With the platform, you can easily deploy your application from any remote public or private GIT/SVN repository for each of the supported programming languages: Java, PHP, Ruby, Python, and Node.js.
In order to achieve more security, you can also access your private GIT repositories via SSH and easily clone and update your applications from them. In addition, this gives you the ability to work with those repositories, which are located at the private servers, instead of common web-based hosting services for projects like GitHub, GitLab, Bitbucket, etc.
For accessing your private GIT repository using the secured SSH protocol, follow the simple steps below:
To start with, you need to create an SSH key pair (i.e. two related keys: private and public) for binding your GIT repository to the PaaS account. Follow the Generate SSH Key instruction if you’ve never generated a keychain before.
Note: Your keys must not contain password protection (passphrase) in order to be used for establishing a connection between the platform and GIT accounts.
Once you’ve got a pair of generated SSH keys, let’s place each of them in the appropriate systems. First of all, you need to add your private key to the PaaS account.
Note: If you’ve received an error while adding the key, make sure it is not protected with a passphrase. Otherwise, remove the protection and try again.
You are always able to delete your keys if they aren’t needed anymore - just click the appropriate red cross button. The key’s deletion from the manager won’t remove it from the existing GIT projects in the platform. Therefore, you will be able to continue working with them in the same way as before.
After your private key has been uploaded to your PaaS account, it’s time to adjust your GIT repository account.
If your GIT repository is located at the remote private server, just upload the appropriate SSH public key and add it to the list of authorized ones.
In case you are using some web-based projects' hosting service, follow the corresponding detailed step-by-step guide below. As an example, we’ll pay attention to the three most popular services:
Paste your public SSH key to the Key input field, set a Title for your key (e.g. jelastic-sshkey), and click Add SSH key.
Confirm the addition by means of typing the password for your GitHub account in the opened frame and selecting the appropriate button.
Check your newly added key has appeared in the same SSH keys tab.
Note: The expiration date is informational only and does not prevent you from using the key. For example, it can be used by administrators to keep keys rotating.
Click the Add key button.
Log in to the Bitbucket account using your credentials and choose the Manage Account option from the user’s settings menu at the top right corner of the page.
Once the account settings page is opened, switch to the SSH keys tab (inside the Security section) using the left-hand categories list. Then, select Add key within the central part of the page.
In the appeared frame, paste your public SSH key to the Key input field, set a Label for your key (e.g. jelastic-sshkey), and click the Add key button.
Check your newly added key has appeared in the same SSH keys tab.
Finally, now you can proceed to your project’s deployment via the secured connection.
Click Add to save your project information.
In the opened window, you need to specify the deployment target and some additional configs:
Environment - chose a target environment from the list
Note: For Java-based environments, you need to additionally select a build node.
When all the data is entered, click Deploy to proceed and wait until your project is successfully deployed.
That’s all! Enjoy the highly protected interaction with any version control system - clone and update your projects, hosted at the platform, directly from your private GIT repositories via SSH.