Sourcehut


Installation

Upstream only officially supports Alpine Linux 3.15.

To enable the package repository, add the following line to /etc/apk/repositories. It must be the first repository checked.

https://mirror.sr.ht/alpine/v3.15/sr.ht

The community package repository must be enabled. See here for more details.

Install the packager's key and update the package index.

wget -q -O /etc/apk/keys/[email protected] https://mirror.sr.ht/alpine/[email protected]
apk update

Sourcehut is a modular ecosystem, with meta.sr.ht being the only mandatory package (as it handles authentication and authorization). For example, to run the git and mercurial services, use git.sr.ht and hg.sr.ht, respectively. Installation and configuration of these modular services is detailed in a corresponding section under Administration.

Install the meta.sr.ht package. Start and enable three services: meta.sr.ht, meta.sr.ht-api, and meta.sr.ht-webhooks. Finally enable the metasrht-daily cronjob and set it to run daily.

Community Packages

Eli Schwartz maintains a set of packages for Arch Linux.

Add the mirror to /etc/pacman.conf:

[sr.ht]
Server = https://mirror.sr.ht/archlinux/sr.ht

Then install the packagers' keys:

sudo pacman-key --recv-keys C0AAFC1676BD998617C94C42DC59670F1EB0A189
sudo pacman-key --lsign-key C0AAFC1676BD998617C94C42DC59670F1EB0A189

Development Setup

TODO: copy from https://emersion.fr/blog/2021/setting-up-sr.ht-for-local-development/


Configuration

Several Sourcehut services depend on additional local services.

SMTP

TODO: copy from https://drewdevault.com/2018/08/05/Local-mail-server.html

To test the configuration, add an SSH key to the admin user. An automatic notification email will be generated by that trigger.

Redis

PostgreSQL

SSH

SSH access to hosted repositories is a recurring challenge for git services. Sourcehut's approach is to insert an authentication dispatch into the host's sshd(8) configuration.

In /etc/ssh/sshd_config, set:

AuthorizedKeysCommand=/usr/bin/gitsrht-dispatch "%u" "%h" "%t" "%k"
AuthorizedKeysCommandUser=root
PermitUserEnvironment SRHT_*

A git user is created automatically by installing git.sr.ht, but an additional step of setting a login password is necessary.

sudo passwd git

When a user pulls to [email protected]:~username/reponame, gitsrht-dispatch will parse the git.sr.ht::dispatch section of the Sourcehut configuration.

[git.sr.ht::dispatch]
/usr/bin/gitsrht-keys=git:git
/usr/bin/buildsrht-keys=builds:builds

The right-hand side is the uid-gid pair that gitsrht-dispatch will scan for, and the left-hand side is a binary that will be dispatched to. Additional authentication stacks can be inserted here. If no dispatcher matches, gitsrht-dispatch just looks up the user's authorized_users file, to ensure that normal SSH access is uninterrupted.

gitsrht-keys will then 'generate' an authorized_users file based on the Sourcehut database of who should have access to the corresponding repository. This authorized_users file is then piped back to sshd(8) for normal key-based authentication. On the server side, this looks like the git user pulling from its $HOME directory (typically var/lib/git).


Administration

Users

To create an admin user, try:

metasrht-manageuser -t admin -e <email> <username>

Git

Mercurial

Bug Tracker

Page Hosting

Mail Lists

Automated Builds

Anecdotally the build service is the most unreliable component of the Sourcehut ecosystem.

The master server runs the builds.sr.ht package and service. Each runner corresponds to a builds.sr.ht-worker service, which depends on the builds.sr.ht-worker and builds.sr.ht-images packages.

Upstream's production architecture thoroughly encapsulates the runners.


CategoryRicottone