hishtory/README.md

97 lines
5.8 KiB
Markdown
Raw Normal View History

2022-09-25 00:30:51 +02:00
# hiSHtory: Better Shell History
2022-10-09 19:45:00 +02:00
`hishtory` is a better shell history. It stores your shell history in context (what directory you ran the command in, whether it succeeded or failed, how long it took, etc). This is all stored locally and end-to-end encrypted for syncing to to all your other computers. All of this is easily queryable via the `hishtory` CLI. This means from your laptop, you can easily find that complex bash pipeline you wrote on your server, and see the context in which you ran it.
2022-09-25 01:18:53 +02:00
![demo](https://raw.githubusercontent.com/ddworken/hishtory/master/backend/web/landing/www/img/hishtory.svg)
2022-09-25 01:17:23 +02:00
## Getting Started
To install `hishtory` on your first machine:
```bash
curl https://hishtory.dev/install.py | python3 -
```
At this point, `hishtory` is already managing your shell history. Give it a try with `hishtory query` and see below for more details on the advanced query features.
2022-09-25 00:30:51 +02:00
Then to install `hishtory` on your other computers, you need your secret key. Get this by running `hishtory status`. Once you have it, you follow similar steps to install hiSHtory on your other computers:
```bash
curl https://hishtory.dev/install.py | python3 -
hishtory init $YOUR_HISHTORY_SECRET
```
Now if you run `hishtory query` on first computer, you can automatically see the commands you've run on all your other computers!
## Features
### Querying
There are two ways to interact with hiSHtory.
1. Via pressing `Control+R` in your terminal. Search for a command, select it via `Enter`, and then have it ready to execute in your terminal's buffer.
2. Via `hishtory query` if you just want to explore your shell history.
Both support the same query format, see the below annotated queries:
| Query | Explanation |
|---|---|
| `psql` | Find all commands containing `psql` |
| `psql db.example.com` | Find all commands containing `psql` and `db.example.com` |
| `docker hostname:my-server` | Find all commands containing `docker` that were run on the computer with hostname `my-server` |
| `nano user:root` | Find all commands containing `nano` that were run as `root` |
| `exit_code:127` | Find all commands that exited with code `127` |
| `service before:2022-02-01` | Find all commands containing `service` run before February 1st 2022 |
| `service after:2022-02-01` | Find all commands containing `service` run after February 1st 2022 |
For true power users, you can even query in SQLite via `sqlite3 ~/.hishtory/.hishtory.db`.
### Enable/Disable
2022-09-25 00:30:51 +02:00
If you want to temporarily turn on/off hiSHtory recording, you can do so via `hishtory disable` (to turn off recording) and `hishtory enable` (to turn on recording). You can check whether or not `hishtory` is enabled via `hishtory status`.
2022-09-21 06:44:09 +02:00
### Deletion
`hishtory redact` can be used to delete history entries that you didn't intend to record. It accepts the same search format as `hishtory query`. For example, to delete all history entries containing `psql`, run `hishtory redact psql`.
### Updating
To update `hishtory` to the latest version, just run `hishtory update` to securely download and apply the latest update.
### Multi-Shell and Multi-OS Support
2022-06-05 08:29:13 +02:00
`hishtory` supports `bash`, `zsh`, and `fish` on Linux and macOS. If you'd like support for another shell, please open an issue!
### Disabling Control-R integration
If you'd like to disable the control-R integration in your shell, you can do so by running `hishtory config-set enable-control-r false`.
2022-06-05 08:29:13 +02:00
## Design
The `hishtory` CLI is written in Go. It hooks into the shell in order to track information about all commands that are run. It takes this data and saves it in a local SQLite DB managed via [GORM](https://gorm.io/). This data is then encrypted and sent to your other devices through a backend that essentially functions as a one-to-many queue. When you run `hishtory query`, a SQL query is run to find matching entries in the local SQLite DB.
2022-04-11 02:24:33 +02:00
### Syncing Design
When `hishtory` is installed, it generates a random secret key. Computers that share a history share this secret key (done via having the user manually copy the key). It then generates two additional secrets:
2022-04-11 02:24:33 +02:00
1. `UserId = HMAC(SecretKey, "user_id")`
2. `EncryptionKey = HMAC(SecretKey, "encryption_key")`
3. `DeviceId = randomUuid()`
2022-04-11 02:24:33 +02:00
At installation time, `hishtory` registers itself with the backend which stores the tuple `(UserId, DeviceId)` which represents a one-to-many relationship between user and devices. In addition, it creates a `DumpRequest` to signify that a new device was created and it needs a copy of the existing bash history.
2022-06-05 05:36:13 +02:00
When a command is run:
2022-04-11 02:24:33 +02:00
2022-06-05 05:36:13 +02:00
1. `hishtory` encrypts (via AES-GCM with `EncryptionKey`) the command (and all the metadata) and sends it to the backend along with the `UserId` to persist it for. The backend retrieves a list of all associated `DeviceId`s and stores a copy of the encrypted blob for each device associated with that user. Once a given device has read an encrypted blob, that entry can be deleted in order to save space (in essence this is a per-device queue, but implemented on top of postgres because this is small scale and I already am running a postgres instance).
2. `hishtory` checks for any pending `DumpRequest`s. If it finds one, it sends a complete (encrypted) copy of the local SQLite DB to the requesting device.
2022-04-11 02:24:33 +02:00
When the user runs `hishtory query`, it retrieves all unread blobs from the backend, decrypts them, and adds them to the local SQLite DB.
## Security
2022-09-27 08:12:06 +02:00
`hishtory` is a CLI tool written in Go and uses AES-GCM for end-to-end encrypting your history entries while syncing them. The binary is reproducibly built and [SLSA Level 3](https://slsa.dev/) to make it easy to verify you're getting the code contained in this repository.
2022-06-05 05:36:13 +02:00
This all ensures that the minimalist backend cannot read your shell history, it only sees encrypted data.
2022-10-09 19:45:00 +02:00
If you find any security issues in hiSHtory, please reach out to `david@daviddworken.com`.