Trove Reference Manual
Introduction
Trove is the central store of your software in the Baserock ecosystem. Trove manages both your source code and sources acquired from third parties, along with caching and serving the binary artifacts which are built from those sources. Trove also provides your project management team with a central location for managing access to source code and for your development and integration team to look to for branches and codelines.
Trove is itself a Baserock appliance and is comprised of several important moving parts. The most obvious and actively used part of Trove is the Git service. Development users normally interact with Trove via Morph, which uses the Git service to access and modify the repositories on Trove. Integration, Q.A. and even project management users may also interact with the Git service during their normal work, either directly using Git, or via Morph, or via a web interface.
The next important moving part is the source code acquisition service, called Lorry. This runs in the background on Trove and for the most part users do not need to interact with it. However if you are acquiring source code from multiple places in order to build your product, you may need to configure the Lorry service to get the acquisitions going.
Trove also contains a cache service which is used to provide your Baserock ecosystem with a place to store and retrieve binary artifacts and also to look up information about source code branches and file content without having to check the code out of the Git service directly.
All these services are integrated within the Trove system and work together to ensure that your Baserock-based developers can always get at the source code they need in order to build products.
Quick Start
Something You Need To Know Before You Start
Because Trove is designed to be secure, users and programs are forced to access Trove in a secure way. All configuration of repositories, users and services is done via git. Users and programs are expected to interact with Trove via ssh, and security is enforced by ssh keys. If you do not know what ssh is, how public/private keys work, and why they are generally preferable to passwords, you should probably read up on these topics first.
There are no user passwords for Trove. In normal operation, if a user is prompted for a password by Trove, it is because they are using a computer, a virtual machine, or an account which has not been authorised on the Trove. Authorisation is done by creating a public/private key pair on the computer/virtual machine and adding the public key to the list of keys that Trove will accept. See the The Git Service section of this manual for information about Trove roles, setting up users and groups, and adding keys.
Note: there are only a few Linux "users" set up on Trove; "root", "git" and "lorry". Of these only "root" can actually be used as a login.
Anyone who can log in to the Trove as root can subvert the security scheme, so root access should be very carefully controlled. After initial setup it should only be necessary to log in as root in exceptional circumstances.
How to Add a Repo To Your Trove
New repos in Trove are either managed by Lorry, or by you.
Lorry should be used for code which is not being developed directly by your organisation, for example:
- open source projects
- third party code delivered as tarballs or pulled from external repos
To setup trove-cmd
alias trove-cmd="ssh git@YOUR-TROVE-HOST"
If you are authorised to add Lorried repos, trove-cmd whoami
should show that you are a member of the group local-config-writers.
Your Project Repos
Code for projects created and managed in your organisation should be added via trove-cmd create
, under your trove_id. So for example, if your project
is called new-code, and your trove_id is ab-cd
trove-cmd create ab-cd/new-code
Open Source Repos
For an open source project which is to be lorried, the process is:
git clone ssh://git@TROVE-HOST/TROVE_ID/local-config/lorries
cd lorries
mkdir open-source-lorries # if it doesn't exist already
cd open-source-lorries
edit new-project.lorry
git add . & git commit & git push
Third Party Repos
For a third-party closed-source project which is to be lorried, the process is the same, only we recommend you use the closed-source-lorries
directory in the lorries
repository and that you do not lorry them into delta/
but rather create your own prefix for each third party.
Note that if Lorry needs to use the SSH protocol to access a server, the host keys for that server must be known by the Trove machine. You can achieve this by running the following command on the Trove:
ssh-keyscan REMOTE-SERVER >> /etc/ssh/ssh_known_hosts
Trove's Moving Parts
The Git service
Trove's Git service allows developers, integrators and build machines to gain access to source code stored within the Trove. The Git service also allows project managers to define access control rights for engineers, testers and other roles, and to apply those access control rights across the user base.
In addition to acting as a central location to store your code, Trove's Git service also has hooks within it to facilitate other parts of the Baserock ecosystem's behaviour.
From day-to-day, we expect developers, integrators, Q.A and project managers to interact with Trove's Git service.
The source code acquisition service
Trove's source code acquisition service (Lorry) allows you to acquire source from multiple locations and centralise access to that in your Trove. Typically you will draw your source code from three disparate sources. Your upstream Trove which is likely to be Baserock itself, any third party projects, and any internal projects which are not themselves going to be stored in the Trove Git service.
Trove can acquire source code from all sorts of different revision control systems and normalises them all into Git which is then used throughout Baserock.
NOTE: that while you can use HTTPS addresses, or other addresses invoking SSL or TLS encryption on the connection, the Trove does not verify certificate validity. Trove does not validate or require any certificates or signatures on the remote end, and does not check them if they are present.
The cache service
Trove provides a cache service to your users and to your build network. Services such the distributed build workers use the cache to acquire information about the Git repositories stored in the Trove Git service. They also use the Trove to store, index, and serve binary artefacts (built elements of the systems) to all other parts of the Baserock ecosystem.
For the most part, users will not interact with the cache system on the Trove except to acquire built system artifacts once they have been produced by the build network. This is handled transparently when using Morph.
Visualising your Trove in a browser
Trove provides two web interfaces. The first is to the Git service and that can be found by pointing your web browser at the Trove system. This interface will allow you to visualise all the Git repositories in the Trove system which have been designated as "public" in the sense that anyone in your organisation may look at them.
The second interface is to the source code acquisition service which can be accessed by selecting the link at the bottom of any of the Git service pages. The link is entitled "View Lorry Controller Status" and will take you to a self-refreshing page which indicates the current status of the source code acquisition service.
Backing up all these moving parts
Backups can be made using the following command:
$ sudo rsync --numeric-ids --delete-before --delete-excluded \
--exclude '/nfsboot/' --exclude '/lorry/' \
-ahHSx root@TROVE_HOST:/home/. /path/to/backed/up/trove/files/.
The Lorry service
Lorry is a service in Trove that mirrors git repositories from elsewhere, and converts repositories of other version control systems into git for Baserock use. For example, Lorry gets updates from the git repository Linus Torvalds publishes for the Linux kernel, and puts the updates to the repository in Trove. Lorry can also convert Subversion repositories, for example, into git, and also create a git repository from a release tar archive if that is the only format in which some software is available. Within the Baserock system, all source code is kept in git.
The Lorry service in Trove consists of a command line tool, called Lorry, and a management tool, the Lorry controller, which runs Lorry at suitable intervals. The Lorry controller reads its configuration from a git repository, stored in the same Trove instance. To make configuration changes, you commit them to the configuration repository and push them to Trove. The Lorry controller will automatically get the changes from there.
Configuring the Lorry controller
The configuration for the Lorry controller is stored in a git repository created during the initial trove-setup of the unit. The repository will be stored in the customer's trove_id, as TROVE_ID/local-config/lorries
. In the root of that repository must exist a file called lorry-controller.conf
, which is a JSON document consisting of a list of dictionaries.
[
{
"type": "trove",
"trovehost": "git.baserock.org",
"ls-interval": "4H",
"interval": "2H",
"prefixmap": {
"baserock": "baserock",
"delta": "delta"
},
"ignore": [
"baserock/lorries"
]
},
{
"type": "lorries",
"interval": "6H",
"prefix": "delta",
"globs": [
"open-source-lorries/*.lorry"
]
}
]
The Lorry controller reads this configuration file on its first run, and then monitors changes to it. Whenever the configuration file changes, the Lorry controller compares the new file with the current state, and makes any changes needed.
The configuration file has two types of stanzas:
trove
specifies an upstream Trove instance to mirrorlorries
specifies a set of.lorry
files in the configuration git repository to use to mirror individual repositories
See the next section for how to write .lorry
files. With a trove
stanza, Lorry controller connect to another Trove instance, use the ls
command in gitano
to get a list of git repositories, and mirror those. The list of git repositories can be limited, see below. For each repository, Lorry controller then generates an internal .lorry
file, using parameters it deduces automatically.
At frequent intervals, the Lorry controller runs all the .lorry
files it has (whether it generated them itself, or got them from the configuration repository), and runs the ones that are due.
The following fields can be used in the stanzas.
field | description |
---|---|
type |
type of stanza; must be trove or lorries ; mandatory |
trovehost |
domain name of another Trove instance (trove only) |
ls-interval |
interval between checking the upstream Trove for new or removed repositories. |
interval |
interval between runs of lorry for each respository for this stanza. |
prefixmap |
map local Trove's prefixes to remote ones (trove only ) |
ignore |
glob patterns on repository pathnames which to not mirror (trove only) |
globs |
glob patterns on .lorry files which to use (lorries only) |
The intervals for ls-interval
and interval
are in seconds (no suffix), minutes (M
suffix), hours (H
suffix), or days (D
suffix). The suffix may be in upper or lower case. There must be no space between the number and the suffix. For example, 3600
, 60m
and 1H
all specify an interval of one hour.
It is important that you do not configure your interval
to be so short that Trove cannot complete the mirroring process in time. If your interval is too short then Trove may never "catch up" with itself. It is recommended that if it takes one hour to run lorry for all of the repositories in a stanza, then the interval for that stanza should be no less than 90 minutes in order to cope with instances of lorry
taking longer sometimes. If you need some parts of your Trove to be mirrored more often than this, you can simply create additional stanzas and use the ignore
and prefixmap
entries to control what you mirror at what schedules.
Your Trove comes pre-configured to mirror the Baserock Trove. You can just use the default configuration, until and unless you need to add new repositories, or you need to mirror from other Troves, such as those run by chipset vendors or third party contractors.
Writing .lorry files
Lorry can convert Bazaar, Mercurial, Subversion, and CVS repositories to git, and create git repositories from tar archives. It can also mirror git repositories from elsewhere. All of these are controlled by writing .lorry
files specifying what to mirror or to convert, and what the result should be called.
A .lorry
file uses JSON syntax. The entire file is a JSON object (key/value mapping), where each key is the nickname for a repository to convert. The corresponding value is another JSON object, where the key/value pairs specify what type the repository is, where it is, and so on. This is best explained using an example:
{
"git": {
"type": "git",
"url": "git://github.com/gitster/git.git"
}
}
The above file tells Lorry how to mirror the git repository for git itself. A .lorry
file can contain as many repositories as needed. The example below has an example for every type of repository Lorry supports.
{
"git": {
"type": "git",
"url": "git://github.com/gitster/git.git",
"refspecs": [
"snap", "master", "+next", "naster", "initial",
"maint", "maint-1.7.6", "maint-1.7.7",
"refs/tags/*"
]
},
"bzr": {
"type": "bzr",
"branches": {
"trunk": "lp:bzr/trunk"
}
},
"mercurial": {
"type": "hg",
"url": "http://selenic.com/hg"
},
"subversion": {
"type": "svn",
"url": "https://svn.apache.org/repos/asf/subversion/",
"layout": "standard"
},
"cvs": {
"type": "cvs",
"url": ":pserver:anonymous@cvs.savannah.nongnu.org:/sources/cvs",
"module": "ccvs"
},
"gcc-tarball": {
"type": "tarball",
"url": "http://ftp.gnu.org/gnu/gcc/gcc-4.6.2/gcc-4.6.2.tar.bz2"
}
}
Note how every repository specifies at least the type
field. Everything else is dependent on that field.
field | description | types of VCS |
---|---|---|
url | URL to remote repository | all except Bazaar |
refspecs | ref names (branches, tags) to push | all |
branches | mapping of branch names to URLs | Bazaar |
layout | repository layout | Subversion |
module | name of module to convert | CVS |
For all:
url
: the URL to the remote repository to be mirroredrefspecs
: the ref names (branches, tags) to push to the git server. Default is all.
See git push's documentation for what is allowed here.
For Bazaar:
branches
: a mapping of branch names to URLs for the branches, in addition to the branch specified inurl
, which gets mapped totrunk
. It is customary to not specify aurl
for Bazaar, onlybranches
.
For Subversion:
layout
: specifies the Subversion repository layout. This is used to locate where the master branch, other branches and tags can be found in the repository. The usual layout of being at the base of the repository url looks like this:PROJECT-1/ |- trunk/ | |- src | \- doc |- branches/ | |- foo | | |- src | | \- doc | |- bar | | |- src | | \- doc | \- baz | |- src | \- doc \- tags/ \- v0.1 |- src \- doc PROJECT-2/ |- trunk/ |- branches/ \- tags/
The layout to lorry this is:
"url": "http://example.com/svn/PROJECT-1", "layout": { "trunk": "trunk", "branches": "branches/*", "tags": "tags/*" }
This is by far the most common, so may be referred to as
"layout": "standard"
.Another common layout, which is somewhat inverted, has the projects inside the branches:
trunk/ |- PROJECT-1/ | |- src | \- doc \- PROJECT-2/ branches/ |- PROJECT-1/ | |- foo | | |- src | | \- doc | |- bar | | |- src | | \- doc | \- baz | |- src | \- doc \- PROJECT-2/ tags/ |- PROJECT-1/ | \- v0.1 | |- src | \- doc \- PROJECT-2/
The layout to lorry this is:
"url": "http://example.com/svn/", "layout": { "trunk": "trunk/PROJECT-1", "branches": "branches/PROJECT-1/*", "tags": "tags/PROJECT-1/*" }
Sometimes you only want one part of a project. For example, you may only care about the
src
directory of PROJECT-1 when it has the first layout. You could lorry only that with the following config:"url": "http://example.com/svn/PROJECT-1", "layout": { "trunk": "trunk/src", "branches": "branches/*/src", "tags": "tags/*/src" }
You can also only lorry a fixed set of branches. For example, you may only want the bar and baz branches of PROJECT-1.
"url": "http://example.com/svn/PROJECT-1", "layout": { "trunk": "trunk/src", "branches": "branches/{bar,baz}", "tags": "tags/*" }
For CVS:
module
: names the CVS module to mirror.
Mercurial and tarball do not have any additional fields.
Monitoring the Lorry controller
The Lorry controller provides a status page, which it keeps up to date. You can find it at the following URL:
http://TROVE_HOST/lc-status.html
There is a link to this at the bottom of the front page of your Trove host.
Along with some status and configuration information, this page shows the queue of jobs and when each job is next due to run. This tells you when each mirrored repository will be updated with the latest upstream commits.
There is a more advanced page available, which is not publically visible. In order to access this you need SSH access to the Trove. To use it, set up a tunnel for port 12765 from the Trove to your local machine:
ssh -L 12765:localhost:12765 root@TROVE_HOST
You can then view the advanced status page at: http://localhost:12765/1.0/status-html. This allows you to do some administration and view the logs of both successful and failed lorries. If you find that some repositories in your Trove are empty after the lorry-controller has completed its first run, this interface allows you to investigate what went wrong.
Lorry Controller also describes this in its README file.
The Morph Cache Service
What is the cache service
The cache service is logically split into two halves. The access to repository data, and the access and management of binary artifacts.
The cache server software is implemented as an HTTP service on non-standard specific TCP ports and access to those ports can be managed at the network layer.
Repository data access
The repository data access interface is used by Morph to retrieve information about repositories. This allows Morph to determine what needs building and to process morphologies without having to clone all the Git repositories into their local caches.
Binary artifacts
The binary artifact interface is split into two parts. The read-only interface is visible to all users of the Baserock ecosystem and allows access to download binary artifacts from the system. This allows Morph to fetch pre-built artefacts from the cache rather than having to re-build them itself on every node. The write-enabled interface allows the distributed-build controller to cause the Trove-based Morph cache server to retrieve artifacts from the distributed-build worker nodes.
What uses the cache service
There are three main classes of users of the cache service. Automated Morph instances, human-driven Morph instances and non-Morph services. Automated Morph instances include those running on distributed-build workers. These workers have access to the read-only interfaces of the cache service on the Trove and use it to improve performance during the preparatory phase of building artifacts. Human-driven Morph instances run on engineers' workstations and also have access to the read-only interfaces of the cache service for the same purpose. Non-Morph services, including the distributed build controller, can have access to the read-only interfaces and, in the case of the distributed-build controller, the write-enabled interfaces too. The distributed-build controller can cause the cache server on the Trove to retrieve artifacts which its workers have finished building, in order that they will be available during further builds.
What configuration applies to the cache service
The only configuration which is applicable at this time is that of any firewalls involved in managing access to the Trove's write-enabled cache server interface. Typically your Trove will already be configured so as to only allow write access to the Trove from the distributed-build controller node.
The Git Service
What is it
Trove has a Git service which provides storage and access to a large collection of Git repositories. Trove's Git service also provides a rich access control system for project access, role-based access and various other important features often needed in revision control. The Git service also offers a web interface for browsing all repositories in the Trove which have been marked as visible to all users.
Top level configuration
The Git service is configured entirely in a Git repository of its own. In normal operation no-one should need to interact with this repository. Instead users and administrators use the remote administration features built into the service. Trove builds a complex default ruleset which provides for roles, system users, groups and a concept known as your 'trove_id'.
Everything in this section of the manual corresponds to the default set of rules provided with Trove. If your local Trove has been modified in a non-standard way then this documentation may not apply.
Roles within Trove
Trove defines system roles which relate to the administration of the Git service and also some roles related to the rest of the Baserock ecosystem. Some of these roles are to facilitate the automation of building and take the form of users in the system. Others are to facilitate the management of the access rules and take the form of groups.
The primary roles defined by the default rules are:
- Trove 'System' administration
- Trove 'Site' administration
- Project administration, management, write access and read access.
- These roles are an automatic multiplicity based on the path to the repository in consideration.
- Lorry (source code acquisition service)
- Distributed build (Distributed-build controller and workers)
- Worker (Any of the above who has read-access to everything)
Default provided users, groups and projects
Trove comes pre-configured with the following users and groups:
Users
trove
- This is the system administration user.
- It corresponds to the POSIX account on the Trove system which owns the Git service.
lorry
- This is the source code acquisition user.
- It corresponds to the POSIX account on the Trove system which runs the Lorry service.
distbuild
- This is the user for the distributed-build infrastructure.
- It corresponds to both the controller and the workers which form the distributed-build network used by your engineers to build systems.
Groups
gitano-admin
- This is the system administration role for adding/deleting users and repositories
- It contains the
trove
user by default.
workers
- This is the group which provides read-only access to the entire trove.
- This contains
distbuild
by default. - Do not put humans into this group.
trove-admin
- This is the group which provides administration access to the users and groups on the Trove.
- During initial setup, one of your managers will have been granted membership of this group and will then have set things up further.
Projects
local-config
- This project contains the local Lorry configuration for your Baserock ecosystem.
- Nobody has access to this project by default.
What is a 'Trove_ID'?
The 'Trove_ID' is the part of the repository path name or branch name which is unique to your Trove instance.
All source code projects local to your instance of the Baserock ecosystem will be stored underneath your trove_id in your Trove. All local branches of other repositories which are not stored in your trove_id will contain your trove_id in the branch name instead.
Morph allows you to specify the hostname and ID of the Trove from which it should pull source code and binary artefacts, using the trove-host
and trove-id
variables.
For example, when Trove is shipped to you, it contains several trove_ids:
baserock
- This trove_id contains the Baserock open source code, such as the source to
morph
,lorry
etc.
- This trove_id contains the Baserock open source code, such as the source to
delta
- This trove_id contains all open source "upstream" projects which form part of Baserock. For example you will find
linux
,busybox
andgcc
here.
- This trove_id contains all open source "upstream" projects which form part of Baserock. For example you will find
Accessing the git service
The Git service can be accessed in three ways. There is a web interface to allow you to browse the open source repositories (and any other repositories which are designated as all-access). Also those repositories are available via the git://
protocol for rapid cloning.
All other access must be done via the Secure Shell protocol (ssh
) which provides both encryption and authentication so that the Git service can provide access control to your repositories.
Since all ssh
access to the Trove is via the git
POSIX account on the Trove, you must provide an ssh
public key to the Git service. For information on how to do this, see the section on creating and managing users below.
To verify if you have access to the Trove, you can run the following command:
ssh git@LOCAL-TROVE-ADDRESS whoami
If you have access, you will be presented with the information that the Trove has stored about you, along with your group memberships. If you do not have access then it is likely that you will be presented with a Password:
prompt which will never grant you access.
Your development machine's morph.conf
will carry information on how to access the local Trove instance, including your 'trove_id'. Thus for the most part, you will only interact with the Trove Git service via Morph's commands for cloning, branching and editing repositories.
Trove and Project access levels
Access to the Trove Git service is carefully structured to allow you to screen access to the codebases stored in the Trove while still allowing systems to be built.
The top level 'access all areas' role is the system administration role represented by the gitano-admin
group. This role is typically used only during the very early setup of your Trove instance.
The primary 'site' administration role is represented by the group trove-admin
and when your Trove was configured, at least one person will have been granted membership of this group. Membership of this group grants the user the right to administer other groups (other than gitano-admin
) and the right to manage users. Members of this group will be involved with creating user accounts, granting access to projects, etc.
Within a project there are four levels of access. These are referred to as the -managers
-admins
-writers
and -readers
roles. They offer, respectively, reducing access to the given project. Projects are named for the part of the path to the repository after your trove_id and before the repository name. For example, the repository named trove_id/local-config/lorries
is in the local-config
project and is therefore governed by the groups local-config-manager
local-config-admins
local-config-writers
and local-config-readers
.
Membership of these groups is hierarchical. Thus all -managers
are implicitly -admins
, all -admins
are implicitly -writers
and all -writers
are implicitly -readers
. The rights granted at each level (from -readers
up) are:
-readers
may see the repository and clone from it. They may fetch updates from the repository as and when they wish.-writers
may create branches and push to refs within the repository. The naming scheme of the branches is up to local policy.-admins
may alter the administration ref of project repositories and may create and destroy repositories for a project. They are also permitted to perform remote repository configuration operations, such as setting theHEAD
of the repository.-managers
may query and modify the makeup of the groups associated with controlling access to the project. For example, a member of-managers
may grant read, write, admin or management access to a project to any other user in the system.
Note: membership of
trove-admin
does not imply membership of any of the-managers
groups.
Creating and managing users
Within Trove's Git service, users represent entities which have access to Git repositories. These can either be humans or programs which need source code access for various reasons. The role which is permitted to perform the management of users is the trove-admin
role.
Users can be listed, created and destroyed using the user
command. Each user has a number of ssh
public keys associated with it. These keys can be managed using the sshkey
command coupled with the as
command.
Creating a user is therefore a two-phase operation. From here on, we assume that trove-cmd
is either a shell alias for morph trovectl
or else a shell alias for ssh git@local-trove-address
. You can substitute either of the expansions for the trove-cmd
in the below commands and everything will otherwise work as stated.
$ trove-cmd user add someusername email.address@domain.com Real Person
The above command will add a user to the Trove Git service. The user's username will be someusername
and Trove will store an email address and real name for the person as provided. These are used by Trove if the user makes changes to administration refs or to their own configuration in any way. Since all of the Git service's configuration is also stored in a Git repository, changes will be committed using the user's details where appropriate.
$ trove-cmd as someusername sshkey add sometag < somekey.pub
The above command then adds an ssh
public key to the user named. The key is given a tag which is used to identify the key in the case that multiple keys are registered to a single user. This information can be used in complex rules which are beyond the scope of this document. The public key to register for the user is provided in the file somekey.pub
and must be in OpenSSH public key format.
Once these two commands have been run, the new user can check their access by executing the command:
$ trove-cmd whoami
Which should display their personal details as entered above.
Removing users should only be done in extreme circumstances. Instead should access need to be revoked, it is better to simply remove all the ssh
keys registered with a user. This can be done by the following sequence of commands...
$ trove-cmd as someusername sshkey list
...to acquire the list of keys registered to the user, and...
$ trove-cmd as someusername sshkey del sometag
...for each tag listed in the first command.
All users have the right to create branches under the local trove_id in every repository which is not part of any local project. For example, any registered user may create branches named under the local trove_id in the baserock/morphs
repository. Commonly this functionality will only be used by Morph automatically creating build branches as users build systems.
Creating and managing projects
Projects are the fundamental access control primitive which will be used day-to-day. Projects are designated by the path element directly after the local trove_id in your Trove. For example, the repository trove_id/local-config/lorries
is in the local-config
project.
Projects exist ephemerally as a side-effect of users have rights granted to them and repositories existing. The default ruleset has an expectation of how the access groups will be set up. Thus, to create a project requires that you choose a name for the project, nominate a user to be the manager for that project and then that you create the project's set of groups. The nominated user can then set about granting access to other users and/or creating repositories.
Users who are a member of the trove-admin
role group may create project groups.
Creating projects
Assuming that we are creating a project called new-proj
and that the user who has been nominated to manage the project has the username stevesmith
then the command sequence to create and configure all of the project groups would be:
$ trove-cmd group add new-proj-managers Managers for the Badger IVI Project
$ trove-cmd group adduser new-proj-managers stevesmith
$ trove-cmd group add new-proj-admins Repository admins for the Badger IVI Project
$ trove-cmd group addgroup new-proj-admins new-proj-managers
$ trove-cmd group add new-proj-writers Users with write-access to Badger IVI repositories
$ trove-cmd group addgroup new-proj-writers new-proj-admins
$ trove-cmd group add new-proj-readers Users with read-access to Badger IVI repositories
$ trove-cmd group addgroup new-proj-readers new-proj-writers
While that sequence of commands seems long, it does configure the series of four groups necessary to screen access to the new-proj
project, along with chaining the groups together so that higher access permissions grant lower permissions automatically. It also ensures that the user stevesmith
is capable of configuring the access control as the project requires.
Controlling access
As stated above in the Trove and Project access levels section, access to projects is split into four levels. It is not even possible for a user to gain read access to a project unless they are in the -readers
group either directly or by virtue of being in one of the other groups for the project. The groups relevant to a project called foo
would be foo-managers
, foo-admins
, foo-writers
and foo-readers
.
To examine a group's membership you can use the group
command as follows:
$ trove-cmd group show GROUPNAME
This will not show the users who are members of the given group by virtue of being members of another group.
To add a user to a group, you would use the following command:
$ trove-cmd group adduser GROUPNAME USERNAME
However, to remove a user from a group is a two step process. First run:
$ trove-cmd group deluser GROUPNAME USERNAME
Your Trove will then give you a confirmation code which must be added to the command line to make the group deluser
work.
$ trove-cmd group deluser GROUPNAME USERNAME CONFIRMATIONCODE
The confirmation codes are 40 hex-digit numbers and are related to the state of the Trove's administration repository. If someone else performs an administration command in between your two commands then Trove will inform you and provide you with a new confirmation code. You should verify that your change will not conflict with what has happened and then try again.
Creating and destroying repositories
Trove's Git service requires that repositories be created before they can be used. This is to ensure that typographical errors do not result in a proliferation of misspelled auto-vivified repositories.
Only the lorry
user is permitted to create repositories outside of the local trove_id and the lorry
user is controlled by lorry-controller
on the Trove. The lorry-controller
can be managed via the TROVE_ID/local-config/lorries.git
repository. Within the local trove_id, only members of a -admins
group may create repositories and only inside the projects they administer.
Continuing the example from above, if stevesmith
wishes to create a repository in the new-proj
project for the system morphologies, he might run a command along the lines of:
$ trove-cmd create trove_id/new-proj/morphs
As with removing users from groups, the destruction of repositories requires confirmation in the form of a confirmation token. The tokens are acquired by attempting to destroy a repository...
$ trove-cmd destroy trove_id/new-proj/obsolete-stuff
...and once acquired, can be used to complete the destruction process...
$ trove-cmd destroy trove_id/new-proj/obsolete-stuff CONFIRMATIONTOKEN
When a repository is destroyed, it is moved to a graveyard. Currently only someone with filesystem access to the Trove instance can restore a repository from the graveyard. If you require a repository restoring on your Trove then you will need the information provided by the destroy
command when it completes the destruction of the repository.
Command reference
The as
command
usage: as <user> <cmdline>...
Runs the given command line as the given user. The only limitation is that you are not permitted to run 'as' as someone else.
The config
command
usage: config <reponame> <cmd> [args...]
View and manipulate the configuration of a repository.
config <reponame> show [<filter>...]
List all configuration variables in which match any of the filters provided. The filters are prefixes which are matched against the keys of the configuration variables.For example:
config sampler list project
will list all the project configuration entries for the sampler.git repository.Keys which represent lists are shown as
foo.*
If you wish to show the detailed key, showing the index of the entry in the list then you should set the filter exactly tofoo.*
which will cause the show command to expand list keys into the formfoo.i_N
where N is the index in the list.config <reponame> set key value
Set the given configuration key to the given value. If the key ends in.*
then the system will add the given value to the end of the list represented by the key. To replace a specific entry, set the specifici_N
entry to the value you want to replace it.config <reponame> {del,delete,rm} key
Removes the given key from the configuration set. If the key ends in.*
then the system will remove all configuration values below that prefix. To remove a specific element of a list, instead, be sure to delete thei_N
entry instead.
The count-objects
command
usage: count-objects repo [options]
Counts objects in your repository.
You must have read access to the repository in order to run count-objects.
The options are passed to git count-objects
and the most commonly useful option is -v
to increase the verbosity of the count.
The create
command
usage: create <reponame> [<owner>]
Create a new repository, optionally setting its owner directly.
In order to create a repository, the site administrators must grant you the ability in some part of the namespace. Specifying an owner is equivalent to creating the repository and then calling set-owner to re-assign it.
The destroy
command
usage: destroy <repo> [confirmtoken]
This command destroys a repository. Run without a confirmation token it will tell the caller what the confirmation token is for that repository. The caller will then run the destroy command again with the confirmation token if they really do wish to destroy the repository.
The gc
command
usage: gc repo [options]
Invoke git gc, passing the given options, on the given repository. You must have basic write access to the repository in order to invoke a gc.
The options will be passed to git gc
and the most commonly used options are --auto
(to only gc if Git thinks it worthwhile) and --aggressive
to cause Git to try much harder to gc the repository.
The group
command
usage: group [list]
group show <groupname>
group add <groupname> <description>
group del <groupname [confirm token]
group description <groupname> <description>
group adduser <groupname> <username>
group deluser <groupname> <username> [confirm token]
group addgroup <groupname> <groupname>
group delgroup <groupname> <groupname> [confirm token]
With no subcommand, or the subcommand list
the user command will show a list of all the users, along with their descriptions
Showing a group will display membership information
Adding a user to a group adds the user to the direct membership list. Removing a user from a group removes them from the direct membership list only.
If you add a group to a group, you are stating that everyone in the sub group is to be considered a member of this group also. Removing a group undoes this effect.
To delete a group, remove a user from a group or remove a group from a group requires a confirmation token which will be supplied to you if missing.
The help
command
usage: help [admin|all|commandname]
Without the command argument, lists all visible commands. With the command argument, provides detailed help about the given command.
If the command argument is specifically admin
then list the admin commands instead of the normal commands. If it is all
then list all the commands, even the hidden commands.
The ls
command
usage: ls [--verbose|-v] [<pattern>...]
List repositories on the server. If you do not provide a pattern then all repositories are considered, otherwise only ones which match the given patterns will be considered. If you specify --verbose
then the HEAD
ref name and the description will be provided in addition to the access rights and repository name, separated by tabs.
Patterns are a type of extended glob style syntax:
? == any one character except /
* == zero or more characters except /
** == zero or more characters including /
Any other characters are "as-is" except \
which escapes the next character.
If your pattern contains no /
and no **
then it will be matched against leafnames of repositories, no matter the depth of the filesystem tree.
Note, this means that if you run ls foo
then the server is going to look for repositories called foo.git
rather than look in side a folder called foo/
. For the latter, do ls foo/
instead.
The readme
command
usage: readme <reponame>
Shows you the readme for the given repository. You must have read access to the repository in order to see it. The readme is typically provided in the README.mdwn
file in the administration ref.
The rename
command
usage: rename <repo> <newname>
Renames a repository to the given new name. In order to do this, you must have the ability to create repositories at the new name, the ability to read the current repository and the ability to rename the current repository.
The set-description
command
usage: set-description <repo> Description text
Sets the short description of the repository to the given text. This text is used in the web-based display tool or shown in ls --verbose
output.
The set-head
command
usage: set-head <repo> <ref>
Sets the HEAD
of the repository to the given ref. You may need to be the owner of the repository or the project administrator to use this command.
The set-owner
command
usage: set-owner <reponame> <owner>
Set the owner of a repository. Who is allowed to do this is configured by the site administrators. Typically site admins and repository owners are the only people allowed to change the ownership of a repository.
The sshkey
command
usage: sshkey [list]
sshkey add <tag>
sshkey del <tag>
sshkey list
With the list
subcommand (or no subcommand), sshkey
will list the ssh keys you have, similarly to the whoami
command.
sshkey add <tag>
Adds an ssh key with the given tag. The content of the key must be supplied on a single line on stdin.
cat id_rsa.pub | ssh gitano@somehost sshkey add personal-laptop
sshkey del <tag>
Removes an ssh key with the given tag. If the current access is via that ssh key then you cannot remove it. Add a new key and switch to using that one first.
The user
command
usage: user [list]
user add <username> <email> <real name>
user del <username> [confirm token]
user email <username> <email>
user name <user> <real name>
With no subcommand, or the subcommand list
the user command will show a list of all the users, along with their email addresses and real names.
- With the
add
subcommand, you can add a new user to the system. - With the
del
subcommand, you can delete a user from the system. - With the
email
subcommand, you can change a user's email address. - With the
name
subcommand, you can change a user's real name.
If you try and delete a user, you will need to paste a confirmation token which will be supplied if you try and delete the user without it. That token is reliant on the state of the admin repository. Any admin operations performed between the two delete attempts will invalidate the token and you will have to retry.
The whoami
command
usage: whoami
Tells you who you are, what your email address is set to, what keys you have registered etc.