1 # Installing on Linux using OTP releases
3 {! installation/otp_vs_from_source.include !}
5 This guide covers a installation using an OTP release. To install Akkoma from source, please check out the corresponding guide for your distro.
8 * A machine running Linux with GNU (e.g. Debian, Ubuntu) or musl (e.g. Alpine) libc and `x86_64`, `aarch64` or `armv7l` CPU, you have root access to. If you are not sure if it's compatible see [Detecting flavour section](#detecting-flavour) below
9 * For installing OTP releases on RedHat-based distros like Fedora and Centos Stream, please follow [this guide](./otp_redhat_en.md) instead.
10 * A (sub)domain pointed to the machine
12 You will be running commands as root. If you aren't root already, please elevate your priviledges by executing `sudo su`/`su`.
14 While in theory OTP releases are possbile to install on any compatible machine, for the sake of simplicity this guide focuses only on Debian/Ubuntu and Alpine.
18 Paste the following into the shell:
20 arch="$(uname -m)";if [ "$arch" = "x86_64" ];then arch="amd64";elif [ "$arch" = "armv7l" ];then arch="arm";elif [ "$arch" = "aarch64" ];then arch="arm64";else echo "Unsupported arch: $arch">&2;fi;if getconf GNU_LIBC_VERSION>/dev/null;then libc_postfix="";elif [ "$(ldd 2>&1|head -c 9)" = "musl libc" ];then libc_postfix="-musl";elif [ "$(find /lib/libc.musl*|wc -l)" ];then libc_postfix="-musl";else echo "Unsupported libc">&2;fi;echo "$arch$libc_postfix"
23 If your platform is supported the output will contain the flavour string, you will need it later. If not, this just means that we don't build releases for your platform, you can still try installing from source.
25 ### Installing the required packages
27 Other than things bundled in the OTP release Akkoma depends on:
29 * curl (to download the release build)
30 * unzip (needed to unpack release builds)
31 * ncurses (ERTS won't run without it)
32 * PostgreSQL (also utilizes extensions in postgresql-contrib)
33 * nginx (could be swapped with another reverse proxy but this guide covers only it)
34 * certbot (for Let's Encrypt certificates, could be swapped with another ACME client, but this guide covers only it)
39 awk 'NR==2' /etc/apk/repositories | sed 's/main/community/' | tee -a /etc/apk/repositories
41 apk add curl unzip ncurses postgresql postgresql-contrib nginx certbot file-dev
46 apt install curl unzip libncurses5 postgresql postgresql-contrib nginx certbot libmagic-dev
49 ### Installing optional packages
51 Per [`docs/installation/optional/media_graphics_packages.md`](optional/media_graphics_packages.md):
59 apk add imagemagick ffmpeg exiftool
64 apt install imagemagick ffmpeg libimage-exiftool-perl
68 ### Configuring PostgreSQL
69 #### (Optional) Installing RUM indexes
72 It is recommended to use PostgreSQL v11 or newer. We have seen some minor issues with lower PostgreSQL versions.
74 RUM indexes are an alternative indexing scheme that is not included in PostgreSQL by default. You can read more about them on the [Configuration page](../configuration/cheatsheet.md#rum-indexing-for-full-text-search). They are completely optional and most of the time are not worth it, especially if you are running a single user instance (unless you absolutely need ordered search results).
78 apk add git build-base postgresql-dev
79 git clone https://github.com/postgrespro/rum /tmp/rum
82 make USE_PGXS=1 install
89 # Available only on Buster/19.04
90 apt install postgresql-11-rum
93 #### (Optional) Performance configuration
94 It is encouraged to check [Optimizing your PostgreSQL performance](../configuration/postgresql.md) document, for tips on PostgreSQL tuning.
96 Restart PostgreSQL to apply configuration changes:
100 rc-service postgresql restart
105 systemctl restart postgresql
108 ### Installing Akkoma
110 # Create a Akkoma user
111 adduser --system --shell /bin/false --home /opt/akkoma akkoma
113 # Set the flavour environment variable to the string you got in Detecting flavour section.
114 # For example if the flavour is `amd64-musl` the command will be
115 export FLAVOUR="amd64-musl"
117 # Clone the release build into a temporary directory and unpack it
118 su akkoma -s $SHELL -lc "
119 curl 'https://akkoma-updates.s3-website.fr-par.scw.cloud/develop/akkoma-$FLAVOUR.zip' -o /tmp/akkoma.zip
120 unzip /tmp/akkoma.zip -d /tmp/
123 # Move the release to the home directory and delete temporary files
124 su akkoma -s $SHELL -lc "
125 mv /tmp/release/* /opt/akkoma
129 # Create uploads directory and set proper permissions (skip if planning to use a remote uploader)
130 # Note: It does not have to be `/var/lib/akkoma/uploads`, the config generator will ask about the upload directory later
132 mkdir -p /var/lib/akkoma/uploads
133 chown -R akkoma /var/lib/akkoma
135 # Create custom public files directory (custom emojis, frontend bundle overrides, robots.txt, etc.)
136 # Note: It does not have to be `/var/lib/akkoma/static`, the config generator will ask about the custom public files directory later
137 mkdir -p /var/lib/akkoma/static
138 chown -R akkoma /var/lib/akkoma
140 # Create a config directory
142 chown -R akkoma /etc/akkoma
144 # Run the config generator
145 su akkoma -s $SHELL -lc "./bin/pleroma_ctl instance gen --output /etc/akkoma/config.exs --output-psql /tmp/setup_db.psql"
147 # Create the postgres database
148 su postgres -s $SHELL -lc "psql -f /tmp/setup_db.psql"
150 # Create the database schema
151 su akkoma -s $SHELL -lc "./bin/pleroma_ctl migrate"
153 # If you have installed RUM indexes uncommend and run
154 # su akkoma -s $SHELL -lc "./bin/pleroma_ctl migrate --migrations-path priv/repo/optional_migrations/rum_indexing/"
156 # Start the instance to verify that everything is working as expected
157 su akkoma -s $SHELL -lc "./bin/pleroma daemon"
159 # Wait for about 20 seconds and query the instance endpoint, if it shows your uri, name and email correctly, you are configured correctly
160 sleep 20 && curl http://localhost:4000/api/v1/instance
163 su akkoma -s $SHELL -lc "./bin/pleroma stop"
166 ### Setting up nginx and getting Let's Encrypt SSL certificaties
168 #### Get a Let's Encrypt certificate
170 certbot certonly --standalone --preferred-challenges http -d yourinstance.tld
173 #### Copy Akkoma nginx configuration to the nginx folder
175 The location of nginx configs is dependent on the distro
179 cp /opt/akkoma/installation/nginx/akkoma.nginx /etc/nginx/conf.d/akkoma.conf
184 cp /opt/akkoma/installation/nginx/akkoma.nginx /etc/nginx/sites-available/akkoma.conf
185 ln -s /etc/nginx/sites-available/akkoma.conf /etc/nginx/sites-enabled/akkoma.conf
188 If your distro does not have either of those you can append `include /etc/nginx/akkoma.conf` to the end of the http section in /etc/nginx/nginx.conf and
190 cp /opt/akkoma/installation/nginx/akkoma.nginx /etc/nginx/akkoma.conf
193 #### Edit the nginx config
195 # Replace example.tld with your (sub)domain
196 $EDITOR path-to-nginx-config
198 # Verify that the config is valid
205 rc-service nginx start
210 systemctl start nginx
213 At this point if you open your (sub)domain in a browser you should see a 502 error, that's because Akkoma is not started yet.
215 ### Setting up a system service
219 # Copy the service into a proper directory
220 cp /opt/akkoma/installation/init.d/akkoma /etc/init.d/akkoma
222 # Start akkoma and enable it on boot
223 rc-service akkoma start
229 # Copy the service into a proper directory
230 cp /opt/akkoma/installation/akkoma.service /etc/systemd/system/akkoma.service
232 # Start akkoma and enable it on boot
233 systemctl start akkoma
234 systemctl enable akkoma
237 If everything worked, you should see Akkoma-FE when visiting your domain. If that didn't happen, try reviewing the installation steps, starting Akkoma in the foreground and seeing if there are any errrors.
239 {! support.include !}
243 ### Setting up auto-renew of the Let's Encrypt certificate
245 # Create the directory for webroot challenges
246 mkdir -p /var/lib/letsencrypt
248 # Uncomment the webroot method
249 $EDITOR path-to-nginx-config
251 # Verify that the config is valid
258 rc-service nginx restart
260 # Start the cron daemon and make it start on boot
261 rc-service crond start
264 # Ensure the webroot menthod and post hook is working
265 certbot renew --cert-name yourinstance.tld --webroot -w /var/lib/letsencrypt/ --dry-run --post-hook 'rc-service nginx reload'
267 # Add it to the daily cron
269 certbot renew --cert-name yourinstance.tld --webroot -w /var/lib/letsencrypt/ --post-hook "rc-service nginx reload"
270 ' > /etc/periodic/daily/renew-akkoma-cert
271 chmod +x /etc/periodic/daily/renew-akkoma-cert
273 # If everything worked the output should contain /etc/cron.daily/renew-akkoma-cert
274 run-parts --test /etc/periodic/daily
280 systemctl restart nginx
282 # Ensure the webroot menthod and post hook is working
283 certbot renew --cert-name yourinstance.tld --webroot -w /var/lib/letsencrypt/ --dry-run --post-hook 'systemctl reload nginx'
285 # Add it to the daily cron
287 certbot renew --cert-name yourinstance.tld --webroot -w /var/lib/letsencrypt/ --post-hook "systemctl reload nginx"
288 ' > /etc/cron.daily/renew-akkoma-cert
289 chmod +x /etc/cron.daily/renew-akkoma-cert
291 # If everything worked the output should contain /etc/cron.daily/renew-akkoma-cert
292 run-parts --test /etc/cron.daily
295 ## Create your first user and set as admin
298 su akkoma -s $SHELL -lc "./bin/pleroma_ctl user new joeuser joeuser@sld.tld --admin"
300 This will create an account withe the username of 'joeuser' with the email address of joeuser@sld.tld, and set that user's account as an admin. This will result in a link that you can paste into the browser, which logs you in and enables you to set the password.
304 {! installation/further_reading.include !}
306 {! support.include !}