mirror of
https://github.com/go-gitea/gitea.git
synced 2026-03-09 04:25:18 -05:00
Add tested rootless SSH passthrough configuration to the docs #8057
Closed
opened 2025-11-02 07:52:32 -06:00 by GiteaMirror
·
8 comments
No Branch/Tag Specified
main
release/v1.25
release/v1.24
release/v1.23
release/v1.22
release/v1.21
release/v1.20
release/v1.19
release/v1.18
release/v1.17
release/v1.16
release/v1.15
release/v1.14
release/v1.13
release/v1.12
release/v1.11
release/v1.10
release/v1.9
release/v1.8
v1.25.3
v1.25.2
v1.25.1
v1.25.0
v1.24.7
v1.25.0-rc0
v1.26.0-dev
v1.24.6
v1.24.5
v1.24.4
v1.24.3
v1.24.2
v1.24.1
v1.24.0
v1.23.8
v1.24.0-rc0
v1.25.0-dev
v1.23.7
v1.23.6
v1.23.5
v1.23.4
v1.23.3
v1.23.2
v1.23.1
v1.23.0
v1.23.0-rc0
v1.24.0-dev
v1.22.6
v1.22.5
v1.22.4
v1.22.3
v1.22.2
v1.22.1
v1.22.0
v1.23.0-dev
v1.22.0-rc1
v1.21.11
v1.22.0-rc0
v1.21.10
v1.21.9
v1.21.8
v1.21.7
v1.21.6
v1.21.5
v1.21.4
v1.21.3
v1.21.2
v1.20.6
v1.21.1
v1.21.0
v1.21.0-rc2
v1.21.0-rc1
v1.20.5
v1.22.0-dev
v1.21.0-rc0
v1.20.4
v1.20.3
v1.20.2
v1.20.1
v1.20.0
v1.19.4
v1.21.0-dev
v1.20.0-rc2
v1.20.0-rc1
v1.20.0-rc0
v1.19.3
v1.19.2
v1.19.1
v1.19.0
v1.19.0-rc1
v1.20.0-dev
v1.19.0-rc0
v1.18.5
v1.18.4
v1.18.3
v1.18.2
v1.18.1
v1.18.0
v1.17.4
v1.18.0-rc1
v1.19.0-dev
v1.18.0-rc0
v1.17.3
v1.17.2
v1.17.1
v1.17.0
v1.17.0-rc2
v1.16.9
v1.17.0-rc1
v1.18.0-dev
v1.16.8
v1.16.7
v1.16.6
v1.16.5
v1.16.4
v1.16.3
v1.16.2
v1.16.1
v1.16.0
v1.15.11
v1.17.0-dev
v1.16.0-rc1
v1.15.10
v1.15.9
v1.15.8
v1.15.7
v1.15.6
v1.15.5
v1.15.4
v1.15.3
v1.15.2
v1.15.1
v1.14.7
v1.15.0
v1.15.0-rc3
v1.14.6
v1.15.0-rc2
v1.14.5
v1.16.0-dev
v1.15.0-rc1
v1.14.4
v1.14.3
v1.14.2
v1.14.1
v1.14.0
v1.13.7
v1.14.0-rc2
v1.13.6
v1.13.5
v1.14.0-rc1
v1.15.0-dev
v1.13.4
v1.13.3
v1.13.2
v1.13.1
v1.13.0
v1.12.6
v1.13.0-rc2
v1.14.0-dev
v1.13.0-rc1
v1.12.5
v1.12.4
v1.12.3
v1.12.2
v1.12.1
v1.11.8
v1.12.0
v1.11.7
v1.12.0-rc2
v1.11.6
v1.12.0-rc1
v1.13.0-dev
v1.11.5
v1.11.4
v1.11.3
v1.10.6
v1.12.0-dev
v1.11.2
v1.10.5
v1.11.1
v1.10.4
v1.11.0
v1.11.0-rc2
v1.10.3
v1.11.0-rc1
v1.10.2
v1.10.1
v1.10.0
v1.9.6
v1.9.5
v1.10.0-rc2
v1.11.0-dev
v1.10.0-rc1
v1.9.4
v1.9.3
v1.9.2
v1.9.1
v1.9.0
v1.9.0-rc2
v1.10.0-dev
v1.9.0-rc1
v1.8.3
v1.8.2
v1.8.1
v1.8.0
v1.8.0-rc3
v1.7.6
v1.8.0-rc2
v1.7.5
v1.8.0-rc1
v1.9.0-dev
v1.7.4
v1.7.3
v1.7.2
v1.7.1
v1.7.0
v1.7.0-rc3
v1.6.4
v1.7.0-rc2
v1.6.3
v1.7.0-rc1
v1.7.0-dev
v1.6.2
v1.6.1
v1.6.0
v1.6.0-rc2
v1.5.3
v1.6.0-rc1
v1.6.0-dev
v1.5.2
v1.5.1
v1.5.0
v1.5.0-rc2
v1.5.0-rc1
v1.5.0-dev
v1.4.3
v1.4.2
v1.4.1
v1.4.0
v1.4.0-rc3
v1.4.0-rc2
v1.3.3
v1.4.0-rc1
v1.3.2
v1.3.1
v1.3.0
v1.3.0-rc2
v1.3.0-rc1
v1.2.3
v1.2.2
v1.2.1
v1.2.0
v1.2.0-rc3
v1.2.0-rc2
v1.1.4
v1.2.0-rc1
v1.1.3
v1.1.2
v1.1.1
v1.1.0
v1.0.2
v1.0.1
v1.0.0
v0.9.99
Labels
Clear labels
$20
$250
$50
$500
backport/done
💎 Bounty
docs-update-needed
good first issue
hacktoberfest
issue/bounty
issue/confirmed
issue/critical
issue/duplicate
issue/needs-feedback
issue/not-a-bug
issue/regression
issue/stale
issue/workaround
lgtm/need 2
modifies/api
modifies/translation
outdated/backport/v1.18
outdated/theme/markdown
outdated/theme/timetracker
performance/bigrepo
performance/cpu
performance/memory
performance/speed
pr/breaking
proposal/accepted
proposal/rejected
pr/wip
pull-request
reviewed/wontfix
💰 Rewarded
skip-changelog
status/blocked
topic/accessibility
topic/api
topic/authentication
topic/build
topic/code-linting
topic/commit-signing
topic/content-rendering
topic/deployment
topic/distribution
topic/federation
topic/gitea-actions
topic/issues
topic/lfs
topic/mobile
topic/moderation
topic/packages
topic/pr
topic/projects
topic/repo
topic/repo-migration
topic/security
topic/theme
topic/ui
topic/ui-interaction
topic/ux
topic/webhooks
topic/wiki
type/bug
type/deprecation
type/docs
type/enhancement
type/feature
type/miscellaneous
type/proposal
type/question
type/refactoring
type/summary
type/testing
type/upstream
Mirrored from GitHub Pull Request
No Label
Milestone
No items
No Milestone
Projects
Clear projects
No project
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/gitea#8057
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @rmsc on GitHub (Oct 31, 2021).
Feature Description
I found a simple and effective way to set up an SSH passthrough that works with the rootless docker image. It leverages the AuthorizedKeysCommand configuration in sshd, and doesn't require mounting the
~/.sshdirectory or synchronizing theauthorized_keysfile between host and container. It also works fine with the internal gitea ssh server.I've tested it under podman, but it should work with docker as well. I can write and submit a PR for the rootless documentation.
I suspect it would also work for the rootfull docker image, but haven't tested. It's a lot simpler to setup than the current method, so if valid it could also replace it.
The details are as follows for podman, but will likely work for docker by just changing the binary name:
In the host, create an executable containing the following, replacing with the actual name of the container:
Then set it as the shell for the gitea user (
gitin this case) on the host:Finally add the following to
/etc/ssh/sshd_config, also replacing with the actual container name:Don't forget to restart sshd for these settings to take effect:
And that's it.
EDIT: forgot to remove the
-toptions frompodman exec. These can modify the output and break the git protocol.Screenshots
No response
@zeripath commented on GitHub (Oct 31, 2021):
Do feel like putting writing this up in to a PR?
The file to edit is: https://github.com/go-gitea/gitea/blob/main/docs/content/doc/installation/with-docker-rootless.en-us.md
@rmsc commented on GitHub (Oct 31, 2021):
PR created. I've tried to keep the style consistent with the rest of the docs, but may have missed something. Comments and edits are welcome 😄
@rmsc commented on GitHub (Nov 1, 2021):
Addressed by #17508
@peterbabic commented on GitHub (Jan 7, 2022):
gitea-shellbe? If owned entirely by root:root, a a git user trying to login cannot even execute this file.gituser access a rootless Docker socket owned a by a different non-root user that owns the Gitea rootless container in question? I cannot even list rootless containers as a root proper on the host, not to mention multi-user access to a single rootless container.@rmsc commented on GitHub (Jan 7, 2022):
I think in most cases
root:rootownership and permissions set to0755should work fine. It's a shell after all, just like bash.In simple terms, that's indeed a limitation of the method: you must login to the host account owning the container.
Can't you just login as the user owning the container, instead of as
git?There may be a way of "aliasing" your user to
git, but I haven't tested it. Try it at your own risk. It involves creating agituser with the same UID/GID as the user owning the container, and with the same home directory.@peterbabic commented on GitHub (Jan 8, 2022):
Thank you for a quick answer. But my head still hurts from trying to wrap this around. If I had to either of the two steps, it wouldn't be a problem.
But how do I combine them? If I make only a single user running that rootless container and that user does not have a login shell, instead just a script then I have no way of managing that user. It would require some kind of way to switch the login shell to to either work as a SSH passtrough or as a login shell, but I currently do not see it working as both at the same time, as is.
Can you please confirm this observation, so I know my current understanding is correct?
UPDATE: I think I've found something relevant:
https://man.archlinux.org/man/core/openssh/sshd_config.5.en#AuthorizedKeysCommand
https://man.openbsd.org/sshd_config#AuthorizedKeysCommand
@rmsc commented on GitHub (Jan 8, 2022):
Ah I now understand your problem. Here's how I do it:
gituser own the container, but have no ssh access to the host (only the to guest, arguably more secure)me, with permissions to runsudo -u gitThen if you want a bash shell running under the
gituser, it's a matter of doing something like this:You got it, the two steps have different purposes. The
AuthorizedKeysCommandis meant as a way of validating ssh keys against those on the gitea database inside the container. Thegitea-shellis an ssh passthrough to the container, AFTER the keys have been validated.@peterbabic commented on GitHub (Jan 8, 2022):
After three days it finally works. I too do not make a root access over ssh, but instead on a dedicated user, as you mentioned.
Most of my problems were related to the absence of the environmental variables:
export DOCKER_HOST=unix://$XDG_RUNTIME_DIR/docker.sockWhich resolves to:
export DOCKER_HOST=unix:///run/user/1000/docker.sockSuch an environmental variable has to be present for both
docker execcommands, which you described as "two steps". This means I had to create two separate executable scripts, which export the variable before calling docker, becauseAuthorizedKeysCommandrequires an absolute path where the env variables cannot be prepended. This made the setup working.I was even able to login into the
gituser from root by specifying a shell (my other issue mentioned above), which overrides our script:su -l git -s /bin/bashBut this way, the XDG_RUNTIME_DIR is not available, so the DOCKER_HOST collapses just to:
unix:///docker.sockAnd has to be re-exported to a correct value to use
dockercommands. Leaving these notes here for a further reference.