3 navsection: installguide
4 title: Install the Git server
7 Copyright (C) The Arvados Authors. All rights reserved.
9 SPDX-License-Identifier: CC-BY-SA-3.0
12 Arvados allows users to create their own private and public git repositories, and clone/push them using SSH and HTTPS.
14 The git hosting setup involves three components.
15 * The "arvados-git-sync.rb" script polls the API server for the current list of repositories, creates bare repositories, and updates the local permission cache used by gitolite.
16 * Gitolite provides SSH access.
17 * arvados-git-http provides HTTPS access.
19 It is not strictly necessary to deploy _both_ SSH and HTTPS access, but we recommend deploying both:
20 * SSH is a more appropriate way to authenticate from a user's workstation because it does not require managing tokens on the client side;
21 * HTTPS is a more appropriate way to authenticate from a shell VM because it does not depend on SSH agent forwarding (SSH clients' agent forwarding features tend to behave as if the remote machine is fully trusted).
22 * HTTPS is also used by Arvados Composer to access git repositories from the browser.
24 The HTTPS instructions given below will not work if you skip the SSH setup steps.
28 By convention, we use the following hostname for the git service:
31 <pre><code>git.<span class="userinput">uuid_prefix</span>.your.domain
35 {% include 'notebox_begin' %}
36 Here, we show how to install the git hosting services *on the same host as your API server.* Using a different host is not yet fully supported. On this page we will refer to it as your git server.
37 {% include 'notebox_end' %}
39 DNS and network configuration should be set up so port 443 reaches your HTTPS proxy, and port 22 reaches the OpenSSH service on your git server.
41 h2. Generate an API token
43 {% assign railshost = "gitserver" %}
44 {% assign railscmd = "bundle exec ./script/create_superuser_token.rb" %}
45 {% assign railsout = "zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz" %}
46 Use the following command to generate an API token. {% include 'install_rails_command' %}
48 Copy that token; you'll need it in a minute.
50 h2. Install git and other dependencies
52 On Debian-based systems:
55 <pre><code>gitserver:~$ <span class="userinput">sudo apt-get install git openssh-server</span>
59 On Red Hat-based systems:
62 <pre><code>gitserver:~$ <span class="userinput">sudo yum install git perl-Data-Dumper openssh-server</span>
66 {% include 'install_git' %}
68 h2. Create a "git" user and a storage directory
70 Gitolite and some additional scripts will be installed in @/var/lib/arvados/git@, which means hosted repository data will be stored in @/var/lib/arvados/git/repositories@. If you choose to install gitolite in a different location, make sure to update the @git_repositories_dir@ entry in your API server's @application.yml@ file accordingly: for example, if you install gitolite at @/data/gitolite@ then your @git_repositories_dir@ will be @/data/gitolite/repositories@.
72 A new UNIX account called "git" will own the files. This makes git URLs look familiar to users (<code>git@[...]:username/reponame.git</code>).
74 On Debian- or Red Hat-based systems:
77 <pre><code>gitserver:~$ <span class="userinput">sudo mkdir -p /var/lib/arvados/git</span>
78 gitserver:~$ <span class="userinput">sudo useradd --comment git --home-dir /var/lib/arvados/git git</span>
79 gitserver:~$ <span class="userinput">sudo chown -R git:git ~git</span>
83 The git user needs its own SSH key. (It must be able to run <code>ssh git@localhost</code> from scripts.)
86 <pre><code>gitserver:~$ <span class="userinput">sudo -u git -i bash</span>
87 git@gitserver:~$ <span class="userinput">ssh-keygen -t rsa -P '' -f ~/.ssh/id_rsa</span>
88 git@gitserver:~$ <span class="userinput">cp .ssh/id_rsa.pub .ssh/authorized_keys</span>
89 git@gitserver:~$ <span class="userinput">ssh -o stricthostkeychecking=no localhost cat .ssh/id_rsa.pub</span>
90 Warning: Permanently added 'localhost' (ECDSA) to the list of known hosts.
91 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7aBIDAAgMQN16Pg6eHmvc+D+6TljwCGr4YGUBphSdVb25UyBCeAEgzqRiqy0IjQR2BLtSirXr+1SJAcQfBgI/jwR7FG+YIzJ4ND9JFEfcpq20FvWnMMQ6XD3y3xrZ1/h/RdBNwy4QCqjiXuxDpDB7VNP9/oeAzoATPZGhqjPfNS+RRVEQpC6BzZdsR+S838E53URguBOf9yrPwdHvosZn7VC0akeWQerHqaBIpSfDMtaM4+9s1Gdsz0iP85rtj/6U/K/XOuv2CZsuVZZ52nu3soHnEX2nx2IaXMS3L8Z+lfOXB2T6EaJgXF7Z9ME5K1tx9TSNTRcYCiKztXLNLSbp git@gitserver
92 git@gitserver:~$ <span class="userinput">rm .ssh/authorized_keys</span>
98 Check "https://github.com/sitaramc/gitolite/tags":https://github.com/sitaramc/gitolite/tags for the latest stable version. This guide was tested with @v3.6.4@. _Versions below 3.0 are missing some features needed by Arvados, and should not be used._
100 Download and install the version you selected.
103 <pre><code>git@gitserver:~$ <span class="userinput">echo 'PATH=$HOME/bin:$PATH' >.profile</span>
104 git@gitserver:~$ <span class="userinput">source .profile</span>
105 git@gitserver:~$ <span class="userinput">git clone --branch <b>v3.6.4</b> https://github.com/sitaramc/gitolite</span>
107 Note: checking out '5d24ae666bfd2fa9093d67c840eb8d686992083f'.
109 git@gitserver:~$ <span class="userinput">mkdir bin</span>
110 git@gitserver:~$ <span class="userinput">gitolite/install -ln ~git/bin</span>
111 git@gitserver:~$ <span class="userinput">bin/gitolite setup -pk .ssh/id_rsa.pub</span>
112 Initialized empty Git repository in /var/lib/arvados/git/repositories/gitolite-admin.git/
113 Initialized empty Git repository in /var/lib/arvados/git/repositories/testing.git/
114 WARNING: /var/lib/arvados/git/.ssh/authorized_keys missing; creating a new one
115 (this is normal on a brand new install)
119 _If this didn't go well, more detail about installing gitolite, and information about how it works, can be found on the "gitolite home page":http://gitolite.com/._
121 Clone the gitolite-admin repository. The arvados-git-sync.rb script works by editing the files in this working directory and pushing them to gitolite. Here we make sure "git push" won't produce any errors or warnings.
124 <pre><code>git@gitserver:~$ <span class="userinput">git clone git@localhost:gitolite-admin</span>
125 Cloning into 'gitolite-admin'...
126 remote: Counting objects: 6, done.
127 remote: Compressing objects: 100% (4/4), done.
128 remote: Total 6 (delta 0), reused 0 (delta 0)
129 Receiving objects: 100% (6/6), done.
130 Checking connectivity... done.
131 git@gitserver:~$ <span class="userinput">cd gitolite-admin</span>
132 git@gitserver:~/gitolite-admin$ <span class="userinput">git config user.email arvados</span>
133 git@gitserver:~/gitolite-admin$ <span class="userinput">git config user.name arvados</span>
134 git@gitserver:~/gitolite-admin$ <span class="userinput">git config push.default simple</span>
135 git@gitserver:~/gitolite-admin$ <span class="userinput">git push</span>
136 Everything up-to-date
140 h3. Configure gitolite
142 Configure gitolite to look up a repository name like @username/reponame.git@ and find the appropriate bare repository storage directory.
144 Add the following lines to the top of @~git/.gitolite.rc@:
147 <pre><code><span class="userinput">my $repo_aliases;
148 my $aliases_src = "$ENV{HOME}/.gitolite/arvadosaliases.pl";
149 if ($ENV{HOME} && (-e $aliases_src)) {
150 $repo_aliases = do $aliases_src;
152 $repo_aliases ||= {};
156 Add the following lines inside the section that begins @%RC = (@:
159 <pre><code><span class="userinput"> REPO_ALIASES => $repo_aliases,
163 Inside that section, adjust the 'UMASK' setting to @022@, to ensure the API server has permission to read repositories:
166 <pre><code> UMASK => <span class="userinput">022</span>,
170 Uncomment the 'Alias' line in the section that begins @ENABLE => [@:
173 <pre><code><span class="userinput"> # access a repo by another (possibly legacy) name
178 h2. Configure git synchronization
180 Create a configuration file @/var/www/arvados-api/current/config/arvados-clients.yml@ using the following template, filling in the appropriate values for your system.
181 * For @arvados_api_token@, use the token you generated above.
182 * For @gitolite_arvados_git_user_key@, provide the public key you generated above, i.e., the contents of @~git/.ssh/id_rsa.pub@.
185 <pre><code>production:
186 gitolite_url: /var/lib/arvados/git/repositories/gitolite-admin.git
187 gitolite_tmp: /var/lib/arvados/git
188 arvados_api_host: <span class="userinput">uuid_prefix.example.com</span>
189 arvados_api_token: "<span class="userinput">zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz</span>"
190 arvados_api_host_insecure: <span class="userinput">false</span>
191 gitolite_arvados_git_user_key: "<span class="userinput">ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC7aBIDAAgMQN16Pg6eHmvc+D+6TljwCGr4YGUBphSdVb25UyBCeAEgzqRiqy0IjQR2BLtSirXr+1SJAcQfBgI/jwR7FG+YIzJ4ND9JFEfcpq20FvWnMMQ6XD3y3xrZ1/h/RdBNwy4QCqjiXuxDpDB7VNP9/oeAzoATPZGhqjPfNS+RRVEQpC6BzZdsR+S838E53URguBOf9yrPwdHvosZn7VC0akeWQerHqaBIpSfDMtaM4+9s1Gdsz0iP85rtj/6U/K/XOuv2CZsuVZZ52nu3soHnEX2nx2IaXMS3L8Z+lfOXB2T6EaJgXF7Z9ME5K1tx9TSNTRcYCiKztXLNLSbp git@gitserver</span>"
195 h3. Enable the synchronization script
197 The API server package includes a script that retrieves the current set of repository names and permissions from the API, writes them to @arvadosaliases.pl@ in a format usable by gitolite, and triggers gitolite hooks which create new empty repositories if needed. This script should run every 2 to 5 minutes.
199 If you are using RVM, create @/etc/cron.d/arvados-git-sync@ with the following content:
202 <pre><code><span class="userinput">*/5 * * * * git cd /var/www/arvados-api/current && /usr/local/rvm/bin/rvm-exec default bundle exec script/arvados-git-sync.rb production</span>
206 Otherwise, create @/etc/cron.d/arvados-git-sync@ with the following content:
209 <pre><code><span class="userinput">*/5 * * * * git cd /var/www/arvados-api/current && bundle exec script/arvados-git-sync.rb production</span>
213 h3. Configure the API server to advertise the correct SSH URLs
215 In your API server's @application.yml@ file, add the following entry:
218 <pre><code>git_repo_ssh_base: "git@git.<span class="userinput">uuid_prefix.your.domain</span>:"
222 Make sure to include the trailing colon.
224 h2. Install the arvados-git-httpd package
226 This is needed only for HTTPS access.
228 The arvados-git-httpd package provides HTTP access, using Arvados authentication tokens instead of passwords. It is intended to be installed on the system where your git repositories are stored, and accessed through a web proxy that provides SSL support.
230 On Debian-based systems:
233 <pre><code>~$ <span class="userinput">sudo apt-get install git arvados-git-httpd</span>
237 On Red Hat-based systems:
240 <pre><code>~$ <span class="userinput">sudo yum install git arvados-git-httpd</span>
241 ~$ <span class="userinput">sudo systemctl enable arvados-git-httpd</span>
245 Verify that @arvados-git-httpd@ and @git-http-backend@ can be run:
248 <pre><code>~$ <span class="userinput">arvados-git-httpd -h</span>
250 Usage: arvados-git-httpd [-config path/to/arvados/git-httpd.yml]
252 ~$ <span class="userinput">git http-backend</span>
253 Status: 500 Internal Server Error
254 Expires: Fri, 01 Jan 1980 00:00:00 GMT
256 Cache-Control: no-cache, max-age=0, must-revalidate
258 fatal: No REQUEST_METHOD from server
262 h3. Enable arvados-git-httpd
264 {% include 'notebox_begin' %}
266 The arvados-git-httpd package includes configuration files for systemd. If you're using a different init system, you'll need to configure a service to start and stop an @arvados-git-httpd@ process as desired.
268 {% include 'notebox_end' %}
270 Create the configuration file @/etc/arvados/git-httpd/git-httpd.yml@. Run @arvados-git-httpd -h@ to learn more about configuration entries.
274 APIHost: <b>uuid_prefix.your.domain</b>
276 GitCommand: /var/lib/arvados/git/gitolite/src/gitolite-shell
277 GitoliteHome: /var/lib/arvados/git
279 RepoRoot: /var/lib/arvados/git/repositories
283 Restart the systemd service to ensure the new configuration is used.
286 <pre><code>~$ <span class="userinput">sudo systemctl restart arvados-git-httpd</span>
290 h3. Set up a reverse proxy to provide SSL service
292 The arvados-git-httpd service will be accessible from anywhere on the internet, so we recommend using SSL.
294 This is best achieved by putting a reverse proxy with SSL support in front of arvados-git-httpd, running on port 443 and passing requests to @arvados-git-httpd@ on port 9001 (or whichever port you used in your run script).
296 Add the following configuration to the @http@ section of your Nginx configuration:
300 upstream arvados-git-httpd {
301 server 127.0.0.1:<span class="userinput">9001</span>;
304 listen <span class="userinput">[your public IP address]</span>:443 ssl;
305 server_name git.<span class="userinput">uuid_prefix.your.domain</span>;
306 proxy_connect_timeout 90s;
307 proxy_read_timeout 300s;
310 ssl_certificate <span class="userinput">/YOUR/PATH/TO/cert.pem</span>;
311 ssl_certificate_key <span class="userinput">/YOUR/PATH/TO/cert.key</span>;
313 # The server needs to accept potentially large refpacks from push clients.
314 client_max_body_size 50m;
317 proxy_pass http://arvados-git-httpd;
323 h3. Configure the API server to advertise the correct HTTPS URLs
325 In your API server's @application.yml@ file, add the following entry:
328 <pre><code>git_repo_https_base: https://git.<span class="userinput">uuid_prefix.your.domain</span>/
332 Make sure to include the trailing slash.
336 Restart Nginx to make the Nginx and API server configuration changes take effect.
339 <pre><code>gitserver:~$ <span class="userinput">sudo nginx -s reload</span>
343 h2. Clone Arvados repository
345 Here we create a repository object which will be used to set up a hosted clone of the arvados repository on this cluster.
348 <pre><code>~$ <span class="userinput">prefix=`arv --format=uuid user current | cut -d- -f1`</span>
349 ~$ <span class="userinput">echo "Site prefix is '$prefix'"</span>
350 ~$ <span class="userinput">all_users_group_uuid="$prefix-j7d0g-fffffffffffffff"</span>
351 ~$ <span class="userinput">repo_uuid=`arv --format=uuid repository create --repository "{\"owner_uuid\":\"$prefix-tpzed-000000000000000\", \"name\":\"arvados\"}"`</span>
352 ~$ <span class="userinput">echo "Arvados repository uuid is '$repo_uuid'"</span>
353 </code></pre></notextile>
355 Create a link object to make the repository object readable by the "All users" group, and therefore by every active user. This makes it possible for users to run the bundled Crunch scripts by specifying @"script_version":"master","repository":"arvados"@ rather than pulling the Arvados source tree into their own repositories.
358 <pre><code>~$ <span class="userinput">read -rd $'\000' newlink <<EOF; arv link create --link "$newlink"</span>
359 <span class="userinput">{
360 "tail_uuid":"$all_users_group_uuid",
361 "head_uuid":"$repo_uuid",
362 "link_class":"permission",
366 </code></pre></notextile>
368 In a couple of minutes, your arvados-git-sync cron job will create an empty repository on your git server. Seed it with the real arvados repository. If your git credential helpers were configured correctly when you "set up your shell server":install-shell-server.html, the "git push" command will use your API token instead of prompting you for a username and password.
371 <pre><code>~$ <span class="userinput">cd /tmp</span>
372 /tmp$ <span class="userinput">git clone --bare https://github.com/curoverse/arvados.git</span>
373 /tmp <span class="userinput">git --git-dir arvados.git push https://git.<b>uuid_prefix.your.domain</b>/arvados.git '*:*'</span>
377 If you did not set up a HTTPS service, you can push to <code>git@git.uuid_prefix.your.domain:arvados.git</code> using your SSH key, or by logging in to your git server and using sudo.
380 <pre><code>gitserver:~$ <span class="userinput">sudo -u git -i bash</span>
381 git@gitserver:~$ <span class="userinput">git clone --bare https://github.com/curoverse/arvados.git /tmp/arvados.git</span>
382 git@gitserver:~$ <span class="userinput">cd /tmp/arvados.git</span>
383 git@gitserver:/tmp/arvados.git$ <span class="userinput">gitolite push /var/lib/arvados/git/repositories/<b>your_arvados_repo_uuid</b>.git '*:*'</span>