Merge branch 'pleromapi' into 'develop'
[akkoma] / docs / installation / openbsd_en.md
1 # Installing on OpenBSD
2
3 This guide describes the installation and configuration of pleroma (and the required software to run it) on a single OpenBSD 6.6 server.
4
5 For any additional information regarding commands and configuration files mentioned here, check the man pages [online](https://man.openbsd.org/) or directly on your server with the man command.
6
7 #### Required software
8
9 The following packages need to be installed:
10
11 * elixir
12 * gmake
13 * git
14 * postgresql-server
15 * postgresql-contrib
16 * cmake
17 * ffmpeg
18 * ImageMagick
19
20 To install them, run the following command (with doas or as root):
21
22 ```
23 pkg_add elixir gmake git postgresql-server postgresql-contrib cmake ffmpeg ImageMagick
24 ```
25
26 Pleroma requires a reverse proxy, OpenBSD has relayd in base (and is used in this guide) and packages/ports are available for nginx (www/nginx) and apache (www/apache-httpd). Independently of the reverse proxy, [acme-client(1)](https://man.openbsd.org/acme-client) can be used to get a certificate from Let's Encrypt.
27
28 #### Optional software
29
30 Per [`docs/installation/optional/media_graphics_packages.md`](../installation/optional/media_graphics_packages.md):
31 * ImageMagick
32 * ffmpeg
33 * exiftool
34
35 To install the above:
36
37 ```
38 pkg_add ImageMagick ffmpeg p5-Image-ExifTool
39 ```
40
41 #### Creating the pleroma user
42 Pleroma will be run by a dedicated user, \_pleroma. Before creating it, insert the following lines in login.conf:
43 ```
44 pleroma:\
45 :datasize-max=1536M:\
46 :datasize-cur=1536M:\
47 :openfiles-max=4096
48 ```
49 This creates a "pleroma" login class and sets higher values than default for datasize and openfiles (see [login.conf(5)](https://man.openbsd.org/login.conf)), this is required to avoid having pleroma crash some time after starting.
50
51 Create the \_pleroma user, assign it the pleroma login class and create its home directory (/home/\_pleroma/): `useradd -m -L pleroma _pleroma`
52
53 #### Clone pleroma's directory
54 Enter a shell as the \_pleroma user. As root, run `su _pleroma -;cd`. Then clone the repository with `git clone -b stable https://git.pleroma.social/pleroma/pleroma.git`. Pleroma is now installed in /home/\_pleroma/pleroma/, it will be configured and started at the end of this guide.
55
56 #### PostgreSQL
57 Start a shell as the \_postgresql user (as root run `su _postgresql -` then run the `initdb` command to initialize postgresql:
58 You will need to specify pgdata directory to the default (/var/postgresql/data) with the `-D <path>` and set the user to postgres with the `-U <username>` flag. This can be done as follows:
59
60 ```
61 initdb -D /var/postgresql/data -U postgres
62 ```
63 If you are not using the default directory, you will have to update the `datadir` variable in the /etc/rc.d/postgresql script.
64
65 When this is done, enable postgresql so that it starts on boot and start it. As root, run:
66 ```
67 rcctl enable postgresql
68 rcctl start postgresql
69 ```
70 To check that it started properly and didn't fail right after starting, you can run `ps aux | grep postgres`, there should be multiple lines of output.
71
72 #### httpd
73 httpd will have three fuctions:
74
75 * redirect requests trying to reach the instance over http to the https URL
76 * serve a robots.txt file
77 * get Let's Encrypt certificates, with acme-client
78
79 Insert the following config in httpd.conf:
80 ```
81 # $OpenBSD: httpd.conf,v 1.17 2017/04/16 08:50:49 ajacoutot Exp $
82
83 ext_inet="<IPv4 address>"
84 ext_inet6="<IPv6 address>"
85
86 server "default" {
87 listen on $ext_inet port 80 # Comment to disable listening on IPv4
88 listen on $ext_inet6 port 80 # Comment to disable listening on IPv6
89 listen on 127.0.0.1 port 80 # Do NOT comment this line
90
91 log syslog
92 directory no index
93
94 location "/.well-known/acme-challenge/*" {
95 root "/acme"
96 request strip 2
97 }
98
99 location "/robots.txt" { root "/htdocs/local/" }
100 location "/*" { block return 302 "https://$HTTP_HOST$REQUEST_URI" }
101 }
102
103 types {
104 }
105 ```
106 Do not forget to change *<IPv4/6 address\>* to your server's address(es). If httpd should only listen on one protocol family, comment one of the two first *listen* options.
107
108 Create the /var/www/htdocs/local/ folder and write the content of your robots.txt in /var/www/htdocs/local/robots.txt.
109 Check the configuration with `httpd -n`, if it is OK enable and start httpd (as root):
110 ```
111 rcctl enable httpd
112 rcctl start httpd
113 ```
114
115 #### acme-client
116 acme-client is used to get SSL/TLS certificates from Let's Encrypt.
117 Insert the following configuration in /etc/acme-client.conf:
118 ```
119 #
120 # $OpenBSD: acme-client.conf,v 1.4 2017/03/22 11:14:14 benno Exp $
121 #
122
123 authority letsencrypt-<domain name> {
124 #agreement url "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf"
125 api url "https://acme-v02.api.letsencrypt.org/directory"
126 account key "/etc/acme/letsencrypt-privkey-<domain name>.pem"
127 }
128
129 domain <domain name> {
130 domain key "/etc/ssl/private/<domain name>.key"
131 domain certificate "/etc/ssl/<domain name>.crt"
132 domain full chain certificate "/etc/ssl/<domain name>.fullchain.pem"
133 sign with letsencrypt-<domain name>
134 challengedir "/var/www/acme/"
135 }
136 ```
137 Replace *<domain name\>* by the domain name you'll use for your instance. As root, run `acme-client -n` to check the config, then `acme-client -ADv <domain name>` to create account and domain keys, and request a certificate for the first time.
138 Make acme-client run everyday by adding it in /etc/daily.local. As root, run the following command: `echo "acme-client <domain name>" >> /etc/daily.local`.
139
140 Relayd will look for certificates and keys based on the address it listens on (see next part), the easiest way to make them available to relayd is to create a link, as root run:
141 ```
142 ln -s /etc/ssl/<domain name>.fullchain.pem /etc/ssl/<IP address>.crt
143 ln -s /etc/ssl/private/<domain name>.key /etc/ssl/private/<IP address>.key
144 ```
145 This will have to be done for each IPv4 and IPv6 address relayd listens on.
146
147 #### relayd
148 relayd will be used as the reverse proxy sitting in front of pleroma.
149 Insert the following configuration in /etc/relayd.conf:
150 ```
151 # $OpenBSD: relayd.conf,v 1.4 2018/03/23 09:55:06 claudio Exp $
152
153 ext_inet="<IPv4 address>"
154 ext_inet6="<IPv6 address>"
155
156 table <pleroma_server> { 127.0.0.1 }
157 table <httpd_server> { 127.0.0.1 }
158
159 http protocol plerup { # Protocol for upstream pleroma server
160 #tcp { nodelay, sack, socket buffer 65536, backlog 128 } # Uncomment and adjust as you see fit
161 tls ciphers "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305"
162 tls ecdhe secp384r1
163
164 # Forward some paths to the local server (as pleroma won't respond to them as you might want)
165 pass request quick path "/robots.txt" forward to <httpd_server>
166
167 # Append a bunch of headers
168 match request header append "X-Forwarded-For" value "$REMOTE_ADDR" # This two header and the next one are not strictly required by pleroma but adding them won't hurt
169 match request header append "X-Forwarded-By" value "$SERVER_ADDR:$SERVER_PORT"
170
171 match response header append "X-XSS-Protection" value "1; mode=block"
172 match response header append "X-Permitted-Cross-Domain-Policies" value "none"
173 match response header append "X-Frame-Options" value "DENY"
174 match response header append "X-Content-Type-Options" value "nosniff"
175 match response header append "Referrer-Policy" value "same-origin"
176 match response header append "X-Download-Options" value "noopen"
177 match response header append "Content-Security-Policy" value "default-src 'none'; base-uri 'self'; form-action 'self'; img-src 'self' data: https:; media-src 'self' https:; style-src 'self' 'unsafe-inline'; font-src 'self'; script-src 'self'; connect-src 'self' wss://CHANGEME.tld; upgrade-insecure-requests;" # Modify "CHANGEME.tld" and set your instance's domain here
178 match request header append "Connection" value "upgrade"
179 #match response header append "Strict-Transport-Security" value "max-age=31536000; includeSubDomains" # Uncomment this only after you get HTTPS working.
180
181 # If you do not want remote frontends to be able to access your Pleroma backend server, comment these lines
182 match response header append "Access-Control-Allow-Origin" value "*"
183 match response header append "Access-Control-Allow-Methods" value "POST, PUT, DELETE, GET, PATCH, OPTIONS"
184 match response header append "Access-Control-Allow-Headers" value "Authorization, Content-Type, Idempotency-Key"
185 match response header append "Access-Control-Expose-Headers" value "Link, X-RateLimit-Reset, X-RateLimit-Limit, X-RateLimit-Remaining, X-Request-Id"
186 # Stop commenting lines here
187 }
188
189 relay wwwtls {
190 listen on $ext_inet port https tls # Comment to disable listening on IPv4
191 listen on $ext_inet6 port https tls # Comment to disable listening on IPv6
192
193 protocol plerup
194
195 forward to <pleroma_server> port 4000 check http "/" code 200
196 forward to <httpd_server> port 80 check http "/robots.txt" code 200
197 }
198 ```
199 Again, change *<IPv4/6 address\>* to your server's address(es) and comment one of the two *listen* options if needed. Also change *wss://CHANGEME.tld* to *wss://<your instance's domain name\>*.
200 Check the configuration with `relayd -n`, if it is OK enable and start relayd (as root):
201 ```
202 rcctl enable relayd
203 rcctl start relayd
204 ```
205
206 #### pf
207 Enabling and configuring pf is highly recommended.
208 In /etc/pf.conf, insert the following configuration:
209 ```
210 # Macros
211 if="<network interface>"
212 authorized_ssh_clients="any"
213
214 # Skip traffic on loopback interface
215 set skip on lo
216
217 # Default behavior
218 set block-policy drop
219 block in log all
220 pass out quick
221
222 # Security features
223 match in all scrub (no-df random-id)
224 block in log from urpf-failed
225
226 # Rules
227 pass in quick on $if inet proto icmp to ($if) icmp-type { echoreq unreach paramprob trace } # ICMP
228 pass in quick on $if inet6 proto icmp6 to ($if) icmp6-type { echoreq unreach paramprob timex toobig } # ICMPv6
229 pass in quick on $if proto tcp to ($if) port { http https } # relayd/httpd
230 pass in quick on $if proto tcp from $authorized_ssh_clients to ($if) port ssh
231 ```
232 Replace *<network interface\>* by your server's network interface name (which you can get with ifconfig). Consider replacing the content of the authorized\_ssh\_clients macro by, for exemple, your home IP address, to avoid SSH connection attempts from bots.
233
234 Check pf's configuration by running `pfctl -nf /etc/pf.conf`, load it with `pfctl -f /etc/pf.conf` and enable pf at boot with `rcctl enable pf`.
235
236 #### Configure and start pleroma
237 Enter a shell as \_pleroma (as root `su _pleroma -`) and enter pleroma's installation directory (`cd ~/pleroma/`).
238
239 Then follow the main installation guide:
240
241 * run `mix deps.get`
242 * run `MIX_ENV=prod mix pleroma.instance gen` and enter your instance's information when asked
243 * copy config/generated\_config.exs to config/prod.secret.exs. The default values should be sufficient but you should edit it and check that everything seems OK.
244 * exit your current shell back to a root one and run `psql -U postgres -f /home/_pleroma/pleroma/config/setup_db.psql` to setup the database.
245 * return to a \_pleroma shell into pleroma's installation directory (`su _pleroma -;cd ~/pleroma`) and run `MIX_ENV=prod mix ecto.migrate`
246
247 As \_pleroma in /home/\_pleroma/pleroma, you can now run `LC_ALL=en_US.UTF-8 MIX_ENV=prod mix phx.server` to start your instance.
248 In another SSH session/tmux window, check that it is working properly by running `ftp -MVo - http://127.0.0.1:4000/api/v1/instance`, you should get json output. Double-check that *uri*'s value is your instance's domain name.
249
250 ##### Starting pleroma at boot
251 An rc script to automatically start pleroma at boot hasn't been written yet, it can be run in a tmux session (tmux is in base).
252
253
254 #### Create administrative user
255
256 If your instance is up and running, you can create your first user with administrative rights with the following command as the \_pleroma user.
257 ```
258 LC_ALL=en_US.UTF-8 MIX_ENV=prod mix pleroma.user new <username> <your@emailaddress> --admin
259 ```
260
261 #### Further reading
262
263 {! backend/installation/further_reading.include !}
264
265 ## Questions
266
267 Questions about the installation or didn’t it work as it should be, ask in [#pleroma:libera.chat](https://matrix.to/#/#pleroma:libera.chat) via Matrix or **#pleroma** on **libera.chat** via IRC.