--- layout: default navsection: installguide title: Install the API server ... This installation guide assumes you are on a 64 bit Debian or Ubuntu system. h2. Install prerequisites
~$ sudo apt-get install \
    bison build-essential gettext libcurl3 libcurl3-gnutls \
    libcurl4-openssl-dev libpcre3-dev libpq-dev libreadline-dev \
    libssl-dev libxslt1.1 postgresql sudo wget zlib1g-dev
Also make sure you have "Ruby and bundler":install-manual-prerequisites-ruby.html installed. h2. Download the source tree
~$ cd $HOME # (or wherever you want to install)
~$ git clone https://github.com/curoverse/arvados.git
See also: "Downloading the source code":https://arvados.org/projects/arvados/wiki/Download on the Arvados wiki. The API server is in @services/api@ in the source tree. h2. Install gem dependencies
~$ cd arvados/services/api
~/arvados/services/api$ bundle install
h2. Choose your environment The API server can be run in @development@ or in @production@ mode. Unless this installation is going to be used for development on the Arvados API server itself, you should run it in @production@ mode. Copy the example environment file for your environment. For example, if you choose @production@:
~/arvados/services/api$ cp -i config/environments/production.rb.example config/environments/production.rb
h2. Configure the API server First, copy the example configuration file:
~/arvados/services/api$ cp -i config/application.yml.example config/application.yml
The API server reads the @config/application.yml@ file, as well as the @config/application.defaults.yml@ file. Values in @config/application.yml@ take precedence over the defaults that are defined in @config/application.defaults.yml@. The @config/application.yml.example@ file is not read by the API server and is provided for installation convenience, only. Consult @config/application.default.yml@ for a full list of configuration options. Always put your local configuration in @config/application.yml@, never edit @config/application.default.yml@. h3(#uuid_prefix). uuid_prefix It is recommended to explicitly define your @uuid_prefix@ in @config/application.yml@, by setting the 'uuid_prefix' field in the section for your environment. h3(#git_repositories_dir). git_repositories_dir This field defaults to @/var/lib/arvados/git@. You can override the value by defining it in @config/application.yml@. Make sure a clone of the arvados repository exists in @git_repositories_dir@.
~/arvados/services/api$ sudo mkdir -p /var/lib/arvados/git
~/arvados/services/api$ sudo git clone --bare ../../.git /var/lib/arvados/git/arvados.git
h3. secret_token Generate a new secret token for signing cookies:
~/arvados/services/api$ rake secret
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
Then put that value in the @secret_token@ field. h3. blob_signing_key If you want access control on your "Keep":install-keep.html server(s), you should set @blob_signing_key@ to the same value as the permission key you provide to your Keepstore daemon(s). h3. workbench_address Fill in the url of your workbench application in in @workbench_address@, for example   https://workbench.@prefix_uuid@.your.domain h3. other options Consult @application.default.yml@ for a full list of configuration options. Always put your local configuration in @application.yml@ instead of editing @application.default.yml@. h2. Set up the database Generate a new database password. Nobody ever needs to memorize it or type it, so we'll make a strong one:
~/arvados/services/api$ ruby -e 'puts rand(2**128).to_s(36)'
6gqa1vu492idd7yca9tfandj3
Create a new database user with permission to create its own databases.
~/arvados/services/api$ sudo -u postgres createuser --createdb --encrypted --pwprompt arvados
[sudo] password for you: yourpassword
Enter password for new role: paste-password-you-generated
Enter it again: paste-password-again
Shall the new role be a superuser? (y/n) n
Shall the new role be allowed to create more new roles? (y/n) n
Configure API server to connect to your database by creating and updating @config/database.yml@. Replace the @xxxxxxxx@ database password placeholders with the new password you generated above.
~/arvados/services/api$ cp -i config/database.yml.sample config/database.yml
~/arvados/services/api$ edit config/database.yml
Create and initialize the database. If you are planning a production system, choose the @production@ rails environment, otherwise use @development@.
~/arvados/services/api$ RAILS_ENV=production bundle exec rake db:setup
Alternatively, if the database user you intend to use for the API server is not allowed to create new databases, you can create the database first and then populate it with rake. Be sure to adjust the database name if you are using the @development@ environment. This sequence of commands is functionally equivalent to the rake db:setup command above.
~/arvados/services/api$ su postgres createdb arvados_production -E UTF8 -O arvados
~/arvados/services/api$ RAILS_ENV=production bundle exec rake db:structure:load
~/arvados/services/api$ RAILS_ENV=production bundle exec rake db:seed

Note!

You can safely ignore the following error message you may see when loading the database structure:
ERROR:  must be owner of extension plpgsql
h2. Set up omniauth First copy the omniauth configuration file:
~/arvados/services/api$ cp -i config/initializers/omniauth.rb.example config/initializers/omniauth.rb
Edit @config/initializers/omniauth.rb@, and tell your api server to use the Curoverse SSO server for authentication. Use the @APP_SECRET@ specified in the snippet below.
APP_ID = 'local_docker_installation'
APP_SECRET = 'yohbai4eecohshoo1Yoot7tea9zoca9Eiz3Tajahweo9eePaeshaegh9meiye2ph'
CUSTOM_PROVIDER_URL = 'https://auth.curoverse.com'

Note!

You can also run your own SSO server. However, the SSO server codebase currently uses OpenID 2.0 to talk to Google's authentication service. Google has deprecated that protocol. This means that new clients will not be allowed to talk to Google's authentication services anymore over OpenID 2.0, and they will phase out the use of OpenID 2.0 completely in the coming monts. We are working on upgrading the SSO server codebase to a newer protocol. That work should be complete by the end of November 2014. In the mean time, anyone is free to use the existing Curoverse SSO server for any local Arvados installation.

h2. Start the API server h3. Development environment If you plan to run in development mode, you can now run the development server this way:
~/arvados/services/api$ bundle exec rails server --port=3030
h3. Production environment We recommend "Passenger":https://www.phusionpassenger.com/ to run the API server in production. Point it to the services/api directory in the source tree. To enable streaming so users can monitor crunch jobs in real time, make sure to add the following to your Passenger configuration:
PassengerBufferResponse off