Git is a distributed version control system, which means you can work locally
Git is a distributed version control system, which means you can work locally.
but you can also share or "push" your changes to other servers.
In addition, you can also share or "push" your changes to other servers.
Before you can push your changes to a GitLab server
GitLab supports secure communication between Git and its servers using SSH keys.
you need a secure communication channel for sharing information.
The SSH protocol provides this security and allows you to authenticate to the
The SSH protocol provides this security and allows you to authenticate to the
GitLab remote server without supplying your username or password each time.
GitLab remote server without supplying your username or password each time.
For a more detailed explanation of how the SSH protocol works, read
This page can help you configure secure SSH keys which you can use to help secure
[this nice tutorial by DigitalOcean](https://www.digitalocean.com/community/tutorials/understanding-the-ssh-encryption-and-connection-process).
connections to GitLab repositories.
- If you need information on creating SSH keys, start with our [options for SSH keys](#options-for-ssh-keys).
- If you have SSH keys dedicated for your GitLab account, you may be interested in [Working with non-default SSH key pair paths](#working-with-non-default-ssh-key-pair-paths).
- If you already have an SSH key pair, you can go to how you can [add an SSH key to your GitLab account](#adding-an-ssh-key-to-your-gitlab-account).
## Requirements
## Requirements
The only requirement is to have the OpenSSH client installed on your system. This
To support SSH, GitLab requires the installation of the OpenSSH client, which
comes pre-installed on GNU/Linux and macOS, but not on Windows.
comes pre-installed on GNU/Linux and macOS, but not on Windows.
Depending on your Windows version, there are different methods to work with
Make sure that your system includes SSH version 6.5 or newer, as that excludes
SSH keys.
the now insecure MD5 signature scheme. The following command returns the version of
SSH installed on your system:
### Windows 10: Windows Subsystem for Linux
```shell
ssh -V
```
Starting with Windows 10, you can
While GitLab does [not support installation on Microsoft Windows](../install/requirements.md#microsoft-windows),
[install the Windows Subsystem for Linux (WSL)](https://docs.microsoft.com/en-us/windows/wsl/install-win10)
you can set up SSH keys to set up Windows [as a client](#options-for-microsoft-windows).
where you can run Linux distributions directly on Windows, without the overhead
of a virtual machine. Once installed and set up, you'll have the Git and SSH
clients at your disposal.
### Windows 10, 8.1, and 7: Git for Windows
## Options for SSH keys
The easiest way to install Git and the SSH client on Windows 8.1 and Windows 7
GitLab supports the use of RSA, DSA, ECDSA, and ED25519 keys.
is [Git for Windows](https://gitforwindows.org). It provides a Bash
emulation (Git Bash) used for running Git from the command line and the
`ssh-keygen` command that is useful to create SSH keys as you'll learn below.
NOTE: **Alternative tools:**
- GitLab has [deprecated](https://about.gitlab.com/releases/2018/06/22/gitlab-11-0-released/#support-for-dsa-ssh-keys) DSA keys in GitLab 11.0.
Although not explored in this page, you can use some alternative tools.
- As noted in [Practical Cryptography With Go](https://leanpub.com/gocrypto/read#leanpub-auto-ecdsa), the security issues related to DSA also apply to ECDSA.
[Cygwin](https://www.cygwin.com) is a large collection of GNU and open source
tools which provide functionality similar to a Unix distribution.
provides a graphical user interface to [create SSH keys](https://tartarus.org/~simon/putty-snapshots/htmldoc/Chapter8.html#pubkey-puttygen).
## Types of SSH keys and which to choose
TIP: **Tip:**
Available documentation suggests that ED25519 is more secure. If you use an RSA key, the US National Institute of Science and Technology in [Publication 800-57 Part 3 (PDF)](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf) recommends a key size of at least 2048 bits.
GitLab supports RSA, DSA, ECDSA, and ED25519 keys. Their difference lies on
Therefore, our documentation focuses on the use of ED25519 and RSA keys.
the signing algorithm, and some of them have advantages over the others. For
more information, you can read this
[nice article on ArchWiki](https://wiki.archlinux.org/index.php/SSH_keys#Choosing_the_authentication_key_type).
We'll focus on ED25519 and RSA here.
NOTE: **Note:**
Administrators can [restrict which keys should be permitted and their minimum lengths](../security/ssh_keys_restrictions.md).
As an admin, you can [restrict which keys should be permitted and their minimum length](../security/ssh_keys_restrictions.md).
By default, all keys are permitted, which is also the case for
Now, it's time to add the newly created public key to your GitLab account.
NOTE: **Note:**
As noted in the `ssh-keygen` man page, ED25519 already encrypts keys to the more secure
OpenSSH format.
## Adding an SSH key to your GitLab account
## Adding an SSH key to your GitLab account
1. Copy your **public** SSH key to the clipboard by using one of the commands below
Now you can copy the SSH key you created to your GitLab account. To do so, follow these steps:
depending on your Operating System:
1. Copy your **public** SSH key to a location that saves information in text format.
The following options saves information for ED25519 keys to the clipboard
for the noted operating system:
**macOS:**
**macOS:**
...
@@ -163,7 +197,7 @@ Now, it's time to add the newly created public key to your GitLab account.
...
@@ -163,7 +197,7 @@ Now, it's time to add the newly created public key to your GitLab account.
pbcopy < ~/.ssh/id_ed25519.pub
pbcopy < ~/.ssh/id_ed25519.pub
```
```
**WSL / GNU/Linux (requires the xclip package):**
**Linux (requires the xclip package):**
```shell
```shell
xclip -sel clip < ~/.ssh/id_ed25519.pub
xclip -sel clip < ~/.ssh/id_ed25519.pub
...
@@ -175,25 +209,24 @@ Now, it's time to add the newly created public key to your GitLab account.
...
@@ -175,25 +209,24 @@ Now, it's time to add the newly created public key to your GitLab account.
cat ~/.ssh/id_ed25519.pub | clip
cat ~/.ssh/id_ed25519.pub | clip
```
```
You can also open the key in a graphical editor and copy it from there,
If you're using an RSA key, substitute accordingly.
but be careful not to accidentally change anything.
NOTE: **Note:**
If you opted to create an RSA key, the name might differ.
1. Add your **public** SSH key to your GitLab account by:
1. Navigate to `http://gitlab.com` and sign in.
1. Clicking your avatar in the upper right corner and selecting **Settings**.
1. Select your avatar in the upper right corner, and click **Settings**
1. Navigating to **SSH Keys** and pasting your **public** key from the clipboard into the **Key** field. If you:
1. Click **SSH Keys**.
- Created the key with a comment, this will appear in the **Title** field.
1. Paste the public key that you copied into the **Key** text box.
- Created the key without a comment, give your key an identifiable title like _Work Laptop_ or _Home Workstation_.
1. Make sure your key includes a descriptive name in the **Title** text box, such as _Work Laptop_ or
1. Choose an (optional) expiry date for the key under "Expires at" section. (Introduced in [GitLab 12.9](https://gitlab.com/gitlab-org/gitlab/-/issues/36243))
_Home Workstation_.
1. Click the **Add key** button.
1. Include an (optional) expiry date for the key under "Expires at" section. (Introduced in [GitLab 12.9](https://gitlab.com/gitlab-org/gitlab/-/issues/36243).)
1. Click the **Add key** button.
SSH keys that have "expired" using this procedure will still be valid in GitLab workflows. As the GitLab-configured expiration date is not included in the SSH key itself, you can still export public SSH keys as needed.
SSH keys that have "expired" using this procedure will still be valid in GitLab workflows.
As the GitLab-configured expiration date is not included in the SSH key itself,
you can still export public SSH keys as needed.
NOTE: **Note:**
NOTE: **Note:**
If you manually copied your public SSH key make sure you copied the entire
If you manually copied your public SSH key make sure you copied the entire
key starting with `ssh-ed25519` (or `ssh-rsa`) and ending with your email.
key starting with `ssh-ed25519` (or `ssh-rsa`) and ending with your email address.
## Testing that everything is set up correctly
## Testing that everything is set up correctly
...
@@ -205,7 +238,7 @@ ssh -T git@gitlab.com
...
@@ -205,7 +238,7 @@ ssh -T git@gitlab.com
```
```
The first time you connect to GitLab via SSH, you will be asked to verify the
The first time you connect to GitLab via SSH, you will be asked to verify the
authenticity of the GitLab host you are connecting to.
authenticity of the GitLab host that you're connecting to.
For example, when connecting to GitLab.com, answer `yes` to add GitLab.com to
For example, when connecting to GitLab.com, answer `yes` to add GitLab.com to
the list of trusted hosts:
the list of trusted hosts:
...
@@ -219,35 +252,34 @@ Warning: Permanently added 'gitlab.com' (ECDSA) to the list of known hosts.
...
@@ -219,35 +252,34 @@ Warning: Permanently added 'gitlab.com' (ECDSA) to the list of known hosts.
to make sure you're connecting to the correct server.
section to make sure you're connecting to the correct server. For example, you'll see
the ECDSA key fingerprint shown above in the linked section.
Once added to the list of known hosts, you won't be asked to validate the
Once added to the list of known hosts, you won't be asked to validate the
authenticity of GitLab's host again. Run the above command once more, and
authenticity of GitLab's host again. Run the above command once more, and
you should only receive a _Welcome to GitLab, `@username`!_ message.
you should only receive a _Welcome to GitLab, `@username`!_ message.
If the welcome message doesn't appear, run SSH's verbose mode by replacing `-T`
If the welcome message doesn't appear, you can troubleshoot the problem by running `ssh`
with `-vvvT` to understand where the error is.
in verbose mode with the following command:
```shell
ssh -Tvvv git@gitlab.com
```
## Working with non-default SSH key pair paths
## Working with non-default SSH key pair paths
If you used a non-default file path for your GitLab SSH key pair,
If you used a non-default file path for your GitLab SSH key pair,
you must configure your SSH client to find your GitLab private SSH key
configure your SSH client to point to your GitLab private SSH key.
for connections to GitLab.
Open a terminal and use the following commands
To make these changes, run the following commands:
(replacing `other_id_rsa` with your private SSH key):
```shell
```shell
eval $(ssh-agent -s)
eval $(ssh-agent -s)
ssh-add ~/.ssh/other_id_rsa
ssh-add <pathtoprivateSSHkey>
```
```
To retain these settings, you'll need to save them to a configuration file.
Now save these settings to the `~/.ssh/config` file. Two examples
For OpenSSH clients this is configured in the `~/.ssh/config` file. In this
for SSH keys dedicated to GitLab are shown here:
file you can set up configurations for multiple hosts, like GitLab.com, your
own GitLab instance, GitHub, Bitbucket, etc.
Below are two example host configurations using their own SSH key:
```conf
```conf
# GitLab.com
# GitLab.com
...
@@ -441,7 +473,6 @@ to this section if your server is configured like this, e.g.:
...
@@ -441,7 +473,6 @@ to this section if your server is configured like this, e.g.:
```shell
```shell
$ gitlab-rake gitlab:check
$ gitlab-rake gitlab:check
# ...
Git user has default SSH configuration? ... no
Git user has default SSH configuration? ... no
Try fixing it:
Try fixing it:
mkdir ~/gitlab-check-backup-1504540051
mkdir ~/gitlab-check-backup-1504540051
...
@@ -455,6 +486,19 @@ Git user has default SSH configuration? ... no
...
@@ -455,6 +486,19 @@ Git user has default SSH configuration? ... no
Remove the custom configuration as soon as you're able to. These customizations
Remove the custom configuration as soon as you're able to. These customizations
are *explicitly not supported* and may stop working at any time.
are *explicitly not supported* and may stop working at any time.
### Options for Microsoft Windows
If you're running Windows 10, the [Windows Subsystem for Linux (WSL)](https://docs.microsoft.com/en-us/windows/wsl/install-win10), and its latest [WSL 2](https://docs.microsoft.com/en-us/windows/wsl/wsl2-install) version,
support the installation of different Linux distributions, which include the Git and SSH clients.
For current versions of Windows, you can also install the Git and SSH clients with