Files
proxmox/docs/04-configuration/MIFOS_REMAINING_STEPS.md
defiQUG fbda1b4beb
Some checks failed
Deploy to Phoenix / deploy (push) Has been cancelled
docs: Ledger Live integration, contract deploy learnings, NEXT_STEPS updates
- ADD_CHAIN138_TO_LEDGER_LIVE: Ledger form done; public code review repo bis-innovations/LedgerLive; init/push commands
- CONTRACT_DEPLOYMENT_RUNBOOK: Chain 138 gas price 1 gwei, 36-addr check, TransactionMirror workaround
- CONTRACT_*: AddressMapper, MirrorManager deployed 2026-02-12; 36-address on-chain check
- NEXT_STEPS_FOR_YOU: Ledger done; steps completable now (no LAN); run-completable-tasks-from-anywhere
- MASTER_INDEX, OPERATOR_OPTIONAL, SMART_CONTRACTS_INVENTORY_SIMPLE: updates
- LEDGER_BLOCKCHAIN_INTEGRATION_COMPLETE: bis-innovations/LedgerLive reference

Co-authored-by: Cursor <cursoragent@cursor.com>
2026-02-12 15:46:57 -08:00

3.6 KiB
Raw Permalink Blame History

Mifos — Remaining Steps (after automated setup)

Last Updated: 2026-02-09
Status: Checklist for operator
Context: LXC 5800 created; Mifos X 24.04.30 (Docker) running on 192.168.11.85:80; DNS mifos.d-bis.org → 76.53.10.41 (A, Proxied).


Done automatically

  • LXC 5800 created on r630-02 (192.168.11.85)
  • Nesting + keyctl + AppArmor unconfined set on 5800
  • Docker + Mifos 24.04.30 (Docker Compose) installed and running in 5800
  • Cloudflare DNS: mifos.d-bis.org → 76.53.10.41 (A record, Proxied) via MIFOS_DNS_MODE=direct ./scripts/cloudflare/configure-mifos-dns.sh

Remaining (manual or with secrets)

1. UDM Pro port forward (for direct access via 76.53.10.41)

  • In UniFi NetworkSettingsFirewall & SecurityPort Forwarding add:
    • 76.53.10.41:80192.168.11.85:80 (TCP)
    • 76.53.10.41:443192.168.11.85:443 (TCP) if you add TLS later
  • Ensure 76.53.10.41 is assigned on the UDM Pro.
  • See UDM_PRO_MIFOS_76_53_10_41_PORT_FORWARD.md.

2. Optional: Cloudflare Tunnel + UK egress (no port forward)

If you want traffic via Tunnel instead of direct IP:

  1. Zero TrustNetworksTunnelsCreate a tunnel → name mifos-r630-02 → copy the tunnel token.
  2. In .env set:
    • CLOUDFLARE_TUNNEL_TOKEN_MIFOS_R630_02='<token>'
    • CLOUDFLARE_TUNNEL_ID_MIFOS_R630_02='<tunnel-uuid>' (from dashboard or cloudflared tunnel list after install)
  3. Run: ./scripts/install-tunnel-mifos-r630-02.sh
  4. In Zero Trust → mifos-r630-02Published application routes: add mifos.d-bis.orgService either http://192.168.11.85:80 (no SSL on origin) or https://192.168.11.85:443 (run ./scripts/mifos/install-nginx-https-5800.sh first, then add Origin config No TLS Verify).
  5. Switch DNS to use the tunnel: In .env set CLOUDFLARE_TUNNEL_ID_MIFOS_R630_02=<tunnel-uuid>, then run:
    MIFOS_DNS_MODE=tunnel ./scripts/cloudflare/configure-mifos-dns.sh
    
    (mifos.d-bis.org becomes CNAME to <tunnel-id>.cfargotunnel.com; no UDM port forward needed for this hostname.)
  6. Regional Services (UK): Zero Trust / Data Localization → Regional Services → attach mifos.d-bis.org → select UK (or EU) region.

3. Change default password

4. Verification

  • Direct (76.53.10.41): After UDM port forward: curl -I https://mifos.d-bis.org
  • Tunnel: After tunnel + DNS switch: same URL; tunnel status in Zero Trust should be Healthy.
  • UK egress: Check Cf-Ray header or Cloudflare analytics for UK colo.

5. Troubleshooting HTTP 530 (tunnel)

Cloudflare returns 530 when the tunnel cant reach the origin. Check:

  1. Run from project root: ./scripts/verify/verify-mifos-tunnel-530.sh
    Confirms: cloudflared active in LXC 5800, and http://127.0.0.1:80 responds inside the container.

  2. Zero Trust → Networks → Tunnelsmifos-r630-02Published application routes

    • For HTTP to origin: Service http://192.168.11.85:80.
    • For HTTPS to origin: Service https://192.168.11.85:443; run ./scripts/mifos/install-nginx-https-5800.sh first, then add an Origin configuration for this route with No TLS Verify (required for self-signed cert).
  3. Tunnel status in the dashboard should be Healthy. If not, restart in 5800:
    ssh root@<r630-02> 'pct exec 5800 -- systemctl restart cloudflared'