mirror of
https://github.com/coder/coder.git
synced 2025-07-15 22:20:27 +00:00
docs: add apache reverse-proxy example (#6213)
* docs: apache reverse proxy * fixed to correctly pass WebSocket headers * add a sample configuration file * updating with suggestions * Update coder.conf * fix http to https redirection * fix: upgrade http to https * Update examples/web-server/apache/README.md Co-authored-by: Ben Potter <me@bpmct.net> * add other dns providers documentation link --------- Co-authored-by: Ben Potter <me@bpmct.net> Co-authored-by: Ben Potter <ben@coder.com>
This commit is contained in:
committed by
GitHub
parent
99306642bb
commit
26876dc734
@ -42,10 +42,11 @@ subdomain that resolves to Coder (e.g. `*.coder.example.com`).
|
|||||||
> If you are providing TLS certificates directly to the Coder server, you must use a single certificate for the
|
> If you are providing TLS certificates directly to the Coder server, you must use a single certificate for the
|
||||||
> root and wildcard domains. Multi-certificate support [is planned](https://github.com/coder/coder/pull/4150).
|
> root and wildcard domains. Multi-certificate support [is planned](https://github.com/coder/coder/pull/4150).
|
||||||
|
|
||||||
## TLS Certificates
|
## TLS & Reverse Proxy
|
||||||
|
|
||||||
The Coder server can directly use TLS certificates with `CODER_TLS_ENABLE` and accompanying configuration flags. However, Coder can also run behind a reverse-proxy to terminate TLS certificates from LetsEncrypt, for example.
|
The Coder server can directly use TLS certificates with `CODER_TLS_ENABLE` and accompanying configuration flags. However, Coder can also run behind a reverse-proxy to terminate TLS certificates from LetsEncrypt, for example.
|
||||||
|
|
||||||
|
- Apache: [Run Coder with Apache and LetsEncrypt](https://github.com/coder/coder/tree/main/examples/web-server/apache)
|
||||||
- Caddy: [Run Coder with Caddy and LetsEncrypt](https://github.com/coder/coder/tree/main/examples/web-server/caddy)
|
- Caddy: [Run Coder with Caddy and LetsEncrypt](https://github.com/coder/coder/tree/main/examples/web-server/caddy)
|
||||||
- NGINX: [Run Coder with Nginx and LetsEncrypt](https://github.com/coder/coder/tree/main/examples/web-server/nginx)
|
- NGINX: [Run Coder with Nginx and LetsEncrypt](https://github.com/coder/coder/tree/main/examples/web-server/nginx)
|
||||||
|
|
||||||
|
156
examples/web-server/apache/README.md
Normal file
156
examples/web-server/apache/README.md
Normal file
@ -0,0 +1,156 @@
|
|||||||
|
# How to use Apache as a reverse-proxy with LetsEncrypt
|
||||||
|
|
||||||
|
## Requirements
|
||||||
|
|
||||||
|
1. Start a Coder deployment and be sure to set the following [configuration values](https://coder.com/docs/v2/latest/admin/configure):
|
||||||
|
|
||||||
|
```console
|
||||||
|
CODER_HTTP_ADDRESS=127.0.0.1:3000
|
||||||
|
CODER_ACCESS_URL=https://coder.example.com
|
||||||
|
CODER_WILDCARD_ACCESS_URL=*coder.example.com
|
||||||
|
```
|
||||||
|
|
||||||
|
Throughout the guide, be sure to replace `coder.example.com` with the domain you intend to use with Coder.
|
||||||
|
|
||||||
|
2. Configure your DNS provider to point your coder.example.com and \*.coder.example.com to your server's public IP address.
|
||||||
|
|
||||||
|
> For example, to use `coder.example.com` as your subdomain, configure `coder.example.com` and `*.coder.example.com` to point to your server's public ip. This can be done by adding A records in your DNS provider's dashboard.
|
||||||
|
|
||||||
|
3. Install Apache (assuming you're on Debian/Ubuntu):
|
||||||
|
|
||||||
|
```console
|
||||||
|
sudo apt install apache2
|
||||||
|
```
|
||||||
|
|
||||||
|
4. Enable the following Apache modules:
|
||||||
|
|
||||||
|
```console
|
||||||
|
sudo a2enmod proxy
|
||||||
|
sudo a2enmod proxy_http
|
||||||
|
sudo a2enmod ssl
|
||||||
|
sudo a2enmod rewrite
|
||||||
|
```
|
||||||
|
|
||||||
|
5. Stop Apache service and disable default site:
|
||||||
|
|
||||||
|
```console
|
||||||
|
sudo a2dissite 000-default.conf
|
||||||
|
sudo systemctl stop apache2
|
||||||
|
```
|
||||||
|
|
||||||
|
## Install and configure LetsEncrypt Certbot
|
||||||
|
|
||||||
|
1. Install LetsEncrypt Certbot: Refer to the [CertBot documentation](https://certbot.eff.org/instructions?ws=apache&os=ubuntufocal&tab=wildcard). Be sure to pick the wildcard tab and select your DNS provider for instructions to install the necessary DNS plugin.
|
||||||
|
|
||||||
|
## Create DNS provider credentials
|
||||||
|
|
||||||
|
> This example assumes you're using CloudFlare as your DNS provider. For other providers, refer to the [CertBot documentation](https://eff-certbot.readthedocs.io/en/stable/using.html#dns-plugins).
|
||||||
|
|
||||||
|
1. Create an API token for the DNS provider you're using: e.g. [CloudFlare](https://dash.cloudflare.com/profile/api-tokens) with the following permissions:
|
||||||
|
|
||||||
|
- Zone - DNS - Edit
|
||||||
|
|
||||||
|
2. Create a file in `.secrets/certbot/cloudflare.ini` with the following content:
|
||||||
|
|
||||||
|
```ini
|
||||||
|
dns_cloudflare_api_token = YOUR_API_TOKEN
|
||||||
|
```
|
||||||
|
|
||||||
|
```console
|
||||||
|
mkdir -p ~/.secrets/certbot
|
||||||
|
touch ~/.secrets/certbot/cloudflare.ini
|
||||||
|
nano ~/.secrets/certbot/cloudflare.ini
|
||||||
|
```
|
||||||
|
|
||||||
|
3. Set the correct permissions:
|
||||||
|
|
||||||
|
```console
|
||||||
|
sudo chmod 600 ~/.secrets/certbot/cloudflare.ini
|
||||||
|
```
|
||||||
|
|
||||||
|
## Create the certificate
|
||||||
|
|
||||||
|
1. Create the wildcard certificate:
|
||||||
|
|
||||||
|
```console
|
||||||
|
sudo certbot certonly --dns-cloudflare --dns-cloudflare-credentials ~/.secrets/certbot/cloudflare.ini -d coder.example.com -d *.coder.example.com
|
||||||
|
```
|
||||||
|
|
||||||
|
## Configure Apache
|
||||||
|
|
||||||
|
> This example assumes Coder is running locally on `127.0.0.1:3000` and that you're using `coder.example.com` as your subdomain.
|
||||||
|
|
||||||
|
1. Create Apache configuration for Coder:
|
||||||
|
|
||||||
|
```console
|
||||||
|
sudo nano /etc/apache2/sites-available/coder.conf
|
||||||
|
```
|
||||||
|
|
||||||
|
2. Add the following content:
|
||||||
|
|
||||||
|
```apache
|
||||||
|
# Redirect HTTP to HTTPS
|
||||||
|
<VirtualHost *:80>
|
||||||
|
ServerName coder.example.com
|
||||||
|
ServerAlias *.coder.example.com
|
||||||
|
Redirect permanent / https://coder.example.com/
|
||||||
|
</VirtualHost>
|
||||||
|
|
||||||
|
<VirtualHost *:443>
|
||||||
|
ServerName coder.example.com
|
||||||
|
ServerAlias *.coder.example.com
|
||||||
|
ErrorLog ${APACHE_LOG_DIR}/error.log
|
||||||
|
CustomLog ${APACHE_LOG_DIR}/access.log combined
|
||||||
|
|
||||||
|
ProxyPass / http://127.0.0.1:3000/
|
||||||
|
ProxyPassReverse / http://127.0.0.1:3000/
|
||||||
|
ProxyRequests Off
|
||||||
|
ProxyPreserveHost On
|
||||||
|
|
||||||
|
RewriteEngine On
|
||||||
|
# Websockets are required for workspace connectivity
|
||||||
|
RewriteCond %{HTTP:Connection} Upgrade [NC]
|
||||||
|
RewriteCond %{HTTP:Upgrade} websocket [NC]
|
||||||
|
RewriteRule /(.*) ws://127.0.0.1:3000/$1 [P,L]
|
||||||
|
|
||||||
|
SSLCertificateFile /etc/letsencrypt/live/coder.example.com/fullchain.pem
|
||||||
|
SSLCertificateKeyFile /etc/letsencrypt/live/coder.example.com/privkey.pem
|
||||||
|
</VirtualHost>
|
||||||
|
```
|
||||||
|
|
||||||
|
> Don't forget to change: `coder.example.com` by your (sub)domain
|
||||||
|
|
||||||
|
3. Enable the site:
|
||||||
|
|
||||||
|
```console
|
||||||
|
sudo a2ensite coder.conf
|
||||||
|
```
|
||||||
|
|
||||||
|
4. Restart Apache:
|
||||||
|
|
||||||
|
```console
|
||||||
|
sudo systemctl restart apache2
|
||||||
|
```
|
||||||
|
|
||||||
|
## Refresh certificates automatically
|
||||||
|
|
||||||
|
1. Create a new file in `/etc/cron.weekly`:
|
||||||
|
|
||||||
|
```console
|
||||||
|
sudo touch /etc/cron.weekly/certbot
|
||||||
|
```
|
||||||
|
|
||||||
|
2. Make it executable:
|
||||||
|
|
||||||
|
```console
|
||||||
|
sudo chmod +x /etc/cron.weekly/certbot
|
||||||
|
```
|
||||||
|
|
||||||
|
3. And add this code:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
#!/bin/sh
|
||||||
|
sudo certbot renew -q
|
||||||
|
```
|
||||||
|
|
||||||
|
And that's it, you should now be able to access Coder at your sub(domain) e.g. `https://coder.example.com`.
|
28
examples/web-server/apache/coder.conf
Normal file
28
examples/web-server/apache/coder.conf
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
<VirtualHost *:80>
|
||||||
|
ServerName coder.example.com
|
||||||
|
ServerAlias *.coder.example.com
|
||||||
|
<Location "/">
|
||||||
|
Redirect permanent "https://%{HTTP_HOST}%{REQUEST_URI}"
|
||||||
|
</Location>
|
||||||
|
</VirtualHost>
|
||||||
|
|
||||||
|
<VirtualHost *:443>
|
||||||
|
ServerName coder.example.com
|
||||||
|
ServerAlias *.coder.example.com
|
||||||
|
ErrorLog ${APACHE_LOG_DIR}/error.log
|
||||||
|
CustomLog ${APACHE_LOG_DIR}/access.log combined
|
||||||
|
|
||||||
|
ProxyPass / http://127.0.0.1:3000/
|
||||||
|
ProxyPassReverse / http://127.0.0.1:3000/
|
||||||
|
ProxyRequests Off
|
||||||
|
ProxyPreserveHost On
|
||||||
|
|
||||||
|
RewriteEngine On
|
||||||
|
RewriteCond %{HTTP:Connection} Upgrade [NC]
|
||||||
|
RewriteCond %{HTTP:Upgrade} websocket [NC]
|
||||||
|
RewriteRule /(.*) ws://127.0.0.1:3000/$1 [P,L]
|
||||||
|
|
||||||
|
SSLCertificateFile /etc/letsencrypt/live/coder.example.com/fullchain.pem
|
||||||
|
SSLCertificateKeyFile /etc/letsencrypt/live/coder.example.com/privkey.pem
|
||||||
|
</VirtualHost>
|
||||||
|
|
Reference in New Issue
Block a user