gerrit/gerrit-sshd
Shawn O. Pearce 2f8b9bc3b7 Allow suexec to run any command as any user
The suexec command can only be run by a peer daemon, and permits
the daemon to execute another command as a specific user identity.

This is the foundation of allowing writes to be proxied from a
slave server into the master, the slave just needs to SSH into the
master and use suexec in front of the user supplied command line
to perform an action on their behalf on the master.

Unfortunately this means we have to trust the slave process, as it
can become anyone, including an administrator.  A better approach
would be to use agent authentication and authenticate back through
the slave to the user's agent process, but not every user connection
may be using an agent.  In particular batch jobs might be using an
unencrypted key and no agent to authenticate.

Change-Id: Icb8ddb16959f01189a6c0bdfc8fec45cdd99659b
Signed-off-by: Shawn O. Pearce <sop@google.com>
2010-01-16 14:27:28 -08:00
..
.settings Rewrite our build as modular maven components 2009-11-11 16:54:06 -08:00
src Allow suexec to run any command as any user 2010-01-16 14:27:28 -08:00
.gitignore Rewrite our build as modular maven components 2009-11-11 16:54:06 -08:00
pom.xml Cleanup Maven build by pushing component dependencies down 2009-12-30 17:19:47 -08:00