Your shell history: synced, queryable, and in context
Go to file
2022-04-17 10:50:37 -07:00
.github/workflows Run tests on macos 2022-04-17 10:50:37 -07:00
backend Fix TODOs in tests 2022-04-16 23:02:36 -07:00
client Verify the version tag in SLSA too 2022-04-17 10:29:48 -07:00
scripts Fix the ldflags attempt #2 2022-04-16 21:29:59 -07:00
shared Add API endpoint for getting information about the latest hishtory version and download URLs 2022-04-16 16:34:09 -07:00
.dockerignore Website landing page, install instructions, update command, status command, set up postgres, and fixing broken tests 2022-03-29 21:56:28 -07:00
.errcheck_excludes.txt pre-commit + stricter formatting + pre-commit fixes 2022-04-07 21:40:22 -07:00
.gitignore moved client/client.go to hishtory.go to support slsa l3 border 2022-04-08 21:17:11 -07:00
.pre-commit-config.yaml Mention SLSA on the landing page 2022-04-09 00:25:09 -07:00
.slsa-goreleaser.yml And what about this? 2022-04-17 10:40:06 -07:00
go.mod Add SLSA verification of updated binary 2022-04-16 16:02:07 -07:00
go.sum Add SLSA verification of updated binary 2022-04-16 16:02:07 -07:00
hishtory.go Improved update flow 2022-04-16 20:50:02 -07:00
Makefile Better commit message for releases 2022-04-16 21:30:51 -07:00
README.md Add todo + remove pending features that are already done 2022-04-16 12:39:28 -07:00
VERSION Bump hishtory version to v0.30 2022-04-17 10:40:29 -07:00

hishtory: Better Shell Hishtory

hishtory is a CLI tool to better manage your shell history. It hooks into your shell to store the commands you run along with metadata about those commands (what directory you ran it in, whether it succeeded or failed, how long it took, etc). This is all stored in a local SQLite DB, and then e2e encrypted while synced to local SQLite DBs running on all your other computers. All of this is easily queryable via the hishtory CLI. This means from your laptop, you can easily find that complex bash pipeline you wrote on your server, and see the context in which you ran it.

hishtory is written in Go and uses AES-GCM for end-to-end encrypting your hishtory entries while syncing them. The binary is reproducibly built and SLSA Level 3 to make it easy to verify you're getting the code contained in this repository.

Getting Started

To install hishtory on your first machine:

curl -L -o hishtory https://api.hishtory.dev/download/hishtory-linux-amd64
# Optional: Verify the binarie's SLSA L3 attestations from https://api.hishtory.dev/download/hishtory-linux-amd64.intoto.jsonl
chmod +x hishtory
./hishtory install

At this point, hishtory is already persisting your shell history. Give it a try with hishtory query and see below for more details on the advanced query features.

Then to install hishtory on your other computers, you need your secret key. Get this by running hishtory status. Once you have it, you follow similar steps to install hishtory on your other computers:

curl -L -o hishtory https://api.hishtory.dev/download/hishtory-linux-amd64
# Optional: Verify the binarie's SLSA L3 attestations from https://api.hishtory.dev/download/hishtory-linux-amd64.intoto.jsonl
chmod +x hishtory
./hishtory install $SECRET_KEY

Now if you run hishtory query on first computer, you can automatically see the commands you've run on all your other computers!

Features

Querying

hishtory query is the main interface for searching through your shell history. See some below annotated queries:

Command Explanation
hishtory query psql Find all commands containing psql
hishtory query psql db.example.com Find all commands containing psql and db.example.com
hishtory query docker hostname:my-server Find all commands containing docker that were run on the computer with hostname my-server
hishtory query nano user:root Find all commands containing nano that were run as root
hishtory query exit_code:127 Find all commands that exited with code 127
hishtory query service before:2022-02-01 Find all commands containing service run before February 1st 2022
hishtory query service after:2022-02-01 Find all commands containing service run after February 1st 2022

For true power users, you can query via SQL via sqlite3 ~/.hishtory/.hishtory.db.

In addition, hishtory export dumps all commands to stdout separated by a single line. This can be useful for certain advanced use cases.

Enable/Disable

If you want to temporarily turn on/off hishtory recording, you can do so via hishtory disable (to turn off recording) and hishtory enable (to turn on recording). You can check whether or not hishtory is enabled via hishtory status.

Updating

To update hishtory to the latest version, just run hishtory update to transparently download and apply the latest update.

Design

The hishtory CLI is written in Go. It hooks into the shell in order to track information about all commands that are run (specifically in bash this is done via trap DEBUG and overriding $PROMPT_COMMAND). It takes this data and saves it in a local SQLite DB managed via GORM. When the user runs hishtory query, a SQL query is run to find matching entries in the local SQLite DB.

Syncing Design

When hishtory is installed, it generates a random secret key. Computers that share a history share this secret key (which is manually copied by the user). It deterministically generates three additional secrets from the secret key:

  1. UserId = HMAC(SecretKey, "user_id")
  2. DeviceId = HMAC(SecretKey, "device_id")
  3. EncryptionKey = HMAC(SecretKey, "encryption_key")

At installation time, hishtory registers itself with the backend which stores the tuple (UserId, DeviceId) which represents a one-to-many relationship between user and devices.

When a command is run, hishtory encrypts (via AES-GCM with EncryptionKey) the command (and all the metadata) and sends it to the backend along with the UserId to persist it for. The backend retrieves a list of all associated DeviceIds and stores a copy of the encrypted blob for each device associated with that user. Once a given device has read an encrypted blob, that entry can be deleted in order to save space (in essence this is a per-device queue, but implemented on top of postgres because this is small scale and I already am running a postgres instance).

When the user runs hishtory query, it retrieves all unread blobs from the backend, decrypts them, and adds them to the local SQLite DB.

Security

Pending Features

  • zsh support
  • mac support
  • support for verifying the attestations tied to updates