mirror of
https://github.com/opnsense/docs
synced 2024-11-10 19:10:55 +00:00
179 lines
9.3 KiB
ReStructuredText
179 lines
9.3 KiB
ReStructuredText
====================================================
|
|
Traceability of configuration changes using Git
|
|
====================================================
|
|
|
|
When seeking a solution to keep full traceability of configuration changes made by (various) users on your firewall,
|
|
the git-backup plugin might be a useful addition to your setup.
|
|
|
|
In order to use this feature, one has to install the git-backup plugin first (in :menuselection:`System->Firmware->Plugins` search for os-git-backup).
|
|
|
|
.. Warning:
|
|
|
|
Since backups using git are stored unecrypted and contain sensitive data, we generally advise not to use public cloud
|
|
providers to store this data. Only use this option if you can guarantee the security of your git backup server.
|
|
|
|
--------------------------
|
|
Concept
|
|
--------------------------
|
|
|
|
Since git backup is a little bit different than the standard backup options available, we will explain briefly how it works using
|
|
the diagram below.
|
|
|
|
.. blockdiag::
|
|
:scale: 100%
|
|
|
|
blockdiag {
|
|
default_fontsize = 9;
|
|
node_width = 200;
|
|
node_height = 80;
|
|
default_group_color = "#def7ff";
|
|
config_changed [shape = box, label="Event:\nconfig changed"];
|
|
syslog_ng [shape = beginpoint, label="syslog-ng\nevent handler"];
|
|
configd [shape = endpoint, label="configd\nlistener"];
|
|
git_action [shape = box, label = "git add+commit\nchanged config.xml"];
|
|
|
|
config_changed -> syslog_ng;
|
|
syslog_ng -> configd [label = "loosely coupled"];
|
|
configd -> git_action;
|
|
|
|
group {
|
|
orientation = portrait
|
|
syslog_ng;
|
|
configd;
|
|
}
|
|
}
|
|
|
|
When :code:`config.xml` changes happen due to user or api interaction, an event is triggered to which handlers can subscribe
|
|
(using :doc:`syshook </development/backend/autorun>`).
|
|
Our git-backup plugin subscribes to these events in order to add the received backups and commits these with
|
|
information extracted from the received xml file. To prevent the system to lock during backups,
|
|
we choose this loosely coupled method. Events which are yet unprocessed are being left in the (existing) backup directory.
|
|
|
|
.. Note::
|
|
|
|
Events are processed from the moment the initial backup is configured, when disabling backups, the (local) changelog itself
|
|
remains active.
|
|
|
|
Git backup will push collected commits to the upstream repository nightly.
|
|
To shorten this default interval, a custom cronjob (see :doc:`Settings </manual/settingsmenu>`) can be
|
|
set up, selecting `Remote Backup` as the Command. The regular backup procedure (which is also being triggered using the test
|
|
button in the user interface) is responsible for initialising the empty local repository and configuring the upstream target.
|
|
|
|
.. Note::
|
|
|
|
One can always change the upstream target, as long as the newly configured one is either "bare" (empty) or containing the
|
|
exact same content (/change history) as the one used on this firewall.
|
|
|
|
--------------------------
|
|
Initial setup
|
|
--------------------------
|
|
|
|
The configuration part of this plugin is quite basic and offers two types of transport modes, https using a username and
|
|
password combination or ssh using public key infrastructure.
|
|
|
|
=====================================================================================================================
|
|
|
|
==================================== ===============================================================================
|
|
Enable Enable backup to the upstream target
|
|
URL Target location, which defined transport protocol,
|
|
options as ssh://server/project.git or https://server/project.git are allowed here.
|
|
Branch The branch to push your commits to on the configured url
|
|
SSH private key When using ssh, make sure to add a private key here
|
|
User Name Username, when using gitlab and ssh, the default is :code:`git` here
|
|
(most of these providers use a single user and identify the user by it's key)
|
|
password When using https authentication, choose a password here.
|
|
==================================== ===============================================================================
|
|
|
|
Make sure to push to a "bare" upstream repository, when pressing "Setup/Test Git" the initial commits should be send to
|
|
your git server.
|
|
|
|
--------------------------
|
|
SSH Setup
|
|
--------------------------
|
|
|
|
If you use GitHub, then your only option for git-backup, is to configure it for SSH access since GitHub has removed the ability for external applications to log into your account via your username and password.
|
|
|
|
The fields in OPNSense under :code:`System / Configuration / Backups / Git` should contain the following:
|
|
|
|
* URL absolutely MUST follow this format when using GitHub and GitLab: :code:`ssh://github.com/user_name/repo_name.git`. Any URL string that does not follow this pattern will not work.
|
|
|
|
|
|
* Branch should contain the word: :code:`master`
|
|
|
|
|
|
* SSH Private key (discussed below)
|
|
|
|
|
|
* User Name should ONLY contain the word :code:`git`
|
|
|
|
|
|
* password: leave this field empty
|
|
|
|
You need to create your repository BEFORE enabling git-backup. Do not add any files or READMEs to the repository. In other words, create a BLANK repository.
|
|
|
|
Next, `create a new SSH key <https://docs.github.com/en/authentication/connecting-to-github-with-ssh/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent>`__ specifically for git-backup (only generate the private / public keys per that document and skip the rest). **It is imperative that you do not add a password to your key**, or your backups will fail with authentication errors.
|
|
|
|
You should set up SSH access to just your repository by assigning your SSH public key to the repository instead of assigning it to your GitHub / GitLab account. Doing this ensures that you don't arbitrarily expose more of your git resources to OPNSense than is absolutely necessary for git-backup to work properly.
|
|
|
|
If you use GitHub, you can add your SSH public key by going to your repository, then click on :code:`settings`, then :code:`Deploy keys`. Or you can go straight to the URL using this format: :code:`https://github.com/USER_NAME/REPOSITORY_NAME/settings/keys/new`.
|
|
|
|
* Check the box :code:`Allow write Access`.
|
|
|
|
Make sure the fields are populated as stated above and that the Enable box is checked, then click on :code:`Setup / Test Git` and you should see a message come back at the top of the page indicating that the first backup was successful.
|
|
|
|
--------------------------
|
|
Conflict resolution
|
|
--------------------------
|
|
|
|
From the user interface no conflict resolution is offered, you need to configure an upstream repository and stick
|
|
to it for the lifetime of the firewall. When for some reason a backup needs to be restored and one would like to
|
|
stick to the same git repository, manual conflict resolution might be an option. Support on these scenario's is
|
|
not offered.
|
|
|
|
The repository is available on the OPNsense machine in the following directory :code:`/conf/backup/git`.
|
|
|
|
|
|
.. Note::
|
|
|
|
Conflict resolution can complicate the solution a lot (merging, fast-forward, ....), for this reason we will not
|
|
accept feature requests trying to push to existing (used) repositories.
|
|
|
|
|
|
--------------------------
|
|
Error handling
|
|
--------------------------
|
|
|
|
When errors occur these will be written to the normal system logging, search for :code:`git-backup` in the general
|
|
system logging (:menuselection:`System -> Log Files -> General`).
|
|
|
|
Some standard errors might be returned via the test button, which should provide a clear direction, known ones are:
|
|
|
|
* **authentication failure** -> username/password combination is not valid or the provided ssh key doesn't match the expected one
|
|
* **ssh hostkey changed** -> it looks like a man-in-the-middle attack is happening, if that's not the case and the remote identification
|
|
changed for valid reasons, manual intervention is required (remove the offensive key from :code:`/root/.ssh/known_hosts`)
|
|
* **git out of sync** -> unable to synchronize, see "Conflict resolution" for additional info.
|
|
|
|
|
|
--------------------------
|
|
Cleanup
|
|
--------------------------
|
|
|
|
The repository is saved locally on the firewall in :code:`/conf/backup/git`, if for some reason one would like to remove the
|
|
collected history and start over from scratch, one can safetly remove this directory.
|
|
|
|
Login using a (ssh) console and remove the git directory in that case (:code:`rm -rf /conf/backup/git`)
|
|
|
|
|
|
.. Note::
|
|
|
|
As long as the plugin is installed and /conf/backup/git contains a git repository, the changes will be captured
|
|
(also without an upstream). One could use this knowledge as well to keep a local (only) repository by creating
|
|
a repository without assigning an upstream and leave the backup option disabled.
|
|
|
|
.. Tip::
|
|
|
|
The firewall contains a local backup of the most recent changes (configured in :menuselection:`System -> Configuration -> History`)
|
|
which the config changed event handler uses to feed to the consumers. If after a cleanup one would like to flush
|
|
the collected changes again to the upstream provider, the :code:`/conf/event_config_changed.json` could be removed
|
|
to "forget" about the already handled config events (in which case all backups will be signaled again to all config syshook handlers)
|