6
1
mirror of https://git.mills.io/saltyim/saltyim.git synced 2024-06-28 17:51:04 +00:00
prologic-saltyim/infrastructure
2022-03-21 01:16:31 +10:00
..
msgbus Update README and add docs for Infrastructure setup 2022-03-21 01:16:31 +10:00
static Update README and add docs for Infrastructure setup 2022-03-21 01:16:31 +10:00
traefik Update README and add docs for Infrastructure setup 2022-03-21 01:16:31 +10:00
README.md Update README and add docs for Infrastructure setup 2022-03-21 01:16:31 +10:00

SALTY.IM Infrastructure

To make this work well, you'll need a few pieces of infrastructure up and running. After all, this is a fully self-hosted and decentralised system :-)

Traefik

  • Before you bootstrap Traefik, you'll need to ensure you have docker and docker-compose installed and that your user on your server is in the docker group.

  • You'll need to first create a network called proxy which will bind the docker network to the onboard interface of the system. this is an external bridge that allows interface communications between the host and the container network. docker network create proxy

  • Visit config/traefik.yml and change your email address to whatever is relevant for your domain

  • Visit your DNS registrar and point the following to your server IP as A records:

    • traefik.example.com -> your server ip
    • example.com -> your server ip
    • msgbus.example.com -> your server ip
  • Give DNS a bit to propagate, but should be fairly quick.

  • cd traefik and run docker-compose up -d and watch the logs with docker-compose logs -f you should see configuration loaded from traefik.yml and it should reach out to letsencrypt to generate a tls cert which is stored in letsencrypt/acme.json this file should be chmod 0600

  • If all goes well you can visit https://traefik.example.com and enter your http-basic-auth credentials that we've generated for you here admin/saltyim and see the dashboard for the reverse proxy

  • That's about it for Traefik, so let's move on!