This text is a work in progress—highly subject to change—and may not accurately describe any released version of the Apache™ Subversion® software. Bookmarking or otherwise referring others to this page is probably not such a smart idea. Please visit http://www.svnbook.com/ for stable versions of this book.
Both Apache and svnserve are capable of granting (or denying) permissions to users. Typically this is done over the entire repository: a user can read the repository (or not), and she can write to the repository (or not).
It's also possible, however, to define finer-grained access rules. One set of users may have permission to write to a certain directory in the repository, but not others; another directory might not even be readable by all but a few special people. It's even possible to restrict access on a per file basis.
Both Subversion servers use a common file format to describe these path-based access rules. In this section, we will explain that file format, as well how to configure your Subversion server to use it for managing path-based authorization.
Subversion offers path-based access control in Apache via
the mod_authz_svn module, which must be
loaded using the LoadModule
directive
in httpd.conf
in the same fashion
that mod_dav_svn itself is loaded. To
enable the use of this module for your repositories, you'll
add the AuthzSVNAccessFile
or
AuthzSVNReposRelativeAccessFile
directives (again
within the httpd.conf
file) pointing to
your own access rules file. (For a full explanation, see
the section called “Per-directory access control”.)
To configure path-based authorization
in svnserve, simply point
the authz-db
configuration variable (within
your svnserve.conf
file) to your access
rules file.
Once your server knows where to look for your access rules, it's time to define those rules.
The syntax of the Subversion access file is the same
familiar one used by svnserve.conf
and
the runtime configuration files. Lines that start with a hash
(#
) are ignored. In its simplest form,
each section names a versioned path and, optionally, the
repository in which that path is found. In other words,
except for a few reserved sections, section names are of one
of two forms: either [repos-name:path]
or [path]
when
AuthzSVNAccessFile
is used. If you configured
per repository access files via AuthzSVNReposRelativeAccessFile
directive, you should always use [path]
form
only. Authenticated usernames are the
option names within each section, and an option's value
describes that user's level of access to the repository path:
either r
(read-only) or rw
(read/write). If the user is not mentioned at all, no access is
allowed.
Note | |
---|---|
Paths used in access file sections must be specified
using Subversion's “internal style”, which
mostly just means that they are encoded in UTF-8 and use
forward slash ( |
Here's a simple example demonstrating a piece of the
access configuration which grants read access Sally, and
read/write access to Harry, for the
path /branches/calc/bug-142
(and all its
children) in the repository calc
:
[calc:/branches/calc/bug-142] harry = rw sally = r
Warning | |
---|---|
Prior to version 1.7, Subversion treated repository names and paths in a case-insensitive fashion for the purposes of access control, converting them to lower case internally before comparing them against the contents of your access file. It now does these comparisons case-sensitively. If you upgraded to Subversion 1.7 from an older version, you should review your access files for case correctness. |
The name of a repository as evaluated by the authorization
subsystem is derived directly from the repository's path.
Exactly how this happens differs between the two server
options. mod_dav_svn uses only the basename
of the repository's root URL[71],
while svnserve uses the entire relative
path from the serving root (as determined by
its --root
(-r
) command-line
option) to the repository.
Warning | |
---|---|
The differences in the ways that a repository's name is
determined by each of mod_dav_svn
and svnserve can cause problems when
trying to serve a repository via both servers
simultaneously. Naturally, an administrator would prefer to
point both servers' configurations toward a common access
file. However, for this to work, you must ensure that the
repository name portion of the file's section names are
compatible with each server's idea of what the repository
name should be—for example, by
configuring svnserve's root to be the
same as mod_dav_svn's configured
|
If you're using the SVNParentPath
directive, it's important to specify the repository names in
your sections. If you omit them, a section such as
[/some/dir]
will match the path
/some/dir
in every
repository. If you're using the SVNPath
directive, however, it's fine to provide only paths in your
sections—after all, there's only one repository.
Permissions are inherited from a path's parent directory. That means we can specify a subdirectory with a different access policy for Sally. Let's continue our previous example, and grant Sally write access to a child of the branch that she's otherwise permitted only to read:
[calc:/branches/calc/bug-142] harry = rw sally = r # give sally write access only to the 'testing' subdir [calc:/branches/calc/bug-142/testing] sally = rw
Now Sally can write to the testing
subdirectory of the branch, but can still only read other parts.
Harry, meanwhile, continues to have complete read/write access
to the whole branch.
It's also possible to explicitly deny permission to someone via inheritance rules, by setting the username variable to nothing:
[calc:/branches/calc/bug-142] harry = rw sally = r [calc:/branches/calc/bug-142/secret] harry =
In this example, Harry has read/write access to the
entire bug-142
tree, but has absolutely no
access at all to the secret
subdirectory
within it.
Tip | |
---|---|
The thing to remember is that the most specific path always matches first. The server tries to match the path itself, and then the parent of the path, then the parent of that, and so on. The net effect is that mentioning a specific path in the access file will always override any permissions inherited from parent directories. Similarly, sections that specify a repository name have
precedence over those that don't: if both
|
By default, nobody has any access to any repository at all.
That means that if you're starting with an empty file, you'll
probably want to give at least read permission to all users at
the roots of the repositories. You can do this by using the
asterisk variable (*
), which means “all
users”:
[/] * = r
This is a common setup; notice that no repository
name is mentioned in the section name. This makes all repositories
world-readable to all users. Once all users have read access to
the repositories, you can give explicit
rw
permission to certain users on specific
subdirectories within specific repositories.
Note that while all of the previous examples use directories, that's only because defining access rules on directories is the most common case. You may similarly restrict access on file paths, too.
[calendar:/projects/calendar/manager.ics] harry = rw sally = r
The access file also allows you to define whole groups of
users, much like the Unix /etc/group
file. To do this, create a groups
section
in your access file, and then describe your groups within that
section: each variable's name defines the name of the group,
and its value is a comma-delimited list of usernames which
are part of that group.
[groups] calc-developers = harry, sally, joe paint-developers = frank, sally, jane everyone = harry, sally, joe, frank, jane
Groups can be granted access control just like users.
Distinguish them with an “at sign”
(@
) prefix:
[calc:/projects/calc] @calc-developers = rw [paint:/projects/paint] jane = r @paint-developers = rw
Another important fact is that group permissions are not
overridden by individual user permissions. Rather, the
combination of all matching permissions is
granted. In the prior example, Jane is a member of the
paint-developers
group, which has read/write
access. Combined with the jane = r
rule,
this still gives Jane read/write access. Permissions for group
members can only be extended beyond the permissions the group
already has. Restricting users who are part of a group to less
than their group's permissions is impossible.
Groups can also be defined to contain other groups:
[groups] calc-developers = harry, sally, joe paint-developers = frank, sally, jane everyone = @calc-developers, @paint-developers
Some authentication systems expect and carry relatively
short usernames of the sorts we've been describing
here—harry
,
sally
, joe
, and so on. But
other authentication systems—such as those which use LDAP
stores or SSL client certificates—may carry much more
complex usernames. For example, Harry's username in an
LDAP-protected system might be CN=Harold
Hacker,OU=Engineers,DC=red-bean,DC=com
. With
usernames like that, the access file can become quite bloated
with long or obscure usernames that are easy to
mistype.
Fortunately, Subversion 1.5 introduced username aliases to the access file syntax. Username aliases allow you to have to type the correct complex username only once, in a statement which assigns to it a more easily digestable alias.
Username aliases are defined in the
special aliases
section of the access file,
with each variable name in that section defining an alias, and
the value of those variables carrying the real Subversion
username which is being aliased.
[aliases] harry = CN=Harold Hacker,OU=Engineers,DC=red-bean,DC=com sally = CN=Sally Swatterbug,OU=Engineers,DC=red-bean,DC=com joe = CN=Gerald I. Joseph,OU=Engineers,DC=red-bean,DC=com …
Once you've defined a set of aliases, you can refer to the users elsewhere in the access file via their aliases in all the same places you could have instead used their actual usernames. Simply prepend an ampersand to the alias to distinguish it from a regular username:
[groups] calc-developers = &harry, &sally, &joe paint-developers = &frank, &sally, &jane everyone = @calc-developers, @paint-developers
You might also choose to use aliases if your users' usernames change frequently. Doing so allows you to need to update only the aliases table when these username changes occur, instead of doing global search-and-replace operations on the whole access file.
Beginning with Subversion 1.5, the access file syntax also
supports some “magic” tokens for helping you to
make rule assignments based on the user's authentication
class. One such token is
the $authenticated
token. Use this token
where you would otherwise specify a username, alias, or group
name in your authorization rules to declare the permissions
granted to any user who has authenticated with any username at
all. Similarly employed is the $anonymous
token, except that it matches everyone who has
not authenticated with a username.
[calendar:/projects/calendar] $anonymous = r $authenticated = rw
Another handy bit of access file syntax magic is the use
of the tilde (~
) character as an exclusion
marker. In your authorization rules, prefixing a username,
alias, group name, or authentication class token with a tilde
character will cause Subversion to apply the rule to users who
do not match the rule. Though somewhat
unnecessarily obfuscated, the following block is equivalent to
the one in the previous example:
[calendar:/projects/calendar] ~$authenticated = r ~$anonymous = rw
A less obvious example might be as follows:
[groups] calc-developers = &harry, &sally, &joe calc-owners = &hewlett, &packard calc = @calc-developers, @calc-owners # Any calc participant has read-write access... [calc:/projects/calc] @calc = rw # ...but only allow the owners to make and modify release tags. [calc:/projects/calc/tags] ~@calc-owners = r
If you're using Apache as your Subversion server and have made certain subdirectories of your repository unreadable to certain users, you need to be aware of a possible nonoptimal behavior with svn checkout.
Depending on which HTTP communication library the Subversion client is using, it may request that the entire payload of a checkout or update be delivered in a single (often large) response to the primary checkout/update request. When this happens, this single request is the only opportunity Apache has to demand user authentication. This has some odd side effects. For example, if a certain subdirectory of the repository is readable only by user Sally, and user Harry checks out a parent directory, his client will respond to the initial authentication challenge as Harry. As the server generates the large response, there's no way it can resend an authentication challenge when it reaches the special subdirectory; thus the subdirectory is skipped altogether, rather than asking the user to reauthenticate as Sally at the right moment.
In a similar way, if the root of the repository is anonymously world-readable, the entire checkout will be done without authentication—again, skipping the unreadable directory, rather than asking for authentication partway through.[72]
[70] A common theme in this book!
[71] Any human-readable
name for a repository configured via
the SVNReposName
httpd.conf
directive will be ignored by the authorization subsystem.
Your access control file sections must refer to repositories
by their server-sensitive paths as previously
described.
[72] For more on this, see the blog post Authz and Anon Authn Agony at https://subversion.apache.org/blog/2007-03-27-authz-and-anon-authn-agony.html.