You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

setup_go.mkd 10KB

11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
11 years ago
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140
  1. ## Gitblit GO Installation & Setup
  2. 1. Download and unzip Gitblit GO [${project.releaseVersion} (Windows)](%GCURL%gitblit-${project.releaseVersion}.zip) or [${project.releaseVersion} (Linux/OSX)](%GCURL%gitblit-${project.releaseVersion}.tar.gz).
  3. *Its best to eliminate spaces in the path name.*
  4. 2. The server itself is configured through a simple text file.
  5. Open `data/gitblit.properties` in your favorite text editor and make sure to review and set:
  6. - *server.httpPort* and *server.httpsPort*
  7. - *server.storePassword*
  8. **https** is strongly recommended because passwords are insecurely transmitted form your browser/git client using Basic authentication!
  9. - *git.packedGitLimit* (set larger than the size of your largest repository)
  10. - *git.streamFileThreshold* (set larger than the size of your largest committed file)
  11. 3. Execute `authority.cmd` or `java -cp gitblit.jar com.gitblit.authority.Launcher --baseFolder data` from a command-line
  12. **NOTE:** The Authority is a Swing GUI application. Use of this tool is not required as Gitblit GO will startup and create SSL certificates itself, BUT use of this tool allows you to control the identification metadata used in the generated certificates. Skipping this step will result in certificates with default metadata.
  13. 1. fill out the fields in the *new certificate defaults* dialog
  14. 2. enter the store password used in *server.storePassword* when prompted. This generates an SSL certificate for **localhost**.
  15. 3. you may want to generate an SSL certificate for the hostname or ip address hostnames you are serving from
  16. **NOTE:** You can only have **one** SSL certificate specified for a port.
  17. 5. exit the authority app
  18. 4. Execute `gitblit.cmd` or `java -jar gitblit.jar --baseFolder data` from a command-line
  19. 5. Open your browser to <http://localhost:8080> or <https://localhost:8443> depending on your chosen configuration.
  20. 6. Enter the default administrator credentials: **admin / admin** and click the *Login* button
  21. **NOTE:** Make sure to change the administrator username and/or password!!
  22. ### GO Data Location
  23. By default, Gitblit GO stores all data (users, settings, repositories, etc) in the `data` subfolder of your GO installation. You may specify an external location for your data on the command-line by setting the *--baseFolder* argument. If you relocate the data folder then you must supply the *--baseFolder* argument to both GO and the Certificate Authority.
  24. If you are deploying Gitblit to a *nix platform, you might consider moving the data folder out of the GO installation folder and then creating a symlink named "data" that points to your moved folder.
  25. ### Creating your own Self-Signed SSL Certificate
  26. Gitblit GO (and Gitblit Certificate Authority) automatically generates a Certificate Authority (CA) certificate and an ssl certificate signed by this CA certificate that is bound to *localhost*.
  27. Remote Eclipse/EGit/JGit clients (< 3.0) will fail to communicate using this certificate because JGit always verifies the hostname of the certificate, regardless of the *http.sslVerify=false* client-side setting.
  28. The EGit failure message is something like:
  29. Cannot get remote repository refs.
  30. Reason: https:/myserver.com/git/myrepo.git: cannot open git-upload-pack
  31. If you want to serve your repositories to another machine over https then you will want to generate a new certificate for the hostname or ip address you are serving from.
  32. 1. `authority.cmd` or `java -jar authority.jar --baseFolder data`
  33. 2. Click the *new ssl certificate* button (red rosette in the toolbar in upper left of window)
  34. 3. Enter the hostname or ip address
  35. 4. Make sure the checkbox *serve https with this certificate* is checked
  36. 5. In the keystore password prompt, enter the *server.storePassword* password
  37. If you decide to change the value of *server.storePassword* (recommended) <u>after</u> you have already started Gitblit or Gitblit Certificate Authority, then you will have to delete the following files and then restart the Gitblit Certificate Authority app:
  38. 1. data/serverKeyStore.jks
  39. 2. data/serverTrustStore.jks
  40. 3. data/certs/caKeyStore.jks
  41. 4. data/certs/ca.crt
  42. 5. data/certs/caRevocationList.crl (optional)
  43. ### Client SSL Certificates
  44. SINCE 1.2.0
  45. Gitblit supports X509 certificate authentication. This authentication method relies on your servlet container to validate/verify/trust your client certificate and can be used by your browser and your git client.
  46. All X509 certificates have a *distinguished name (DN)* which is a signature of several fields like:
  47. C=US,O=Gitblit,OU=Gitblit,CN=james
  48. Gitblit must be able to map the DN of the certificate to an *existing* account username. The default mapping is to extract the *common name (CN)* value from the DN and use that as the account name. If the CN is a valid account, then the user is authenticated. The servlet container which runs Gitblit validates, verifies, and trusts the certificate passed to Gitblit. If you need to specify an alternative DN mapping you may do so with the *git.certificateUsernameOIDs* setting, but this mapping must be matched to the user account name.
  49. How do you make your servlet container trust a client certificate?
  50. In the WAR variant, you will have to manually setup your servlet container to:
  51. 1. want/need client certificates
  52. 2. trust a CA certificate used to sign your client certificates
  53. 3. generate client certificates signed by your CA certificate
  54. Alternatively, Gitblit GO is designed to facilitate use of client certificate authentication. Gitblit GO ships with a tool that simplifies creation and management of client certificates, Gitblit Certificate Authority.
  55. #### Creating SSL Certificates with Gitblit Certificate Authority
  56. When you generate a new client certificate, a zip file bundle is created which includes a P12 keystore for browsers and a PEM keystore for Git. Both of these are password-protected. Additionally, a personalized README file is generated with setup instructions for popular browsers and Git. The README is generated from `data\certs\instructions.tmpl` and can be modified to suit your needs.
  57. 1. `authority.cmd` or `java -jar authority.jar --baseFolder data`
  58. 2. Select the user for which to generate the certificate
  59. 3. Click the *new certificate* button and enter the expiration date of the certificate. You must also enter a password for the generated keystore. This password is *not* the same as the user's login password. This password is used to protect the privatekey and public certificate you will generate for the selected user. You must also enter a password hint for the user.
  60. 4. If your mail server settings are properly configured you will have a *send email* checkbox which you can use to immediately send the generated certificate bundle to the user.
  61. #### Certificate Inspection and Advanced Troubleshooting
  62. X509 certificates can be confusing and tricky even with the simplified Gitblit Certificate Authority tool. If you find you need more tooling to understand your keystores, certificates, and certificate revocation lists (CRLs), I highly recommend [Portecle](http://portecle.sourceforge.net) which can be conveniently launched as a [Java Web Start app](http://portecle.sourceforge.net/webstart/portecle.jnlp).
  63. ### Running as a Windows Service
  64. Gitblit uses [Apache Commons Daemon](http://commons.apache.org/daemon) to install and configure its Windows service.
  65. 1. **Review the contents** of the `installService.cmd` where you may have to change the <u>default keystore password</u>.
  66. 2. Set the *ARCH* value as appropriate for your installed Java Virtual Machine.
  67. 3. Add any necessary *--StartParams* as enumerated below in **Command-Line Parameters**.
  68. 4. Execute the script.
  69. After service installation you can use the `gitblitw.exe` utility to control and modify the runtime settings of the service.
  70. Additional service definition options and runtime capabilities of `gitblitw.exe` (prunmgr.exe) are documented [here](http://commons.apache.org/daemon/procrun.html).
  71. **NOTE:**
  72. If you change the name of the service from *gitblit* you must also change the name of `gitblitw.exe` to match the new service name otherwise the connection between the service and the utility is lost, at least to double-click execution.
  73. #### VM Considerations
  74. By default, the service installation script configures your Windows service to use your default JVM. This setup usually defaults to a client VM.
  75. If you have installed a JDK, you might consider using the `gitblitw.exe` utility to manually specify the *server* VM.
  76. 1. Execute `gitblitw.exe`
  77. 2. On the *Java* tab uncheck *Use default*.
  78. 3. Manually navigate your filesystem and specify the server VM with the `...` button
  79. <pre>Java Virtual Machine:
  80. C:\Program Files\Java\jre6\bin\server\jvm.dll</pre>
  81. #### Command-Line Parameters
  82. Command-Line parameters override the values in `gitblit.properties` at runtime.
  83. --baseFolder The default base folder for all relative file reference settings
  84. --repositoriesFolder Git Repositories Folder
  85. --userService Authentication and Authorization Service (filename or fully qualified classname)
  86. --useNio Use NIO Connector else use Socket Connector.
  87. --httpPort HTTP port for to serve. (port <= 0 will disable this connector)
  88. --httpsPort HTTPS port to serve. (port <= 0 will disable this connector)
  89. --ajpPort AJP port to serve. (port <= 0 will disable this connector)
  90. --alias Alias in keystore of SSL cert to use for https serving
  91. --storePassword Password for SSL (https) keystore.
  92. --shutdownPort Port for Shutdown Monitor to listen on. (port <= 0 will disable this monitor)
  93. --tempFolder Folder for server to extract built-in webapp
  94. **Example**
  95. java -jar gitblit.jar --userService c:/myrealm.config --storePassword something --baseFolder c:/data
  96. #### Overriding Gitblit GO's Log4j Configuration
  97. You can override Gitblit GO's default Log4j configuration with a command-line parameter to the JVM.
  98. java -Dlog4j.configuration=file:///home/james/log4j.properties -jar gitblit.jar <optional_gitblit_args>
  99. For reference, here is [Gitblit's default Log4j configuration](https://github.com/gitblit/gitblit/blob/master/src/log4j.properties). It includes some file appenders that are disabled by default.