BigW Consortium Gitlab

README.md 2.94 KB
Newer Older
1 2
# GitLab Integration

3 4
GitLab integrates with multiple third-party services to allow external issue
trackers and external authentication.
5

6 7
See the documentation below for details on how to configure these services.

8
- [JIRA](../user/project/integrations/jira.md) Integrate with the JIRA issue tracker
9 10
- [External issue tracker](external-issue-tracker.md) Redmine, JIRA, etc.
- [LDAP](ldap.md) Set up sign in via LDAP
11
- [OmniAuth](omniauth.md) Sign in via Twitter, GitHub, GitLab.com, Google, Bitbucket, Facebook, Shibboleth, SAML, Crowd, Azure and Authentiq ID
12
- [SAML](saml.md) Configure GitLab as a SAML 2.0 Service Provider
Douwe Maan committed
13
- [CAS](cas.md) Configure GitLab to sign in using CAS
14
- [OAuth2 provider](oauth_provider.md) OAuth2 application creation
15
- [OpenID Connect](openid_connect_provider.md) Use GitLab as an identity provider
16
- [Gmail actions buttons](gmail_action_buttons_for_gitlab.md) Adds GitLab actions to messages
17
- [reCAPTCHA](recaptcha.md) Configure GitLab to use Google reCAPTCHA for new users
18 19
- [Akismet](akismet.md) Configure Akismet to stop spam
- [Koding](../administration/integration/koding.md) Configure Koding to use IDE integration
20
- [PlantUML](../administration/integration/plantuml.md) Configure PlantUML to use diagrams in AsciiDoc documents.
dosire committed
21

22
> GitLab Enterprise Edition contains [advanced Jenkins support][jenkins].
23

24 25
## Project services

26 27 28
Integration with services such as Campfire, Flowdock, Gemnasium, HipChat,
Pivotal Tracker, and Slack are available in the form of a [Project Service][].

29
[Project Service]: ../user/project/integrations/project_services.md
30

31
## SSL certificate errors
32

33 34 35 36 37 38 39 40 41 42 43 44 45
When trying to integrate GitLab with services that are using self-signed certificates,
it is very likely that SSL certificate errors will occur on different parts of the
application, most likely Sidekiq. There are 2 approaches you can take to solve this:

1. Add the root certificate to the trusted chain of the OS.
1. If using Omnibus, you can add the certificate to GitLab's trusted certificates.

**OS main trusted chain**

This [resource](http://kb.kerio.com/product/kerio-connect/server-configuration/ssl-certificates/adding-trusted-root-certificates-to-the-server-1605.html)
has all the information you need to add a certificate to the main trusted chain.

This [answer](http://superuser.com/questions/437330/how-do-you-add-a-certificate-authority-ca-to-ubuntu)
46
at Super User also has relevant information.
47 48 49

**Omnibus Trusted Chain**

50 51 52 53 54
[Install the self signed certificate or custom certificate authorities](http://docs.gitlab.com/omnibus/common_installation_problems/README.html#using-self-signed-certificate-or-custom-certificate-authorities)
in to GitLab Omnibus.

It is enough to concatenate the certificate to the main trusted certificate
however it may be overwritten during upgrades:
55 56 57 58 59 60 61 62 63 64

```bash
cat jira.pem >> /opt/gitlab/embedded/ssl/certs/cacert.pem
```

After that restart GitLab with:

```bash
sudo gitlab-ctl restart
```
65 66

[jenkins]: http://docs.gitlab.com/ee/integration/jenkins.html