This is the setup process I use for configuring Gitlab and I2P, with Docker
in place to manage the service itself. Gitlab is very easy to host on I2P in
this fashion, it can be administered by one person without much difficulty. In
my configuration, I use a Debian VM to host docker containers and an I2P router,
on a Debian Host system, however, this may be more than necessary for some
people. These instructions should work on any Debian-based system, regardless of
whether it is in a VM or not, and should easily translate to any system where
Docker and an I2P router are available. This guide starts at Docker and does not
assume any VM underneath.
[big]Dependencies and Docker[/big]
Because Gitlab runs in a container, we only need to install the dependencies
required for the container on our main system. Conveniently, you can install
everything you need with:
Code: Select all
sudo apt install docker.io
"Community" Debian repository, you may use:
Code: Select all
sudo apt install docker-ce
[big]Fetch the Docker Containers[/big]
Once you have docker installed, you can fetch the docker containers required for
gitlab. [cur]Don't run them yet.[/cur]
Code: Select all
docker pull gitlab/gitlab-ce
Ubuntu Docker images as a parent, which are built from scratch images. Since
there are no third-party images involved here, updates should come as soon as
they are available in the host images. To review the Dockerfile for yourself,
visit the Gitlab source code.
[big]Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional steps)[/big]
Gitlab servers inside of I2P can be run with or without the ability to interact
with servers on the internet outside of I2P. In the case where the Gitlab server
is [cur]not allowed[/cur] to interact with servers outside of I2P, they cannot be
de-anonymized by cloning a git repository from a git server on the internet
outside of I2P. They can, however, export and mirror repositories from other git
services inside of I2P.
In the case where the Gitlab server is [cur]allowed[/cur] to interact with servers
outside of I2P, it can act as a "Bridge" for the users, who can use it to mirror
content outside I2P to an I2P-accessible source, however it [cur]is not anonymous[/cur]
in this case. Git services on the non-anonymous internet will be connected to
directly.
If you want to have a bridged, non-anonymous Gitlab instance with access to
web repositories, no further modification is necessary.
If you want to have an I2P-Only Gitlab instance with no access to Web-Only
Repositories, you will need to configure Gitlab to use an I2P HTTP Proxy.
Since the default I2P HTTP proxy only listens on
Code: Select all
127.0.0.1
to set up a new one for Docker that listens on the Host/Gateway address of the
Docker network, which is usually
Code: Select all
172.17.0.1
Code: Select all
4446
[big]Start the Container Locally[/big]
Once you have that set up, you can start the container and publish your Gitlab
instance locally.
Code: Select all
docker run --detach \
--env HTTP_PROXY=http://172.17.0.1:4446 \
--publish 127.0.0.1:8443:443 --publish 127.0.0.1:8080:80 --publish 127.0.0.1:8022:22 \
--name gitlab \
--restart always \
--volume /srv/gitlab/config:/etc/gitlab:Z \
--volume /srv/gitlab/logs:/var/log/gitlab:Z \
--volume /srv/gitlab/data:/var/opt/gitlab:Z \
gitlab/gitlab-ce:latest
password, and configure user account limits to match your resources.
[big]Modify gitlab.rb(Optional, but a good idea for "Bridged non-anonymous" hosts)[/big]
It's also possible to apply your HTTP Proxy settings in a more granular way, so
that you can only allow users to mirror repositories from the domains that you
choose. Since the domain is presumably operated by an organization, you can use
this to ensure that repositories that are mirrorable follow a reasonable set of
policies. After all, there is far more abusive content on the non-anonymous
internet than there is on I2P, we wouldn't want to make it too easy to introduce
abusive content from such a nefarious place.
Add the following lines to your gitlab.rb file inside the /src/gitlab/config
container. These settings will take effect when you restart in a moment.
Code: Select all
gitlab_rails['env'] = {
"http_proxy" => "http://172.17.0.1:4446",
"https_proxy" => "http://172.17.0.1:4446",
"no_proxy" => ".github.com,.gitlab.com"
}
gitaly['env'] = {
"http_proxy" => "http://172.17.0.1:4446",
"https_proxy" => "http://172.17.0.1:4446",
"no_proxy" => "unix,.github.com,.gitlab.com"
}
gitlab_workhorse['env'] = {
"http_proxy" => "http
"https_proxy" => "http://172.17.0.1:4446",
"no_proxy" => "unix,.github.com,.gitlab.com"
}
Once you have Gitlab set up locally, go to the I2P Router console. You will need
to set up two server tunnels, one leading to the Gitlab web(HTTP) interface on
TCP port 8080, and one to the Gitlab SSH interface on TCP Port 8022.
[small]Gitlab Web(HTTP) Interface[/small]
For the Web interface, use an "HTTP" server tunnel. From [http://127.0.0.1:7657/i2ptunnelmgr](http://127.0.0.1:7657/i2ptunnelmgr)
launch the "New Tunnel Wizard" and enter the following values at each step:
- Select "Server Tunnel"
- Select "HTTP Server"
- Fill in "Gitlab Web Service" or otherwise describe the tunnel
- Fill in for the host and
Code: Select all
127.0.0.1
for the port.Code: Select all
8080
- Select "Automatically start tunnel when Router Starts"
- Confirm your selections.
Web services on I2P can register hostnames for themselves by providing an
authentication string to a jump service provider like stats.i2p.
To do this, open the [http://127.0.0.1:7657/i2ptunnelmgr](http://127.0.0.1:7657/i2ptunnelmgr)
again and click on the "Gitlab Web Service" item you just set up. Scroll to the
bottom of the "Edit Server Settings" section and click Registration
Authentication. Copy the field that says "Authentication for adding Hostname"
and visit stats.i2p to add your hostname.
Note that if you want to use a subdomain(Like git.idk.i2p) then you will have
to use the correct authentication string for your subdomain, which is a little
bit more complicated and merits it's own instructions.
[small]Gitlab SSH Interface[/small]
For the SSH interface, use a "Standard" server tunnel. From [http://127.0.0.1:7657/i2ptunnelmgr](http://127.0.0.1:7657/i2ptunnelmgr)
launch the "New Tunnel Wizard" and enter the following values at each step:
- Select "Server Tunnel"
- Select "Standard Server"
- Fill in "Gitlab SSH Service" or otherwise describe the tunnel
- Fill in for the host and
Code: Select all
127.0.0.1
for the port.Code: Select all
8022
- Select "Automatically start tunnel when Router Starts"
- Confirm your selections.
Finally, if you either modified
Code: Select all
gitlab.rb
you will need to re-start the gitlab service for the settings to take effect.
Code: Select all
docker stop gitlab
docker rm gitlab
docker run --detach \
--hostname your.hostname.i2p \
--hostname thisisreallylongbase32hostnamewithfiftytwocharacters.b32.i2p \
--env HTTP_PROXY=http://172.17.0.1:4446 \
--publish 127.0.0.1:8443:443 --publish 127.0.0.1:8080:80 --publish 127.0.0.1:8022:22 \
--name gitlab \
--restart always \
--volume /srv/gitlab/config:/etc/gitlab:Z \
--volume /srv/gitlab/logs:/var/log/gitlab:Z \
--volume /srv/gitlab/data:/var/opt/gitlab:Z \
gitlab/gitlab-ce:latest