Open terminal & run the following command to create users, We will now create couple of users to access the SVN server via http. $ sudo systemctl restart apache2 Step 5 – Creating SVN user accounts Save the file by pressing ‘CTRL+X’ & restart the apache service to implement the changes made, DAV svn SVNParentPath /var/www/svn AuthType Basic AuthName "SVN Repo" AuthUserFile /etc/svnusers Require valid-user $ sudo nano /etc/apache2/mods-enabled/dav_svn.conf Next open the Apache svn config file, which for Ubuntu is located at following location “/etc/apache2/mods-enabled/dav_svn.conf” , $ sudo a2enmod dav $ sudo a2enmod dav_svn To enable the module in apache, we need not make any file entries rather we need to execute the following command from our terminal, Next step is to restart the apache service to implement the changes.
DAV svn SVNParentPath /var/www/svn AuthType Basic AuthName "SVN Repo” AuthUserFile /etc/svnusers Require valid-user LoadModule authz_svn_module modules/mod_authz_svn.so LoadModule dav_svn_module modules/mod_dav_svn.so LoadModule dontdothat_module modules/mod_dontdothat.so
& make the following entries into the file, Next, you can check out the following blogs on the Jenkins agent setup.$ sudo vi /etc/httpd//nf
In this Jenkins tutorial, you have learned how to run Jenkins on HTTPS. Now you should be able to access Jenkins over HTTPS with port 8443 You can also use curl to verify SSL curl -k Conclusion sudo systemctl status jenkins Step 6: Validate SSL sudo systemctl restart jenkinsĬheck Jenkins status. Save the configuration and restart Jenkins. JENKINS_HTTPS_KEYSTORE="/etc/jenkins/jenkins.jks" Note: Replace your-keystore-password with the Keystore password, you set in step 3 JENKINS_PORT="-1" Open the file sudo vi /etc/sysconfig/jenkinsįind and replace the values in the file as shown below. All the SSL-based configurations go into this file. chown -R jenkins: /etc/jenkinsĬhmod 600 /etc/jenkins/jenkins.jks Step 5: Modify Jenkins Configuration for SSLĪll the key Jenkins startup configurations are present in /etc/sysconfig/jenkins file. mkdir -p /etc/jenkinsĬhange the permissions of the keys and folder. Let’s create a folder and move the jenkins.jks key to that location. Jenkins.jks file should be saved in a specific location where Jenkins can access it. You should see a file named jenkins.jks in you current location. destkeystore jenkins.jks -deststorepass 'your-secret-password' \ srcstorepass 'your-secret-password' -srcstoretype PKCS12 \ Keytool -importkeystore -srckeystore jenkins.p12 \ -destalias – Replace with a destination alias name.-deststorepass – Replace with a strong password.
-srcstorepass – Password used in Step 3.Replace the following with your own values. Use the following keytool command to convert jenkins.p12 file to JKS format. in server.crt -certfile ca.crt -name Step 3: Convert PKCS12 to JKS format passout 'pass:your-strong-password' -inkey server.key \ Openssl pkcs12 -export -out jenkins.p12 \ Replace your-strong-password with a strong password.Replace in the command with your own alias name.Make sure you have the following certs with you before executing the command. The command given below converts SSL certs to intermediate PKCS12 format named jenkins.p12. pfx format, you don’t have to do this conversion.
Note: If you already have the certificate in. Step 2: Convert SSL keys to PKCS12 format But these certificates have to be renewed every three months.