <code>ssh-add -l</code> showed me
only the <code>id_rsa</code> key, but I also had a <code>sitaram</code> (and <code>sitaram.pub</code>)
keypair, I'd run <code>ssh-add ~/.ssh/sitaram</code> to add it.</p></li>
</ol>

<p>This is because ssh-agent has a quirk: if <code>ssh-add -l</code> shows <em>any</em> keys at
all, ssh will only use those keys.  Even if you explicitly specify an unlisted
key using <code>ssh -i</code> or an <code>identityfile</code> directive in the config file, it won't
use it.</p>

<p><a name="basic_ssh_troubleshooting_for_the_main_admin"></a></p>

<h4>basic ssh troubleshooting for the main admin</h4>

<p>You're the "main admin" if you're trying to access gitolite from the same
workstation and user account where you ran the "easy install" command.  You
should have two keypairs in your <code>~/.ssh</code> directory.  The pair called <code>id_rsa</code>
(and <code>id_rsa.pub</code>) was probably the first one you created, and you used this
to get passwordless (pubkey based) access to the server (which was a
pre-requisite for running the easy install command).</p>

<p>The second keypair has the same name as the last argument in the easy install
command you ran (in my case, <code>sitaram</code> and <code>sitaram.pub</code>).  It was probably
created by the easy install script, and is the key used for gitolite access.</p>

<p>In addition, you should have a "gitolite" paragraph in your <code>~/.ssh/config</code>,
looking something like this:</p>

<pre><code>host gitolite
     user git
     hostname server
     identityfile ~/.ssh/sitaram
</code></pre>

<p>If any of these are not true, you did something funky in your install; email
me or hop onto #git and hope for the best ;-)</p>

<p>Otherwise, run these checks:</p>

<ol>
<li><p><code>ssh git@server</code> should get you a command line.</p>

<p>If it asks you for a password, then your <code>id_rsa</code> keypair changed after
you ran the easy install, or someone fiddled with the
<code>~/.ssh/authorized_keys</code> file on the server.</p>

<p>If it prints <a href="http://github.com/sitaramc/gitolite/blob/pu/doc/3-faq-tips-etc.mkd#myrights">gitolite version and access info</a>, you managed to
overwrite the <code>id_rsa</code> keypair with the <code>sitaram</code> keypair, or something
equally weird.</p></li>
<li><p><code>ssh gitolite info</code> should print some <a href="http://github.com/sitaramc/gitolite/blob/pu/doc/3-faq-tips-etc.mkd#myrights">gitolite version and access
info</a>.  If you get the output of the GNU info command instead,
you probably reused your <code>id_rsa</code> keypair as your <code>sitaram</code> keypair, or
overwrote the <code>sitaram</code> keypair with the <code>id_rsa</code> keypair.</p></li>
</ol>

<p>There are many ways to fix this, depending on where and what the damage is.
The most generic way (and therefore time-taking) is to re-install gitolite
from scratch:</p>

<ul>
<li>make a backup of your gitolite-admin repo clone somewhere (basically your
"keydir/*.pub" and your "conf/gitolite.conf").  If necessary get these
files from the server's <code>~/.gitolite</code> directory.</li>
<li>log on to the server somehow (using some other account, using a password,
su-ing in, etc) and delete <code>~/.ssh/authorized_keys</code>.  Rename or move aside
<code>~/.gitolite</code> so that also looks like it is missing.</li>
<li>back on your workstation, make sure you have 2 keypairs (<code>id_rsa</code> and
<code>sitaram</code>, along with corresponding <code>.pub</code> files).  Create them if needed.
Also make sure they are <em>different</em> and not a copy of each other :-)</li>
<li>install gitolite normally:
<ul>
<li>run <code>ssh-copy-id -i ~/.ssh/id_rsa git@server</code> to get passwordless
access to the server.  (Mac users may have to do this step manually)</li>
<li>make sure <code>ssh git@server pwd</code> prints the <code>$HOME</code> of <code>git@server</code>
<strong>without</strong> asking for a password.  Do not proceed till this works.</li>
<li>run easy install again, (in my case: <code>cd gitolite-source;
src/gl-easy-install -q git server sitaram</code>)</li>
</ul></li>
<li>go to your gitolite-admin repo clone, and copy <code>conf/gitolite.conf</code> and
<code>keydir/*.pub</code> from your backup to this directory</li>
<li>copy (be sure to overwrite!) <code>~/.ssh/sitaram.pub</code> also to keydir</li>
<li>now <code>git add keydir; git commit; git push -f</code></li>
</ul>

<p>That's a long sequence but it should work.</p>

<p><a name="basic_ssh_troubleshooting_for_a_normal_user"></a></p>

<h4>basic ssh troubleshooting for a normal user</h4>

<p>For a normal user, life is much simpler.  They should have only one pubkey,
which was previously sent to the gitolite admin to add into the admin repo's
<code>keydir</code> as "user.pub", and then "user" given permissions to some repo.</p>

<p><code>ssh git@server info</code> should get you <a href="http://github.com/sitaramc/gitolite/blob/pu/doc/3-faq-tips-etc.mkd#myrights">gitolite version and access
info</a>.  If it asks you for a password, your pubkey was not sent to
the server properly.  Check with your admin.</p>

<p>If it gets you the GNU info command output, you have shell access.  This means
you had command line access to the server <em>before</em> you were added as a
gitolite user.  If you send that same key to your gitolite admin to include in
the admin repo, it won't work.  For reasons why, see below.</p>

<p><a name="windows_issues"></a></p>

<h3>windows issues</h3>

<p>On windows, I have only used msysgit, and the openssh that comes with it.
Over time, I have grown to distrust putty/plink due to the number of people
who seem to have trouble when those beasts are involved (I myself have never
used them for any kind of git access).  If you have unusual ssh problems that
just don't seem to have any explanation, try removing all traces of
putty/plink, including environment variables, etc., and then try again.</p>

<p>If you can offer an <em>authoritative</em> account of the complications involved, and
how to resolve them and get things working, I'd be happy to credit you and
include it, either directly here if it is short enough or just an external
link, or in contrib/ if it's a longer piece of text.</p>

<p><a name="details"></a></p>

<h3>details</h3>

<p>Here's how it all hangs together.</p>

<p><a name="files_on_the_server"></a></p>

<h4>files on the server</h4>

<ul>
<li><p>the authkeys file; this contains one line containing the pubkey of each
user who is permitted to login without a password.</p>

<p>Pubkey lines that give shell access look like this:</p>

<pre><code>ssh-rsa AAAAB3NzaC[snip]uPjrUiAUew== /home/sitaram/.ssh/id_rsa
</code></pre>

<p>On a typical server there will be only one or two of these lines.</p>

<p>Note that the last bit (<code>/home/sitaram/.ssh/id_rsa</code>) is purely a <em>comment</em>
field and can be anything.  Also, the actual lines are much longer, about
400 characters; I snipped 'em in the middle, as you can see.</p>

<p>In contrast, pubkey lines that give access to git repos hosted by gitolite
look like this:</p>

<pre><code>command="[some path]src/gl-auth-command sitaram",[some restrictions] ssh-rsa AAAAB3NzaC[snip]s18OnB42oQ== sitaram@sita-lt
</code></pre>

<p>You will have many more of these lines -- one for every pubkey file in
<code>keydir/</code> of your gitolite-admin repo, with the corresponding username in
place of "sitaram" in the example above.</p>

<p>The "command=" at the beginning ensures that when someone with the
corresponding private key logs in, they don't get a shell.  Instead, the
<code>gl-auth-command</code> program is run, and (in this example) is given the
argument <code>sitaram</code>.  This is how gitolite is invoked, (and is told the
user logging in is "sitaram").</p></li>
</ul>

<p><a name="files_on_client"></a></p>

<h4>files on client</h4>

<ul>
<li><p>default keypair; used to get shell access to servers.  You would have
copied this pubkey to the gitolite server in order to log in without a
password.  (On Linux systems you may have used <code>ssh-copy-id</code> to do that).
You would have done this <em>before</em> you ran the easy install script, because
otherwise easy install won't run!</p>

<pre><code>~/.ssh/id_rsa
~/.ssh/id_rsa.pub
</code></pre></li>
<li><p>gitolite keypair; the "sitaram" in this is the 3rd argument to the
<code>src/gl-easy-install</code> command you ran; the easy install script does the
rest</p>

<pre><code>~/.ssh/sitaram
~/.ssh/sitaram.pub
</code></pre></li>
<li><p>config file; this file has an entry for gitolite access:</p>

<pre><code>~/.ssh/config
</code></pre>

<p>To understand why we need that, let's step back a bit.  Normally, you
might expect to access gitolite repos like this:</p>

<pre><code>ssh://git@server/reponame.git
</code></pre>

<p>But this won't work, because this ends up using the <em>default</em> keypair
(normally), which gives you a command line.  Which means it won't invoke
the <code>gl-auth-command</code> program at all, and so none of gitolite's access
control will work.</p>

<p><a name="altkey"></a></p>

<p>You need to force ssh to use the <em>other</em> keypair when performing a git
operation.  With normal ssh, that would be</p>

<pre><code>ssh -i ~/.ssh/sitaram git@server
</code></pre>

<p>but git does not support putting an alternate keypair in the URL.</p>

<p>Luckily, ssh has a very convenient way of capturing all the connection
information (username, hostname, port number (if it's not the default 22),
and keypair to be used) in one "paragraph" of <code>~/.ssh/config</code>.  This is
what the para looks like for us (the easy install script puts it there the
first time):</p>

<pre><code>host gitolite
     user git
     hostname server
     identityfile ~/.ssh/sitaram
</code></pre>

<p>(The "gitolite" can be anything you want of course; it's like a group name
for all the stuff below it).  This ensures that typing</p>

<pre><code>ssh gitolite
</code></pre>

<p>is equivalent to</p>

<pre><code>ssh -i ~/.ssh/sitaram git@server
</code></pre>

<p>and therefore this:</p>

<pre><code>git clone gitolite:reponame.git
</code></pre>

<p>now works as expected, invoking the special keypair instead of the default
one.</p></li>
</ul>

<p><a name="why_two_keys_on_client"></a></p>

<h4>why two keys on client</h4>

<p>[This section is only applicable to installs done using the "from-client"
method; see <a href="http://github.com/sitaramc/gitolite/blob/pu/doc/0-INSTALL.mkd">doc/0-INSTALL.mkd</a> for details].</p>

<p>Why do I (the admin) need two <strong>different</strong> keypairs?</p>

<p>There are two types of access the admin will make to the server: a normal
login, to get a shell prompt, and gitolite access (clone/fetch/push etc).  The
first access needs an authkeys line <em>without</em> any "command=" restrictions,
while the second requires a line <em>with</em> such a restriction.</p>

<p>And we can't use the same key for both because there is no way to disambiguate
them; the ssh server will always (<em>always</em>) pick the first one in sequence
when the key is offered by the ssh client.</p>

<p>So the next question is usually "I have other ways to get a shell on that
account, so why do I need a key for shell access at all?"</p>

<p>The answer to this is that the "easy install" script, being written for the
most general case, needs shell access via ssh to do its stuff.</p>

<p>If you really, really, want to get rid of the extra key, here's a transcript
that should have enough info to get you going (but it helps to know ssh well):</p>

<ul>
<li><p>on "sitaram" user, on my workstation</p>

<pre><code>cd ~/.ssh
cp id_rsa sitaram
cp id_rsa.pub sitaram.pub
cd ~/gitolite-clone
src/gl-easy-install -q git my.git.server sitaram
</code></pre>

<p>that last command produces something like the following:</p>

<pre><code>you are upgrading from     (unknown)     to v0.80-6-gdde8c4e
setting up keypair...
    ...reusing /home/sitaram/.ssh/sitaram.pub...
creating gitolite para in ~/.ssh/config...
finding/creating gitolite rc...
installing/upgrading...
Pseudo-terminal will not be allocated because stdin is not a terminal.
[master (root-commit) e717a89] start
 2 files changed, 11 insertions(+), 0 deletions(-)
 create mode 100644 conf/gitolite.conf
 create mode 100644 keydir/sitaram.pub
cloning gitolite-admin repo...
Initialized empty Git repository in /home/sitaram/gitolite-admin/.git/
fatal: 'gitolite-admin.git' does not appear to be a git repository
fatal: The remote end hung up unexpectedly
</code></pre>

<p>notice that the final step (the clone of the newly created gitolite-admin
repo) failed, as expected</p></li>
<li><p>now log on to the git hosting account (<code>git@my.git.server</code> in this
example), edit <code>~/.ssh/authorized_keys</code>, and delete the line with the
first occurrence of your key (this should be <em>before</em> the <code># gitolite
start</code> line)</p></li>
<li><p>now go back to your workstation and</p>

<pre><code>git clone git@my.git.server:gitolite-admin
</code></pre></li>
</ul>

<p>That should do it.</p>

<p><a name="some_other_tips_and_tricks"></a></p>

<h3>some other tips and tricks</h3>

<p><a name="giving_shell_access_to_gitolite_users"></a></p>

<h4>giving shell access to gitolite users</h4>

<p>We've managed (thanks to an idea from Jesse Keating) to make it possible for a
single key to allow both gitolite access <em>and</em> shell access.</p>

<p>This is done by copying the pubkey (to which you want to give shell access) to
the server and running either</p>

<pre><code>cd $HOME/.gitolite  # assuming default $GL_ADMINDIR in ~/.gitolite.rc
src/gl-tool shell-add ~/foo.pub
</code></pre>

<p>or</p>

<pre><code>gl-tool shell-add ~/foo.pub
</code></pre>

<p>The first method is to be used if you used the <strong>user-install</strong> mode, while
the second method is for the <strong>system-install followed by user-setup</strong> mode
(see doc/0-INSTALL.mkd, section on "install methods", for more on this)</p>

<p><strong>IMPORTANT UPGRADE NOTE</strong>: previous implementations of this feature were
crap.  There was no easy/elegant way to ensure that someone who had repo admin
access would not manage to get himself shell access.</p>

<p>Giving someone shell access requires that you should have shell access in the
first place, so the simplest way is to enable it from the server side only.</p>

<p><a name="losing_your_admin_key"></a></p>

<h4>losing your admin key</h4>

<p>If you lost the admin key, and need to re-establish ownership of the
gitolite-admin repository with a fresh key, take a look at the
<code>src/gl-emergency-addkey</code> program.  You will need shell access to the server
of course.  The top of the script has useful information on how to use it and
what it needs.</p>

<p><a name="simulating_ssh_copy_id"></a></p>

<h4>simulating ssh-copy-id</h4>

<p>don't have <code>ssh-copy-id</code>?  This is broadly what that command does, if you want
to replicate it manually.  The input is your pubkey, typically
<code>~/.ssh/id_rsa.pub</code> from your client/workstation.</p>

<ul>
<li><p>it copies it to the server as some file</p></li>
<li><p>it appends that file to <code>~/.ssh/authorized_keys</code> on the server
(creating it if it doesn't already exist)</p></li>
<li><p>it then makes sure that all these files/directories have go-w perms
set (assuming user is "git"):</p>

<pre><code>/home/git/.ssh/authorized_keys
/home/git/.ssh
/home/git
</code></pre></li>
</ul>

<p>[Actually, <code>sshd</code> requires that even directories <em>above</em> <code>~</code> (<code>/</code>, <code>/home</code>,
typically) also must be <code>go-w</code>, but that needs root.  And typically
they're already set that way anyway.  (Or if they're not, you've got
bigger problems than gitolite install not working!)]</p>