---
layout: default
navsection: installguide
title: Install the API server
...
This installation guide assumes you are on a 64 bit Debian or Ubuntu system.
h2. Install prerequisites
Also make sure you have "Ruby and bundler":install-manual-prerequisites-ruby.html installed.
h2. Download the source tree
~$ cd $HOME # (or wherever you want to install)
~$ git clone https://github.com/curoverse/arvados.git
See also: "Downloading the source code":https://arvados.org/projects/arvados/wiki/Download on the Arvados wiki.
The API server is in @services/api@ in the source tree.
h2. Install gem dependencies
~$ cd arvados/services/api
~/arvados/services/api$ bundle install
h2. Choose your environment
The API server can be run in @development@ or in @production@ mode. Unless this installation is going to be used for development on the Arvados API server itself, you should run it in @production@ mode.
Copy the example environment file for your environment. For example, if you choose @production@:
The API server reads the @config/application.yml@ file, as well as the @config/application.defaults.yml@ file. Values in @config/application.yml@ take precedence over the defaults that are defined in @config/application.defaults.yml@. The @config/application.yml.example@ file is not read by the API server and is provided for installation convenience, only.
Consult @config/application.default.yml@ for a full list of configuration options. Always put your local configuration in @config/application.yml@, never edit @config/application.default.yml@.
h3(#uuid_prefix). uuid_prefix
It is recommended to explicitly define your @uuid_prefix@ in @config/application.yml@, by setting the 'uuid_prefix' field in the section for your environment.
h3(#git_repositories_dir). git_repositories_dir
This field defaults to @/var/lib/arvados/git@. You can override the value by defining it in @config/application.yml@.
Make sure a clone of the arvados repository exists in @git_repositories_dir@.
Then put that value in the @secret_token@ field.
h3. blob_signing_key
If you want access control on your "Keep":install-keep.html server(s), you should set @blob_signing_key@ to the same value as the permission key you provide to your Keepstore daemon(s).
h3. workbench_address
Fill in the url of your workbench application in in @workbench_address@, for example
https://workbench.@prefix_uuid@.your.domain
h3. other options
Consult @application.default.yml@ for a full list of configuration options. Always put your local configuration in @application.yml@ instead of editing @application.default.yml@.
h2. Set up the database
Generate a new database password. Nobody ever needs to memorize it or type it, so we'll make a strong one:
Create a new database user with permission to create its own databases.
~/arvados/services/api$ sudo -u postgres createuser --createdb --encrypted --pwprompt arvados
[sudo] password for you: yourpassword
Enter password for new role: paste-password-you-generated
Enter it again: paste-password-again
Shall the new role be a superuser? (y/n) n
Shall the new role be allowed to create more new roles? (y/n) n
Configure API server to connect to your database by creating and updating @config/database.yml@. Replace the @xxxxxxxx@ database password placeholders with the new password you generated above.
Alternatively, if the database user you intend to use for the API server is not allowed to create new databases, you can create the database first and then populate it with rake. Be sure to adjust the database name if you are using the @development@ environment. This sequence of commands is functionally equivalent to the rake db:setup command above.
Edit @config/initializers/omniauth.rb@, and tell your api server to use the Curoverse SSO server for authentication. Use the @APP_SECRET@ specified in the snippet below.
You can also run your own SSO server. However, the SSO server codebase currently uses OpenID 2.0 to talk to Google's authentication service. Google has deprecated that protocol. This means that new clients will not be allowed to talk to Google's authentication services anymore over OpenID 2.0, and they will phase out the use of OpenID 2.0 completely in the coming monts. We are working on upgrading the SSO server codebase to a newer protocol. That work should be complete by the end of November 2014. In the mean time, anyone is free to use the existing Curoverse SSO server for any local Arvados installation.
h2. Start the API server
h3. Development environment
If you plan to run in development mode, you can now run the development server this way:
~/arvados/services/api$ bundle exec rails server --port=3030
h3. Production environment
We recommend "Passenger":https://www.phusionpassenger.com/ to run the API server in production.
Point it to the services/api directory in the source tree.
To enable streaming so users can monitor crunch jobs in real time, make sure to add the following to your Passenger configuration: