-
Notifications
You must be signed in to change notification settings - Fork 5
Adds the documenation for ssh keys #135
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,118 @@ | ||
| --- | ||
| title: "SSH Keys" | ||
| description: "Configure user supplied SSH keys for private repository measurements" | ||
| date: 2026-04-27T00:00:00+00:00 | ||
| weight: 1006 | ||
| --- | ||
|
|
||
| GMT can use SSH keys submitted by users through the Dashboard or the command line when measuring private Git repositories in a cluster setup. | ||
|
|
||
| There are two different key types involved, and they are used on different machines: | ||
|
|
||
| - The GMT web/API server uses an RSA PEM public key configured in `config.yml` to encrypt user supplied SSH keys before storing them. | ||
| - Each runner or cluster machine that executes measurements uses the matching RSA PEM private key configured in `config.yml` to decrypt the stored SSH key before cloning a repository. | ||
| - The user submits an OpenSSH private key through the Dashboard or command line. This is the key used by Git, through ssh, when cloning the measured repository. | ||
|
|
||
| We do this so that when the GMT Web machine or the database is leaked we do not expose any SSH keys. | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Would call it Dashboard Machine as this is the naming of the docs so far |
||
|
|
||
| Do not mix these formats. The encryption keys configured in `config.yml` must be RSA PEM files. The user supplied SSH key submitted through the Dashboard or passed on the command line must be an OpenSSH private key block. | ||
|
|
||
| ## Configure the web server to accept SSH keys from users | ||
|
|
||
| On the GMT web/API server, configure an RSA PEM-format public key in `config.yml`: | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Again, Dashboard machine. Or machine the Dashboard and API runs on. |
||
|
|
||
| ```yml | ||
| security: | ||
| encryption_public_key_file: ./.rsa/public_key.pem | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I am not sure relative paths will work. This should be absolute |
||
| ``` | ||
|
|
||
| Create the RSA key pair with: | ||
|
|
||
| ```bash | ||
| # Generate private key (2048-bit) | ||
| openssl genpkey -algorithm RSA -out private_key.pem -pkeyopt rsa_keygen_bits:2048 | ||
|
|
||
| # Extract public key | ||
| openssl rsa -pubout -in private_key.pem -out public_key.pem | ||
| ``` | ||
|
|
||
| Recommended placement on the web/API server: | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Name again |
||
|
|
||
| ```bash | ||
| mkdir -p ./.rsa | ||
| mv public_key.pem ./.rsa/public_key.pem | ||
| chmod 755 ./.rsa/public_key.pem | ||
| ``` | ||
|
|
||
| The file must be readable by the GMT API process. In the default container setup the Gunicorn container runs as root, and a restrictive mode such as `400` can make the mounted file unreadable inside the container. Use `755` for the public key file. | ||
|
|
||
| ## Configure runners to use submitted SSH keys | ||
|
|
||
| On each runner that needs to execute jobs with user supplied SSH keys, configure the matching RSA PEM-format private key in `config.yml`: | ||
|
|
||
| ```yml | ||
| security: | ||
| encryption_private_key_file: ./.rsa/private_key.pem | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. absolute |
||
| ``` | ||
|
|
||
| The private key must match the public key configured as `security.encryption_public_key_file` on the GMT web/API server. Keep this private key available only to runner or cluster machines that execute measurements and to administrators who need runner access. | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Dashboard/API Machine |
||
|
|
||
| ## Allow users to save SSH keys | ||
|
|
||
| To submit an SSH key through the Dashboard, the user must be allowed to update the `ssh_private_key` setting. This is controlled through the user's `capabilities` JSON: | ||
|
|
||
| ```json | ||
| { | ||
| "user": { | ||
| "updateable_settings": [ | ||
| "ssh_private_key" | ||
| ] | ||
| } | ||
| } | ||
| ``` | ||
|
|
||
| The Dashboard also needs access to the settings API routes: | ||
|
|
||
| ```json | ||
| { | ||
| "api": { | ||
| "routes": [ | ||
| "/v1/user/setting", | ||
| "/v1/user/settings" | ||
| ] | ||
| } | ||
| } | ||
| ``` | ||
|
|
||
| The default seeded user includes this capability. For existing or restricted users, add `ssh_private_key` to `user.updateable_settings`; otherwise the Dashboard will reject the setting update. | ||
|
|
||
| ## Submit a user SSH key through the Dashboard | ||
|
|
||
| Users can add their repository SSH key in the Dashboard under: | ||
|
|
||
| ```text | ||
| /settings.html | ||
| ``` | ||
|
|
||
| Paste an OpenSSH private key block into the SSH private key setting. This key is used by the runner for Git clone operations. | ||
|
|
||
| The Dashboard key should look like: | ||
|
|
||
| ```text | ||
| -----BEGIN OPENSSH PRIVATE KEY----- | ||
| ... | ||
| -----END OPENSSH PRIVATE KEY----- | ||
| ``` | ||
|
|
||
| After saving the setting, new measurements for private Git repositories can use the stored SSH key. | ||
|
|
||
| ## Use an SSH key from the command line | ||
|
|
||
| When running a measurement directly with `runner.py`, pass the OpenSSH private key file with `--ssh-private-key`: | ||
|
|
||
| ```bash | ||
| python3 runner.py \ | ||
| --uri git@github.com:example/private-repository.git \ | ||
| --filename usage_scenario.yml \ | ||
| --ssh-private-key ~/.ssh/id_ed25519 | ||
| ``` | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
When I would search the docs my search term would be "private repository" as this is what I effectively want to get working.
The term should appear somewhere. Maybe even in the title. SSH Keys is more the means to an end here I feel