Introduction
SERMAS deployment is composed of different services. The main reference for the deployment is the sermas-toolkit-api repository.
It's a docker compose setup with pre-defined defaults to ease the testing of the system on a single machine.
Internal service communication
The SERMAS services need to communicate among them. If you use the aforementioned docker compose setup,
a custom docker network named sermas_dev
is created and used by all services,
that will therefore be able to reach each others using the default URLs.
To expose this setup on a public URL you will only need some minor changes (see below).
The more you depart from the development docker compose setup (for instance deploying the services in different machines or using kubernetes), the more you will need to provide the correct urls to each service (using environment variables), and ensure the connectivity among them.
In the most agnostic configuration, you will have a separate (possibly public) host for each service and you will need to properly configure every other service that interact with it.
Exposing the development setup
Assuming that you have:
- A server running the default docker compose setup, reachable from the internet on ports 80 and 443
- A public domain pointing to that server, for example
mysermas.com
- A Letsencrypt TLS setup, or TLS/SSL server certificates
Then you need to:
Configure Caddy proxy
To let Caddy proxy handle the SSL certificates and the traffic pointed at your domain,
add the following block at the end of your Caddyfile
:
# Public endpoints
http://mysermas.com, https://mysermas.com {
log {
output stdout
level debug
}
route /mqtt* {
uri strip_prefix /mqtt
reverse_proxy mqtt:1884
}
route /.well-known/sermas.json {
rewrite /.well-known/sermas.json /api/.well-known/sermas.json
}
route /keycloak* {
reverse_proxy keycloak:8080
}
route /api* {
reverse_proxy api:3000
}
route /* {
reverse_proxy kiosk:3000
}
}
NOTE: Depending on your TLS setup, you might need to specify also a tls directive.
Expose ports 80 and 443
Add the following lines to the proxy
service of your docker-compose.yml
file,
so that the traffic entering ports 80 and 443 reaches Caddy:
proxy:
# ...
ports:
- 8080:8080
- 80:80
- 443:443
Persist Proxy Data
If you are using Letsencrypt or another similar services, you need to persist
the SSL server certificate between container restarts.
In order to do so, add the following volume to the proxy
service of your docker-compose.yml
file:
proxy:
# ...
volumes:
- ./data/caddy:/data
Update URLs
Add the following lines to the api
and kiosk
services:
api:
# ...
environment:
- ENV_PATH=/config/.env
- CONFIG_BASEPATH=/config
- API_URL=https://mysermas.com/api
kiosk:
# ...
environment:
- PUBLIC_TOOLKIT_URL=https://mysermas.com
Advanced deployment configuration
Follow this section if you deploy the SERMAS services under URLs different from the default ones.
API configuration
Read here for the API env configurations options.
Kiosk configuration
The Kiosk is a browser-based web application. It uses camera and video access, thus it require a secure context to work.
By default, it works on localhost:8080
. localhost
is considered a secure context mostly for development activities.
To serve the kiosk on the network or over a website, we need to add some additional configuration.
Follow the configuration needed to serve from an IP in the local network. We will use sermas.lan
as a placeholder (but could be an IP).
-
PRIVATE_API_BASE_URL=http://sermas.lan:8080/api
-
PUBLIC_API_BASE_URL=http://sermas.lan:8080/api
-
PUBLIC_AUTH_URL=http://sermas.lan:8080/keycloak
-
PUBLIC_MQTT_BASE_URL=sermas.lan:8080
-
PUBLIC_TOOLKIT_URL=http://sermas.lan:8080
Note The kiosk on a local network should still run in localhost
to ensure microphone and camera access. Alternatively, the system should be exposed on the web over https.
Securing the setup
Some defaults are used to simplify the development but should be changed in real deployments.
API
AUTH_KEYCLOAK_REALM
set the keycloack realm (default: sermas-local)AUTH_KEYCLOAK_CLIENT_ID
set the keycloack client ID used for administrative purposes (default: platform)AUTH_KEYCLOAK_SECRET
set the keycloack client password used for administrative purposes (default: platform)ADMIN_SERVICE_ACCOUNT_USERNAME
set the keycloack admin user (default: admin)ADMIN_SERVICE_ACCOUNT_PASSWORD
set the keycloack admin password (default: admin)
KIOSK
PRIVATE_AUTH_CLIENT_ID=platform
should match APIAUTH_KEYCLOAK_CLIENT_ID
PRIVATE_AUTH_CLIENT_SECRET=platform
should match APIAUTH_KEYCLOAK_CLIENT_SECRET
PUBLIC_AUTH_REALM
should match APIAUTH_KEYCLOAK_REALM