2020-01-30 18:39:56 +00:00
# Skynet Portal Setup Scripts
This directory contains a setup guide and scripts that will install and
configure some basic requirements for running a Skynet Portal. The assumption is
that we are working with a Debian Buster Minimal system or similar.
2020-02-18 16:25:03 +00:00
## Initial Setup
2020-06-22 09:54:01 +00:00
You may want to fork this repository and replace ssh keys in
`setup-scripts/support/authorized_keys` and optionally edit the `setup-scripts/support/tmux.conf` and `setup-scripts/support/bashrc` configurations to fit your needs.
### Step 0: stack overview
- dockerized services inside `docker-compose.yml`
2020-07-08 12:09:54 +00:00
- [sia ](https://sia.tech ) ([docker hub](https://hub.docker.com/r/nebulouslabs/sia)): storage provider, heart of the portal setup
- [caddy ](https://caddyserver.com ) ([docker hub](https://hub.docker.com/r/caddy/caddy)): reverse proxy (similar to nginx) that handles ssl out of a box and acts as a transparent entry point
- [openresty ](https://openresty.org ) ([docker hub](https://hub.docker.com/r/openresty/openresty)): nginx custom build, acts as a cached proxy to siad and exposes all api endpoints
2020-09-14 13:57:44 +00:00
- [health-check ](https://github.com/NebulousLabs/skynet-webportal/tree/master/packages/health-check ): simple service that runs periodically and collects health data about the server (status and response times) - [read more ](https://github.com/NebulousLabs/skynet-webportal/blob/master/packages/health-check/README.md )
- [handshake ](https://handshake.org ) ([github](https://github.com/handshake-org/hsd)): full handshake node
- [handshake-api ](https://github.com/NebulousLabs/skynet-webportal/tree/master/packages/handshake-api ): simple API talking to the handshake node - [read more ](https://github.com/NebulousLabs/skynet-webportal/blob/master/packages/handshake-api/README.md )
2021-06-17 12:40:02 +00:00
- [website ](https://github.com/NebulousLabs/skynet-webportal/tree/master/packages/website ): portal frontend application - [read more ](https://github.com/NebulousLabs/skynet-webportal/blob/master/packages/website/README.md )
2021-04-01 13:15:37 +00:00
- [kratos ](https://www.ory.sh/kratos/ ): user account management system
- [oathkeeper ](https://www.ory.sh/oathkeeper/ ): identity and access proxy
2020-06-22 09:54:01 +00:00
- discord integration
- [funds-checker ](funds-checker.py ): script that checks wallet balance and sends status messages to discord periodically
2020-09-14 13:57:44 +00:00
- [health-checker ](health-checker.py ): script that monitors health-check service for server health issues and reports them to discord periodically
2020-06-22 09:54:01 +00:00
- [log-checker ](log-checker.py ): script that scans siad logs for critical errors and reports them to discord periodically
2020-11-13 16:29:40 +00:00
- [blocklist-skylink ](../scripts/blocklist-skylink.sh ): script that can be run locally from a machine that has access to all your skynet portal servers that blocklists provided skylink and prunes nginx cache to ensure it's not available any more (that is a bit much but that's the best we can do right now without paid nginx version) - if you want to use it, make sure to adjust the server addresses
2020-06-22 09:54:01 +00:00
### Step 1: setting up server user
1. SSH in a freshly installed Debian machine on a user with sudo access (can be root)
2021-05-11 09:26:11 +00:00
1. `apt-get update && apt-get install sudo libnss3-tools -y` to make sure `sudo` is available
2020-06-22 09:54:01 +00:00
1. `adduser user` to create user called `user` (creates `/home/user` directory)
2020-09-14 13:57:44 +00:00
1. `usermod -aG sudo user` to add this new user to sudo group
2021-04-06 16:12:24 +00:00
1. `sudo groupadd docker` to create a group for docker (it might already exist)
1. `sudo usermod -aG docker user` to add your user to that group
2020-06-22 09:54:01 +00:00
1. Quit the ssh session with `exit` command
2020-01-31 19:16:11 +00:00
2021-05-11 09:26:11 +00:00
You can now ssh into your machine as the user `user` .
2020-01-31 19:16:11 +00:00
2020-06-22 09:54:01 +00:00
### Step 2: setting up environment
1. On your local machine: `ssh-copy-id user@ip-addr` to copy over your ssh key to server
1. On your local machine: `ssh user@ip-addr` to log in to server as user `user`
1. You are now logged in as `user`
**Following step will be executed on remote host logged in as a `user` :**
2020-09-14 13:57:44 +00:00
1. `sudo apt-get install git -y` to install git
2021-04-20 09:09:01 +00:00
1. `git clone https://github.com/SkynetLabs/skynet-webportal`
1. `cd skynet-webportal`
2020-06-22 09:54:01 +00:00
1. run setup scripts in the exact order and provide sudo password when asked (if one of them fails, you can retry just this one before proceeding further)
1. `/home/user/skynet-webportal/setup-scripts/setup-server.sh`
1. `/home/user/skynet-webportal/setup-scripts/setup-docker-services.sh`
1. `/home/user/skynet-webportal/setup-scripts/setup-health-check-scripts.sh` (optional)
### Step 3: configuring siad
2020-07-08 12:09:54 +00:00
At this point we have almost everything running, we just need to set up your wallet and allowance:
2020-06-22 09:54:01 +00:00
2021-05-11 09:26:11 +00:00
1. Create a new wallet (remember to save the seed)
2020-07-08 12:09:54 +00:00
> `docker exec -it sia siac wallet init`
2021-05-11 09:26:11 +00:00
1. Unlock the wallet (use the seed as password)
2020-07-08 12:09:54 +00:00
> `docker exec -it sia siac wallet unlock`
2021-05-11 09:26:11 +00:00
1. Generate a new wallet address (save it for later to transfer the funds)
2020-07-08 12:09:54 +00:00
> `docker exec -it sia siac wallet address`
1. Set up allowance
> `docker exec -it sia siac renter setallowance`
2020-07-28 11:22:07 +00:00
1. 10 KS (keep 25 KS in your wallet)
1. default period
1. default number of hosts
2020-10-30 12:38:17 +00:00
1. 4 week renewal time
2020-07-28 11:22:07 +00:00
1. 500 GB expected storage
1. 500 GB expected upload
1. 5 TB expected download
1. default redundancy
2021-05-11 09:26:11 +00:00
1. Set a maximum storage price
> `docker exec -it sia siac renter setallowance --max-storage-price 100SC`
2020-07-08 12:09:54 +00:00
1. Instruct siad to start making 10 contracts per block with many hosts to potentially view the whole network's files
> `docker exec -it sia siac renter setallowance --payment-contract-initial-funding 10SC`
2020-06-22 09:54:01 +00:00
### Step 4: configuring docker services
1. edit `/home/user/skynet-webportal/.env` and configure following environment variables
2021-04-20 09:09:01 +00:00
2021-04-20 09:56:06 +00:00
- `SSL_CERTIFICATE_STRING` is a list of comma separated paths that caddy will generate ssl certificates for
- `EMAIL_ADDRESS` is your email address used for communication regarding SSL certification (required if you're using http-01 challenge)
- `SIA_WALLET_PASSWORD` is your wallet password (or seed if you did not set a password)
- `HSD_API_KEY` this is a random security key for a handshake integration that gets generated automatically
2020-07-28 11:22:07 +00:00
- `CLOUDFLARE_AUTH_TOKEN` (optional) if using cloudflare as dns loadbalancer (need to change it in Caddyfile too)
- `AWS_ACCESS_KEY_ID` (optional) if using route53 as a dns loadbalancer
- `AWS_SECRET_ACCESS_KEY` (optional) if using route53 as a dns loadbalancer
2021-04-20 11:08:24 +00:00
- `PORTAL_NAME` a string representing name of your portal e.g. `siasky.xyz` or `my skynet portal`
2021-07-16 11:12:58 +00:00
- `DISCORD_WEBHOOK_URL` (required if using Discord notifications) discord webhook url (generate from discord app)
- `DISCORD_MENTION_USER_ID` (optional) add `/cc @user` mention to important messages from webhook (has to be id not user name)
- `DISCORD_MENTION_ROLE_ID` (optional) add `/cc @role` mention to important messages from webhook (has to be id not role name)
2021-04-01 13:15:37 +00:00
- `SKYNET_DB_USER` (optional) if using `accounts` this is the MongoDB username
- `SKYNET_DB_PASS` (optional) if using `accounts` this is the MongoDB password
- `SKYNET_DB_HOST` (optional) if using `accounts` this is the MongoDB address or container name
- `SKYNET_DB_PORT` (optional) if using `accounts` this is the MongoDB port
- `COOKIE_DOMAIN` (optional) if using `accounts` this is the domain to which your cookies will be issued
- `COOKIE_HASH_KEY` (optional) if using `accounts` hashing secret, at least 32 bytes
- `COOKIE_ENC_KEY` (optional) if using `accounts` encryption key, at least 32 bytes
2021-04-01 13:30:06 +00:00
- `S3_BACKUP_PATH` (optional) is using `accounts` and backing up the databases to S3. This path should be an S3 bucket
with path to the location in the bucket where we want to store the daily backups.
2021-04-01 13:15:37 +00:00
2020-07-08 12:09:54 +00:00
1. `docker-compose up -d` to restart the services so they pick up new env variables
1. `docker exec caddy caddy reload --config /etc/caddy/Caddyfile` to reload Caddyfile configuration
2021-04-01 13:15:37 +00:00
1. add your custom Kratos configuration to `/home/user/skynet-webportal/docker/kratos/config/kratos.yml` (in particular, the credentials for your mail server should be here, rather than in your source control). For a starting point you can take `docker/kratos/config/kratos.yml.sample` .
2020-03-03 15:24:51 +00:00
2020-09-22 10:23:53 +00:00
## Subdomains
2020-09-29 10:35:34 +00:00
It might prove useful for certain skapps to be accessible through a custom subdomain. So instead of being accessed through `https://portal.com/[skylink]` , it would be accessible through `https://[skylink_base32].portal.com` . We call this "subdomain access" and it is made possible by encoding Skylinks using a base32 encoding. We have to use a base32 encoding scheme because subdomains have to be all lower case and the base64 encoded Skylink is case sensitive and thus might contain uppercase characters.
You can convert Skylinks using this [converter skapp ](https://convert-skylink.hns.siasky.net ). To see how the encoding and decoding works, please follow the link to the repo in the application itself.
There is also an option to access handshake domain through the subdomain using `https://[domain_name].hns.portal.com` .
2020-09-22 10:23:53 +00:00
To configure this on your portal, you have to make sure to configure the following:
### Wildcard SSL Certificate
We need to ensure SSL encryption for skapps that are accessed through their
subdomain, therefore we need to have a wildcard certificate. This is very easily
2021-04-20 09:56:06 +00:00
achieved using wildcard certificates in Caddy.
2020-09-22 10:23:53 +00:00
```
2021-04-20 09:56:06 +00:00
{$SSL_CERTIFICATE_STRING} {
...
2020-09-29 10:35:34 +00:00
}
2020-09-22 10:23:53 +00:00
```
2021-04-20 09:56:06 +00:00
Where `SSL_CERTIFICATE_STRING` environment variable should contain the wildcard for subdomains (ie. _.example.com) and
wildcard for hns subdomains (ie. _.hns.example.com).
2020-09-29 10:35:34 +00:00
(see [docker/caddy/Caddyfile ](../docker/Caddy/Caddyfile ))
2020-09-22 10:23:53 +00:00
### Nginx configuration
In Nginx two things need to happen:
2020-09-29 10:35:34 +00:00
#### Match the specific parts of the uri
2020-09-22 10:23:53 +00:00
```
2020-09-29 10:35:34 +00:00
# understand the regex https://regex101.com/r/BGQvi6/6
server_name "~^(((?< base32_subdomain > ([a-z0-9]{55}))|(?< hns_domain > [^\.]+)\.hns)\.)?((?< portal_domain > [^.]+)\.)?(?< domain > [^.]+)\.(?< tld > [^.]+)$";
```
2020-09-22 10:23:53 +00:00
2020-09-29 10:35:34 +00:00
#### Redirect the requests to the appropriate location
2020-09-22 10:23:53 +00:00
2020-09-29 10:35:34 +00:00
First you need to redirect the requests based on the regex above matching either `base32_subdomain` or `hns_domain` .
```
location / {
# This is the only safe workaround to reroute based on some conditions
# See https://www.nginx.com/resources/wiki/start/topics/depth/ifisevil/
recursive_error_pages on;
# redirect links with base32 encoded skylink in subdomain
error_page 418 = @base32_subdomain ;
if ($base32_subdomain != "") {
return 418;
2020-09-22 10:23:53 +00:00
}
2020-09-29 10:35:34 +00:00
# redirect links with handshake domain on hns subdomain
error_page 419 = @hns_domain ;
if ($hns_domain != "") {
return 419;
2020-09-22 10:23:53 +00:00
}
2020-09-29 10:35:34 +00:00
...
}
```
Define locations for `@base32_subdomain` and `@hns_domain` redirects.
```
location @base32_subdomain {
include /etc/nginx/conf.d/include/proxy-buffer;
proxy_pass http://127.0.0.1/$base32_subdomain/$request_uri;
}
location @hns_domain {
include /etc/nginx/conf.d/include/proxy-buffer;
proxy_pass http://127.0.0.1/hns/$hns_domain/$request_uri;
}
2020-09-22 10:23:53 +00:00
```
2020-09-29 10:35:34 +00:00
(see [docker/nginx/nginx.conf ](../docker/nginx/nginx.conf ))
2020-09-22 10:23:53 +00:00
2020-07-08 12:09:54 +00:00
## Useful Commands
2020-02-28 11:35:06 +00:00
2020-09-04 12:55:30 +00:00
- Starting the whole stack
> `docker-compose up -d`
- Stopping the whole stack
> `docker-compose down`
2020-07-28 11:22:07 +00:00
- Accessing siac
2020-07-08 12:09:54 +00:00
> `docker exec -it sia siac`
2020-09-14 15:40:18 +00:00
- Portal maintenance
- Pulling portal out for maintenance
> `scripts/portal-down.sh`
- Putting portal back into place after maintenance
> `scripts/portal-up.sh`
- Upgrading portal containers (takes care of pulling it and putting it back)
> `scripts/portal-upgrade.sh`
2020-09-14 13:57:44 +00:00
- Restarting caddy gracefully after making changes to Caddyfile (no downtime)
2020-07-08 12:09:54 +00:00
> `docker exec caddy caddy reload --config /etc/caddy/Caddyfile`
2020-09-14 13:57:44 +00:00
- Restarting nginx gracefully after making changes to nginx configs (no downtime)
2020-07-08 12:09:54 +00:00
> `docker exec nginx openresty -s reload`
2020-09-14 13:57:44 +00:00
- Checking siad service logs (since last hour)
2020-08-18 15:36:00 +00:00
> `docker logs --since 1h $(docker ps -q --filter "name=^sia$")`
2020-06-22 09:54:01 +00:00
- Checking caddy logs (for example in case ssl certificate fails)
2020-07-08 12:09:54 +00:00
> `docker logs caddy -f`
2020-06-22 09:54:01 +00:00
- Checking nginx logs (nginx handles all communication to siad instances)
2020-07-28 11:22:07 +00:00
> `tail -n 50 docker/data/nginx/logs/access.log` to follow last 50 lines of access log
> `tail -n 50 docker/data/nginx/logs/error.log` to follow last 50 lines of error log