Closed Bug 742670 Opened 13 years ago Closed 13 years ago

Provide a non-mozilla user access to make.mozilla VM

Categories

(Infrastructure & Operations Graveyard :: WebOps: Labs, task)

x86
macOS
task
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: boozeniges, Assigned: gozer)

Details

Heya guys, Am wondering if we have a process for providing external contractors (without LDAP access) the ability to SSH into our virtual machines? We've got someone working on our make.mozilla work and having him be able to get into make-dev1.vm1.labs.sjc1.mozilla.com would save a bunch of time. If this is possible can you let me know what info you need and I'll get it to you ASAP! Cheers, Ross
Assignee: server-ops-labs → gozer
(In reply to Ross Bruniges from comment #0) > Heya guys, > > Am wondering if we have a process for providing external contractors > (without LDAP access) the ability to SSH into our virtual machines? As far as I know, that's not possible. I think you'd need to get that third party to go through the contributor agreement process: http://www.mozilla.org/hacking/committer/
Does the committer agreement get me SSH access? I don't need commit access to any of the protected Mozilla source repos, which is all the contributor agreement seems to cover.
I know, but the process is the same. And the code for that site lives in source-control somewhere. I'd fill the contributor's agreement and file a bug asking for access to that site's repository only.
Okay cool. The source is on Github, so I really don't need access to any Mozilla-hosted repos, but if the process starts the same way, then we'll do that. I'll get that form filled out tomorrow.
The process Gozer linked to is only relevant to Mozilla source code repositories, and doesn't seem relevant here (you want access to the VM itself). For normal SSH access to a VM, you'll have to make your own arrangements with whoever is administering that VM. Sounds like you need to sit down with whichever IT people are responsible for the infra you want and figure out what you need and how things should be set up :)
(In reply to Gavin Sharp (use gavin@gavinsharp.com for email) from comment #5) > The process Gozer linked to is only relevant to Mozilla source code > repositories, and doesn't seem relevant here (you want access to the VM > itself). Actually, what I need is for this user to have a LDAP account with a SSH key and a contributor agreement on file. > For normal SSH access to a VM, you'll have to make your own > arrangements with whoever is administering that VM. Sounds like you need to > sit down with whichever IT people are responsible for the infra you want and > figure out what you need and how things should be set up :) That's me, and the point is that since the labs VM network is currently flat, we can't let outsiders (non-LDAP/CLA) inside, unfortunately.
(In reply to Philippe M. Chiasson (:gozer) from comment #6) > Actually, what I need is for this user to have a LDAP account with a SSH key > and a contributor agreement on file. For access to which repository?
(In reply to Gavin Sharp (use gavin@gavinsharp.com for email) from comment #7) > (In reply to Philippe M. Chiasson (:gozer) from comment #6) > > Actually, what I need is for this user to have a LDAP account with a SSH key > > and a contributor agreement on file. > > For access to which repository? Since the repo itself is on github, to no internal Mozilla repository
The committer's agreement is quite specific to Code contributions to Mozilla-hosted code repositories. It wasn't designed to be used as a requirement for other forms of access (like shell access to a VM). As someone responsible for dealing with Mozilla repository access requests, I've just never seen a request made that involved getting access to other parts of MoCo infra, so I guess I'm just confused as to why you think a signed committer's agreement is necessary in this case. It's possible I'm just not aware of some new IT policy?
I'm project managing this website and just returning from vacation. Is there anything we can do from our end to help resolve this? Would be great to get Matt access so he can start coding. Happy to help however I can. Thanks!
If he's a contractor he should already have an @mozilla.com email address and an LDAP account. Who's the contractor?
Matt Patterson (cc'ed on this bug) is our contractor. Ok, didn't realize we should first grab him an LDAP. I'll file a bug for that, and then it sounds like afterward he can easily be set up on the VMs.
So, I'm in LDAP and have MPT VPN access, but I still can't get into the server. Here's the ssh -v transcript: Is it possible that LDAP doesn't have my pubkey? (I did submit it...) ssh -v mattp@XXXX.vm1.labs.sjc1.mozilla.com OpenSSH_5.6p1, OpenSSL 0.9.8r 8 Feb 2011 debug1: Reading configuration data /Users/matt/.ssh/config debug1: Reading configuration data /etc/ssh_config debug1: Applying options for * debug1: Connecting to XXXX.vm1.labs.sjc1.mozilla.com [10.110.4.116] port 22. debug1: Connection established. debug1: identity file /Users/matt/.ssh/id_rsa type 1 debug1: identity file /Users/matt/.ssh/id_rsa-cert type -1 debug1: identity file /Users/matt/.ssh/id_dsa type -1 debug1: identity file /Users/matt/.ssh/id_dsa-cert type -1 debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3p1 Debian-3ubuntu3lpk0 debug1: match: OpenSSH_5.3p1 Debian-3ubuntu3lpk0 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.6 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-ctr hmac-md5 none debug1: kex: client->server aes128-ctr hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: Host 'XXXX.vm1.labs.sjc1.mozilla.com' is known and matches the RSA host key. debug1: Found key in /Users/matt/.ssh/known_hosts:174 debug1: ssh_rsa_verify: signature correct debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: Roaming not allowed by server debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering RSA public key: /Users/matt/.ssh/id_rsa debug1: Authentications that can continue: publickey debug1: Offering RSA public key: /Users/matt/.ssh/matt-beor_rsa debug1: Authentications that can continue: publickey debug1: Trying private key: /Users/matt/.ssh/id_dsa debug1: No more authentication methods to try. Permission denied (publickey).
(In reply to Matt Patterson from comment #13) > So, I'm in LDAP and have MPT VPN access, but I still can't get into the > server. Here's the ssh -v transcript: > > Is it possible that LDAP doesn't have my pubkey? (I did submit it...) I can see you in LDAP, but you are correct, there are no public ssh key attached.
Bingo, I got Desktop Support to add my SSH key and I'm in... This can be marked Fixed :-)
Matt is in - and very happy he is. Thanks all for the input, Ross
Status: NEW → RESOLVED
Closed: 13 years ago
Resolution: --- → FIXED
Product: mozilla.org → Infrastructure & Operations
Product: Infrastructure & Operations → Infrastructure & Operations Graveyard
You need to log in before you can comment on or make changes to this bug.