mirror of
https://github.com/Telecominfraproject/wlan-docs.git
synced 2025-11-03 12:18:06 +00:00
GitBook: [#11] validate docker compose
This commit is contained in:
BIN
.gitbook/assets/Screen Shot 2021-12-08 at 2.14.02 PM.png
Normal file
BIN
.gitbook/assets/Screen Shot 2021-12-08 at 2.14.02 PM.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 136 KiB |
@@ -107,13 +107,17 @@ openwifi_owsec_1 /docker-entrypoint.sh /ope ... Up 0.0.0.0:16001->1
|
|||||||
openwifi_rttys_1 /rttys/rttys Up 0.0.0.0:5912->5912/tcp,:::5912->5912/tcp, 0.0.0.0:5913->5913/tcp,:::5913->5913/tcp
|
openwifi_rttys_1 /rttys/rttys Up 0.0.0.0:5912->5912/tcp,:::5912->5912/tcp, 0.0.0.0:5913->5913/tcp,:::5913->5913/tcp
|
||||||
```
|
```
|
||||||
|
|
||||||
1. Since the certificate for the REST API and other components is self-signed, you have to add it to the system trust store of the containers communicating together internally via TLS. The `add-ca-cert.sh` script located in the Compose project directory does the work for you.
|
1. Since the certificate for the REST API and other components is self-signed, accepting trust for the self-signed REST API certificate on your local machine is required. \
|
||||||
|
To achieve that you either have to add `certs/restapi-ca.pem` to your trusted browser certificates or add certificate exceptions in your browser by visiting `https://ucentral.wlan.local:16001 and ports :16002 : 16003 :16004 and :16005` \
|
||||||
You also have to trust the self-signed REST API certificate on your local machine. To achieve that you either have to add `certs/restapi-ca.pem` to your trusted browser certificates or add certificate exceptions in your browser by visiting `https://ucentral.wlan.local:16001` and `https://ucentral.wlan.local:16002` and accepting the self-signed SSL certificate warnings (make sure to visit both and add the exceptions).
|
When navigating accept the self-signed SSL certificate warnings (make sure to visit both and add the exceptions).
|
||||||
2. Connect to your AP via SSH and add a static hosts entry in `/etc/hosts` for `openwifi.wlan.local` which points to the address of the host the Compose deployment runs on.
|
2. Connect to your AP via SSH and add a static hosts entry in `/etc/hosts` for `openwifi.wlan.local` which points to the address of the host the Compose deployment runs on.
|
||||||
3. While staying in the SSH session, copy the content of `certs/restapi-ca.pem` on your local machine to your clipboard and append it to the file `/etc/ssl/cert.pem` on the AP. This way your AP will also trust the self-signed certificate.  
|
3. While staying in the SSH session, copy the content of `certs/restapi-ca.pem` on your local machine to your clipboard and append it to the file `/etc/ssl/cert.pem` on the AP. This way your AP will also trust the self-signed certificate.  
|
||||||
4. Go to `http://openwifi.wlan.local` to visit the UI and login with default username and password. You will now be prompted to change this default password to something more secured.  
|
4. Go to `https://openwifi.wlan.local` to visit the UI and login with default username and password. You will now be prompted to change this default password to something more secured.  
|
||||||
5. To use the curl test scripts which are included in the micro service repositories make sure to set the following environment variables before issuing a request:
|
|
||||||
|

|
||||||
|
|
||||||
|
1. To use the curl test scripts which are included in the micro service repositories make sure to set the following environment variables before issuing a request:
|
||||||
|
|
||||||
```
|
```
|
||||||
export UCENTRALSEC="openwifi.wlan.local:16001"
|
export UCENTRALSEC="openwifi.wlan.local:16001"
|
||||||
|
|||||||
Reference in New Issue
Block a user