Fix tests
[akkoma] / docs / installation / openbsd_en.md
1 # Installing on OpenBSD
2 This guide describes the installation and configuration of pleroma (and the required software to run it) on a single OpenBSD 6.4 server.
3 For any additional information regarding commands and configuration files mentioned here, check the man pages [online](https://man.openbsd.org/) or directly on your server with the man command.
4
5 #### Required software
6 The following packages need to be installed:
7 * elixir
8 * gmake
9 * ImageMagick
10 * git
11 * postgresql-server
12 * postgresql-contrib
13
14 To install them, run the following command (with doas or as root):
15 `pkg_add elixir gmake ImageMagick git postgresql-server postgresql-contrib`
16
17 Pleroma requires a reverse proxy, OpenBSD has relayd in base (and is used in this guide) and packages/ports are available for nginx (www/nginx) and apache (www/apache-httpd). Independently of the reverse proxy, [acme-client(1)](https://man.openbsd.org/acme-client) can be used to get a certificate from Let's Encrypt.
18
19 #### Creating the pleroma user
20 Pleroma will be run by a dedicated user, \_pleroma. Before creating it, insert the following lines in login.conf:
21 ```
22 pleroma:\
23 :datasize-max=1536M:\
24 :datasize-cur=1536M:\
25 :openfiles-max=4096
26 ```
27 This creates a "pleroma" login class and sets higher values than default for datasize and openfiles (see [login.conf(5)](https://man.openbsd.org/login.conf)), this is required to avoid having pleroma crash some time after starting.
28
29 Create the \_pleroma user, assign it the pleroma login class and create its home directory (/home/\_pleroma/): `useradd -m -L pleroma _pleroma`
30
31 #### Clone pleroma's directory
32 Enter a shell as the \_pleroma user. As root, run `su _pleroma -;cd`. Then clone the repository with `git clone -b stable https://git.pleroma.social/pleroma/pleroma.git`. Pleroma is now installed in /home/\_pleroma/pleroma/, it will be configured and started at the end of this guide.
33
34 #### Postgresql
35 Start a shell as the \_postgresql user (as root run `su _postgresql -` then run the `initdb` command to initialize postgresql:
36 If you wish to not use the default location for postgresql's data (/var/postgresql/data), add the following switch at the end of the command: `-D <path>` and modify the `datadir` variable in the /etc/rc.d/postgresql script.
37
38 When this is done, enable postgresql so that it starts on boot and start it. As root, run:
39 ```
40 rcctl enable postgresql
41 rcctl start postgresql
42 ```
43 To check that it started properly and didn't fail right after starting, you can run `ps aux | grep postgres`, there should be multiple lines of output.
44
45 #### httpd
46 httpd will have three fuctions:
47 * redirect requests trying to reach the instance over http to the https URL
48 * serve a robots.txt file
49 * get Let's Encrypt certificates, with acme-client
50
51 Insert the following config in httpd.conf:
52 ```
53 # $OpenBSD: httpd.conf,v 1.17 2017/04/16 08:50:49 ajacoutot Exp $
54
55 ext_inet="<IPv4 address>"
56 ext_inet6="<IPv6 address>"
57
58 server "default" {
59 listen on $ext_inet port 80 # Comment to disable listening on IPv4
60 listen on $ext_inet6 port 80 # Comment to disable listening on IPv6
61 listen on 127.0.0.1 port 80 # Do NOT comment this line
62
63 log syslog
64 directory no index
65
66 location "/.well-known/acme-challenge/*" {
67 root "/acme"
68 request strip 2
69 }
70
71 location "/robots.txt" { root "/htdocs/local/" }
72 location "/*" { block return 302 "https://$HTTP_HOST$REQUEST_URI" }
73 }
74
75 types {
76 include "/usr/share/misc/mime.types"
77 }
78 ```
79 Do not forget to change *\<IPv4/6 address\>* to your server's address(es). If httpd should only listen on one protocol family, comment one of the two first *listen* options.
80
81 Create the /var/www/htdocs/local/ folder and write the content of your robots.txt in /var/www/htdocs/local/robots.txt.
82 Check the configuration with `httpd -n`, if it is OK enable and start httpd (as root):
83 ```
84 rcctl enable httpd
85 rcctl start httpd
86 ```
87
88 #### acme-client
89 acme-client is used to get SSL/TLS certificates from Let's Encrypt.
90 Insert the following configuration in /etc/acme-client.conf:
91 ```
92 #
93 # $OpenBSD: acme-client.conf,v 1.4 2017/03/22 11:14:14 benno Exp $
94 #
95
96 authority letsencrypt-<domain name> {
97 #agreement url "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf"
98 api url "https://acme-v01.api.letsencrypt.org/directory"
99 account key "/etc/acme/letsencrypt-privkey-<domain name>.pem"
100 }
101
102 domain <domain name> {
103 domain key "/etc/ssl/private/<domain name>.key"
104 domain certificate "/etc/ssl/<domain name>.crt"
105 domain full chain certificate "/etc/ssl/<domain name>.fullchain.pem"
106 sign with letsencrypt-<domain name>
107 challengedir "/var/www/acme/"
108 }
109 ```
110 Replace *\<domain name\>* by the domain name you'll use for your instance. As root, run `acme-client -n` to check the config, then `acme-client -ADv <domain name>` to create account and domain keys, and request a certificate for the first time.
111 Make acme-client run everyday by adding it in /etc/daily.local. As root, run the following command: `echo "acme-client <domain name>" >> /etc/daily.local`.
112
113 Relayd will look for certificates and keys based on the address it listens on (see next part), the easiest way to make them available to relayd is to create a link, as root run:
114 ```
115 ln -s /etc/ssl/<domain name>.fullchain.pem /etc/ssl/<IP address>.crt
116 ln -s /etc/ssl/private/<domain name>.key /etc/ssl/private/<IP address>.key
117 ```
118 This will have to be done for each IPv4 and IPv6 address relayd listens on.
119
120 #### relayd
121 relayd will be used as the reverse proxy sitting in front of pleroma.
122 Insert the following configuration in /etc/relayd.conf:
123 ```
124 # $OpenBSD: relayd.conf,v 1.4 2018/03/23 09:55:06 claudio Exp $
125
126 ext_inet="<IPv4 address>"
127 ext_inet6="<IPv6 address>"
128
129 table <pleroma_server> { 127.0.0.1 }
130 table <httpd_server> { 127.0.0.1 }
131
132 http protocol plerup { # Protocol for upstream pleroma server
133 #tcp { nodelay, sack, socket buffer 65536, backlog 128 } # Uncomment and adjust as you see fit
134 tls ciphers "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305"
135 tls ecdhe secp384r1
136
137 # Forward some paths to the local server (as pleroma won't respond to them as you might want)
138 pass request quick path "/robots.txt" forward to <httpd_server>
139
140 # Append a bunch of headers
141 match request header append "X-Forwarded-For" value "$REMOTE_ADDR" # This two header and the next one are not strictly required by pleroma but adding them won't hurt
142 match request header append "X-Forwarded-By" value "$SERVER_ADDR:$SERVER_PORT"
143
144 match response header append "X-XSS-Protection" value "1; mode=block"
145 match response header append "X-Permitted-Cross-Domain-Policies" value "none"
146 match response header append "X-Frame-Options" value "DENY"
147 match response header append "X-Content-Type-Options" value "nosniff"
148 match response header append "Referrer-Policy" value "same-origin"
149 match response header append "X-Download-Options" value "noopen"
150 match response header append "Content-Security-Policy" value "default-src 'none'; base-uri 'self'; form-action 'self'; img-src 'self' data: https:; media-src 'self' https:; style-src 'self' 'unsafe-inline'; font-src 'self'; script-src 'self'; connect-src 'self' wss://CHANGEME.tld; upgrade-insecure-requests;" # Modify "CHANGEME.tld" and set your instance's domain here
151 match request header append "Connection" value "upgrade"
152 #match response header append "Strict-Transport-Security" value "max-age=31536000; includeSubDomains" # Uncomment this only after you get HTTPS working.
153
154 # If you do not want remote frontends to be able to access your Pleroma backend server, comment these lines
155 match response header append "Access-Control-Allow-Origin" value "*"
156 match response header append "Access-Control-Allow-Methods" value "POST, PUT, DELETE, GET, PATCH, OPTIONS"
157 match response header append "Access-Control-Allow-Headers" value "Authorization, Content-Type, Idempotency-Key"
158 match response header append "Access-Control-Expose-Headers" value "Link, X-RateLimit-Reset, X-RateLimit-Limit, X-RateLimit-Remaining, X-Request-Id"
159 # Stop commenting lines here
160 }
161
162 relay wwwtls {
163 listen on $ext_inet port https tls # Comment to disable listening on IPv4
164 listen on $ext_inet6 port https tls # Comment to disable listening on IPv6
165
166 protocol plerup
167
168 forward to <pleroma_server> port 4000 check http "/" code 200
169 forward to <httpd_server> port 80 check http "/robots.txt" code 200
170 }
171 ```
172 Again, change *\<IPv4/6 address\>* to your server's address(es) and comment one of the two *listen* options if needed. Also change *wss://CHANGEME.tld* to *wss://\<your instance's domain name\>*.
173 Check the configuration with `relayd -n`, if it is OK enable and start relayd (as root):
174 ```
175 rcctl enable relayd
176 rcctl start relayd
177 ```
178
179 #### pf
180 Enabling and configuring pf is highly recommended.
181 In /etc/pf.conf, insert the following configuration:
182 ```
183 # Macros
184 if="<network interface>"
185 authorized_ssh_clients="any"
186
187 # Skip traffic on loopback interface
188 set skip on lo
189
190 # Default behavior
191 set block-policy drop
192 block in log all
193 pass out quick
194
195 # Security features
196 match in all scrub (no-df random-id)
197 block in log from urpf-failed
198
199 # Rules
200 pass in quick on $if inet proto icmp to ($if) icmp-type { echoreq unreach paramprob trace } # ICMP
201 pass in quick on $if inet6 proto icmp6 to ($if) icmp6-type { echoreq unreach paramprob timex toobig } # ICMPv6
202 pass in quick on $if proto tcp to ($if) port { http https } # relayd/httpd
203 pass in quick on $if proto tcp from $authorized_ssh_clients to ($if) port ssh
204 ```
205 Replace *\<network interface\>* by your server's network interface name (which you can get with ifconfig). Consider replacing the content of the authorized\_ssh\_clients macro by, for exemple, your home IP address, to avoid SSH connection attempts from bots.
206
207 Check pf's configuration by running `pfctl -nf /etc/pf.conf`, load it with `pfctl -f /etc/pf.conf` and enable pf at boot with `rcctl enable pf`.
208
209 #### Configure and start pleroma
210 Enter a shell as \_pleroma (as root `su _pleroma -`) and enter pleroma's installation directory (`cd ~/pleroma/`).
211 Then follow the main installation guide:
212 * run `mix deps.get`
213 * run `mix pleroma.instance gen` and enter your instance's information when asked
214 * copy config/generated\_config.exs to config/prod.secret.exs. The default values should be sufficient but you should edit it and check that everything seems OK.
215 * exit your current shell back to a root one and run `psql -U postgres -f /home/_pleroma/config/setup_db.psql` to setup the database.
216 * return to a \_pleroma shell into pleroma's installation directory (`su _pleroma -;cd ~/pleroma`) and run `MIX_ENV=prod mix ecto.migrate`
217
218 As \_pleroma in /home/\_pleroma/pleroma, you can now run `LC_ALL=en_US.UTF-8 MIX_ENV=prod mix phx.server` to start your instance.
219 In another SSH session/tmux window, check that it is working properly by running `ftp -MVo - http://127.0.0.1:4000/api/v1/instance`, you should get json output. Double-check that *uri*'s value is your instance's domain name.
220
221 ##### Starting pleroma at boot
222 An rc script to automatically start pleroma at boot hasn't been written yet, it can be run in a tmux session (tmux is in base).