Add documentation for all user/operator-facing changes introduced by the security review branch: rate limits, security headers, webhook HMAC verification, payload size limits, gateway token redaction, non-root containers, agent token logging, and prompt injection mitigation. Updated: docs/reference/api.md, docs/reference/authentication.md, docs/reference/configuration.md, docs/deployment/README.md, docs/operations/README.md, docs/openclaw_gateway_ws.md, backend/README.md. Created: docs/reference/security.md (consolidated security reference). Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
115 lines
3.2 KiB
Markdown
115 lines
3.2 KiB
Markdown
# Deployment
|
|
|
|
This section covers deploying Mission Control in self-hosted environments.
|
|
|
|
> **Goal**
|
|
> A simple, reproducible deploy that preserves the Postgres volume and supports safe upgrades.
|
|
|
|
## Deployment mode: single host (Docker Compose)
|
|
|
|
### Prerequisites
|
|
|
|
- Docker + Docker Compose v2 (`docker compose`)
|
|
- A host where the **browser** can reach the backend URL you configure (see `NEXT_PUBLIC_API_URL` below)
|
|
|
|
### 1) Configure environment
|
|
|
|
From repo root:
|
|
|
|
```bash
|
|
cp .env.example .env
|
|
```
|
|
|
|
Edit `.env`:
|
|
|
|
- `AUTH_MODE=local` (default)
|
|
- **Set** `LOCAL_AUTH_TOKEN` to a non-placeholder value (≥ 50 chars)
|
|
- Ensure `NEXT_PUBLIC_API_URL` is reachable from the browser (not a Docker-internal hostname)
|
|
|
|
Key variables (from `.env.example` / `compose.yml`):
|
|
|
|
- Frontend: `FRONTEND_PORT` (default `3000`)
|
|
- Backend: `BACKEND_PORT` (default `8000`)
|
|
- Postgres: `POSTGRES_DB`, `POSTGRES_USER`, `POSTGRES_PASSWORD`, `POSTGRES_PORT`
|
|
- Backend:
|
|
- `DB_AUTO_MIGRATE` (default `true` in compose)
|
|
- `CORS_ORIGINS` (default `http://localhost:3000`)
|
|
- Security headers (see [configuration reference](../reference/configuration.md)):
|
|
- `SECURITY_HEADER_X_CONTENT_TYPE_OPTIONS` (default `nosniff`)
|
|
- `SECURITY_HEADER_X_FRAME_OPTIONS` (default `DENY`)
|
|
- `SECURITY_HEADER_REFERRER_POLICY` (default `strict-origin-when-cross-origin`)
|
|
|
|
### 2) Start the stack
|
|
|
|
```bash
|
|
docker compose -f compose.yml --env-file .env up -d --build
|
|
```
|
|
|
|
Open:
|
|
|
|
- Frontend: `http://localhost:${FRONTEND_PORT:-3000}`
|
|
- Backend health: `http://localhost:${BACKEND_PORT:-8000}/healthz`
|
|
|
|
### 3) Verify
|
|
|
|
```bash
|
|
curl -f "http://localhost:${BACKEND_PORT:-8000}/healthz"
|
|
```
|
|
|
|
If the frontend loads but API calls fail, double-check:
|
|
|
|
- `NEXT_PUBLIC_API_URL` is set and reachable from the **browser**
|
|
- backend CORS includes the frontend origin (`CORS_ORIGINS`)
|
|
|
|
## Database persistence
|
|
|
|
The Compose stack uses a named volume:
|
|
|
|
- `postgres_data` → `/var/lib/postgresql/data`
|
|
|
|
This means:
|
|
|
|
- `docker compose ... down` preserves data
|
|
- `docker compose ... down -v` is **destructive** (deletes the DB volume)
|
|
|
|
## Migrations / upgrades
|
|
|
|
### Default behavior in Compose
|
|
|
|
In `compose.yml`, the backend container defaults:
|
|
|
|
- `DB_AUTO_MIGRATE=true`
|
|
|
|
So on startup the backend will attempt to run Alembic migrations automatically.
|
|
|
|
> **Warning**
|
|
> For zero/near-zero downtime, migrations must be **backward compatible** with the currently running app if you do rolling deploys.
|
|
|
|
### Safer operator pattern (manual migrations)
|
|
|
|
If you want more control, set `DB_AUTO_MIGRATE=false` and run migrations explicitly during deploy:
|
|
|
|
```bash
|
|
cd backend
|
|
uv run alembic upgrade head
|
|
```
|
|
|
|
## Container security
|
|
|
|
Both the backend and frontend Docker containers run as a **non-root user** (`appuser`). This is a security hardening measure.
|
|
|
|
If you bind-mount host directories into the containers, ensure the mounted paths are readable (and writable, if needed) by the container's non-root user. You can check the UID/GID with:
|
|
|
|
```bash
|
|
docker compose exec backend id
|
|
```
|
|
|
|
## Reverse proxy / TLS
|
|
|
|
Typical setup (outline):
|
|
|
|
- Put the frontend behind HTTPS (reverse proxy)
|
|
- Ensure the frontend can reach the backend over the configured `NEXT_PUBLIC_API_URL`
|
|
|
|
This section is intentionally minimal until we standardize a recommended proxy (Caddy/Nginx/Traefik).
|