Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
C
compose.libre.sh
Manage
Activity
Members
Labels
Plan
Issues
1
Issue boards
Milestones
Wiki
Code
Merge requests
0
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Model registry
Operate
Environments
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
ecobytes
compose.libre.sh
Commits
3cff7537
Commit
3cff7537
authored
10 years ago
by
Michiel de Jong
Browse files
Options
Downloads
Patches
Plain Diff
corrections in add-user instructions
parent
cd28b2fd
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
doc/deploying-a-server.md
+7
-7
7 additions, 7 deletions
doc/deploying-a-server.md
with
7 additions
and
7 deletions
doc/deploying-a-server.md
+
7
−
7
View file @
3cff7537
...
...
@@ -21,9 +21,10 @@ Make sure you read [getting started](getting-started-as-a-hoster.md) first.
*
For each site you want to deploy on the server, e.g. example.com, do the following:
*
Does example.com already exist as a domain name?
*
If yes, then find out to what extent it's currently in use (and needs to be migrated with care). There are a few options:
*
Transfer the domain into your DNR account
.
*
Transfer the domain into your DNR account
*
Set up DNS hosting for it and ask the owner to set authoritative DNS to the DNS servers you control
*
Ask the user to keep DNR and DNS control where it is currently, but to switch DNS when it's ready at the new server
*
Ask the user to keep DNR and DNS control where it is currently, but to switch DNS when it's ready at the new server, and every time
you add or remove an IP address (not a good idea, unless the user insists that they prefer this option)
*
In any case, you will probably need access to the hostmaster@example.com email address, for the StartSSL process
*before*
the final DNS switch. You could also ask them to tell you the verification code that arrives there, but that has to be done
in real time, immediately when you click 'verify' in the StartSSL UI. If they forward the email the next day, then the token
...
...
@@ -36,9 +37,8 @@ Make sure you read [getting started](getting-started-as-a-hoster.md) first.
(from StartSSL or elswhere) for example.com and concatenate the certificate
and its unencrypted private key into
`indiehosters/user-data/example.com/tls.pem`
*
Make sure the TLS certificate is valid (use
`scripts/check-cert.sh`
for this).
*
Now run
`deploy/add-site.sh k3 example.com https://github.com/someone/example.com.git
`
again. It will make sure the server is in the
correct state, and scp the user data and the
*
Now run
`deploy/add-site.sh k3 example.com
../hoster-data/TLS/example.com.pem
https://github.com/someone/example.com.git
root`
.
It will make sure the server is in the
correct state, and
git pull and
scp the user data and the
approved cert into place, start a container running the image requested, update haproxy config, and restart the haproxy container.
*
Test the site using your /etc/hosts. If you did not import data, there should be some default message there.
*
Switch DNS and note down the current DNS situation (or if you're hosting
a subdomain of another domain, update whichever is the zone file you edited).
*
Test the site using your /etc/hosts. You should see the data from the git repo on both http and https.
*
Switch DNS and monitoring.
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment