Your shell history: synced, queryable, and in context
Go to file
2022-10-23 00:53:47 -07:00
.github Add fix for the weird zsh bug + disable tmate 2022-10-23 00:36:23 -07:00
backend Remove basic auth since that is now done by the LB 2022-10-22 11:08:33 -07:00
client Add tests for disabling control-r 2022-10-23 00:53:47 -07:00
scripts Fix URL now that we only have one tag per release 2022-05-28 10:18:51 -07:00
shared Initial non-unit tested version of fish support 2022-10-18 19:55:41 -07:00
.dockerignore Revert "Remove no longer used dot files" 2022-10-15 14:36:29 -07:00
.errcheck_excludes.txt pre-commit + stricter formatting + pre-commit fixes 2022-04-07 21:40:22 -07:00
.gitignore Add server binary to .gitignore 2022-09-29 23:27:17 -07:00
.pre-commit-config.yaml Manually vendor the slsa_verifier lib so we can make tweaks to it 2022-06-04 21:21:49 -07:00
.slsa-goreleaser-darwin-amd64.yml Revert "Remove no longer used dot files" 2022-10-15 14:36:29 -07:00
.slsa-goreleaser-darwin-arm64.yml Revert "Remove no longer used dot files" 2022-10-15 14:36:29 -07:00
.slsa-goreleaser-linux-amd64.yml Revert "Remove no longer used dot files" 2022-10-15 14:36:29 -07:00
go.mod Add basic undocumented tui for querying under the hishtory tquery command 2022-10-16 09:22:34 -07:00
go.sum Add basic undocumented tui for querying under the hishtory tquery command 2022-10-16 09:22:34 -07:00
hishtory.go Skip importing the existing shell history if install is ran and hishtory already has a significant number of history entries 2022-10-20 23:42:08 -07:00
LICENSE Create LICENSE 2022-09-24 01:03:16 -07:00
Makefile Add fix for the weird zsh bug + disable tmate 2022-10-23 00:36:23 -07:00
README.md Explicitly note that we support linux and macos 2022-10-14 21:06:01 -07:00
VERSION Release v0.145 2022-10-18 12:06:49 -07:00

hiSHtory: Better Shell History

hishtory is a better shell history. It stores your shell history in context (what directory you ran the command in, whether it succeeded or failed, how long it took, etc). This is all stored locally and end-to-end encrypted for syncing to to all your other computers. All of this is easily queryable via the hishtory CLI. This means from your laptop, you can easily find that complex bash pipeline you wrote on your server, and see the context in which you ran it.

demo

Getting Started

To install hishtory on your first machine:

curl https://hishtory.dev/install.py | python3 -

At this point, hishtory is already managing your shell history. Give it a try with hishtory query and see below for more details on the advanced query features.

Then to install hishtory on your other computers, you need your secret key. Get this by running hishtory status. Once you have it, you follow similar steps to install hiSHtory on your other computers:

curl https://hishtory.dev/install.py | python3 -
hishtory init $YOUR_HISHTORY_SECRET

Now if you run hishtory query on first computer, you can automatically see the commands you've run on all your other computers!

Features

Querying

hishtory query is the main interface for searching through your shell history. See some below annotated queries:

Command Explanation
hishtory query psql Find all commands containing psql
hishtory query psql db.example.com Find all commands containing psql and db.example.com
hishtory query docker hostname:my-server Find all commands containing docker that were run on the computer with hostname my-server
hishtory query nano user:root Find all commands containing nano that were run as root
hishtory query exit_code:127 Find all commands that exited with code 127
hishtory query service before:2022-02-01 Find all commands containing service run before February 1st 2022
hishtory query service after:2022-02-01 Find all commands containing service run after February 1st 2022

For true power users, you can even query in SQLite via sqlite3 ~/.hishtory/.hishtory.db.

Enable/Disable

If you want to temporarily turn on/off hiSHtory recording, you can do so via hishtory disable (to turn off recording) and hishtory enable (to turn on recording). You can check whether or not hishtory is enabled via hishtory status.

Deletion

hishtory redact can be used to delete history entries that you didn't intend to record. It accepts the same search format as hishtory query. For example, to delete all history entries containing psql, run hishtory redact psql.

Updating

To update hishtory to the latest version, just run hishtory update to securely download and apply the latest update.

Multi-Shell and Multi-OS Support

hishtory supports zsh and bash on Linux and macOS. If you'd like support for another shell (e.g. fish), please open an issue!

Design

The hishtory CLI is written in Go. It hooks into the shell in order to track information about all commands that are run. It takes this data and saves it in a local SQLite DB managed via GORM. This data is then encrypted and sent to your other devices through a backend that essentially functions as a one-to-many queue. When you run hishtory query, a SQL query is run to find matching entries in the local SQLite DB.

Syncing Design

When hishtory is installed, it generates a random secret key. Computers that share a history share this secret key (done via having the user manually copy the key). It then generates two additional secrets:

  1. UserId = HMAC(SecretKey, "user_id")
  2. EncryptionKey = HMAC(SecretKey, "encryption_key")
  3. DeviceId = randomUuid()

At installation time, hishtory registers itself with the backend which stores the tuple (UserId, DeviceId) which represents a one-to-many relationship between user and devices. In addition, it creates a DumpRequest to signify that a new device was created and it needs a copy of the existing bash history.

When a command is run:

  1. hishtory encrypts (via AES-GCM with EncryptionKey) the command (and all the metadata) and sends it to the backend along with the UserId to persist it for. The backend retrieves a list of all associated DeviceIds and stores a copy of the encrypted blob for each device associated with that user. Once a given device has read an encrypted blob, that entry can be deleted in order to save space (in essence this is a per-device queue, but implemented on top of postgres because this is small scale and I already am running a postgres instance).
  2. hishtory checks for any pending DumpRequests. If it finds one, it sends a complete (encrypted) copy of the local SQLite DB to the requesting device.

When the user runs hishtory query, it retrieves all unread blobs from the backend, decrypts them, and adds them to the local SQLite DB.

Security

hishtory is a CLI tool written in Go and uses AES-GCM for end-to-end encrypting your history entries while syncing them. The binary is reproducibly built and SLSA Level 3 to make it easy to verify you're getting the code contained in this repository.

This all ensures that the minimalist backend cannot read your shell history, it only sees encrypted data.

If you find any security issues in hiSHtory, please reach out to david@daviddworken.com.