Add installation instructions to readme
This commit is contained in:
parent
7ed919a295
commit
a39b229325
3 changed files with 92 additions and 1 deletions
28
README.md
28
README.md
|
@ -22,11 +22,37 @@ Matrix chat: [#mitra:halogen.city](https://matrix.to/#/#mitra:halogen.city)
|
|||
|
||||
## Requirements
|
||||
|
||||
- Rust 1.54+
|
||||
- Rust 1.54+ (when building from source)
|
||||
- PostgreSQL 12+
|
||||
- IPFS node (optional, see [guide](./docs/ipfs.md))
|
||||
- Ethereum node (optional)
|
||||
|
||||
## Installation
|
||||
|
||||
### Building from source
|
||||
|
||||
Run:
|
||||
|
||||
```
|
||||
cargo build --release
|
||||
```
|
||||
|
||||
This command will produce two binaries in `target/release` directory, `mitra` and `mitractl`.
|
||||
|
||||
Create a database and a configuration file (see [example](./config.yaml.example)).
|
||||
|
||||
When starting Mitra, set the value of `ENVIRONMENT` variable to `production` and specify the path to configuration file with `CONFIG_PATH`:
|
||||
|
||||
```
|
||||
ENVIRONMENT=production CONFIG_PATH=/etc/mitra/config.yaml mitra
|
||||
```
|
||||
|
||||
An HTTP server will be needed to handle HTTPS requests and serve the frontend. See the example of [nginx configuration file](./contrib/mitra.nginx).
|
||||
|
||||
Building instructions for `mitra-web` frontend can be found at https://codeberg.org/silverpill/mitra-web#project-setup.
|
||||
|
||||
To run Mitra as a systemd service, check out the [systemd unit file example](./contrib/mitra.service).
|
||||
|
||||
## Development
|
||||
|
||||
### Create database
|
||||
|
|
45
contrib/mitra.nginx
Normal file
45
contrib/mitra.nginx
Normal file
|
@ -0,0 +1,45 @@
|
|||
server {
|
||||
server_name example.tld;
|
||||
|
||||
listen 80;
|
||||
listen [::]:80;
|
||||
|
||||
location / {
|
||||
return 301 https://$server_name$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
server_name example.tld;;
|
||||
|
||||
listen 443 ssl http2;
|
||||
listen [::]:443 ssl http2;
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/example.tld/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/example.tld/privkey.pem;
|
||||
ssl_trusted_certificate /etc/letsencrypt/live/example.tld/chain.pem;
|
||||
|
||||
ssl_session_timeout 1d;
|
||||
ssl_session_cache shared:MozSSL:10m; # about 40000 sessions
|
||||
ssl_session_tickets off;
|
||||
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
ssl_ciphers "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4";
|
||||
ssl_prefer_server_ciphers off;
|
||||
|
||||
ssl_stapling on;
|
||||
ssl_stapling_verify on;
|
||||
|
||||
location / {
|
||||
# Frontend
|
||||
root /usr/share/mitra/www;
|
||||
try_files $uri /index.html;
|
||||
}
|
||||
|
||||
location ~ ^/(actor|api|contracts|feeds|media|nodeinfo|oauth|objects|users|.well-known) {
|
||||
# Backend
|
||||
proxy_pass http://127.0.0.1:8383;
|
||||
proxy_set_header Host $http_host;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
}
|
||||
}
|
20
contrib/mitra.service
Normal file
20
contrib/mitra.service
Normal file
|
@ -0,0 +1,20 @@
|
|||
[Unit]
|
||||
Description=Mitra Server
|
||||
After=postgresql.service
|
||||
Requires=postgresql.service
|
||||
|
||||
[Service]
|
||||
ExecStart=/usr/bin/mitra
|
||||
WorkingDirectory=/var/lib/mitra
|
||||
Environment="ENVIRONMENT=production"
|
||||
Environment="CONFIG_PATH=/etc/mitra/config.yaml"
|
||||
User=mitra
|
||||
Group=mitra
|
||||
|
||||
PrivateTmp=true
|
||||
ProtectSystem=full
|
||||
ProtectHome=true
|
||||
NoNewPrivileges=true
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
Loading…
Reference in a new issue