Phriction Welcome in gitpull.it, a Phabricator instance! Border Radio Reference History Version 3 vs 4
Version 3 vs 4
Version 3 vs 4
Edits
Edits
- Edit by valerio.bozzolan, Version 4
- Aug 11 2020 08:09
- Edit by valerio.bozzolan, Version 3
- May 20 2020 21:40
« Previous Change | Next Change » |
Edit Older Version 3... | Edit Older Version 4... |
Content Changes
Content Changes
This is a reference of the current implementation of #border_radio infrastructure.
== Overview ==
{F32030, size=full}
== Icecast Stream ==
The stream is broadcasted to the people via Icecast. The current installed version can be seen there:
https://packages.debian.org/buster/icecast2
It's served by the main #reyboz webserver.
It's exposed by HTTP (directly via Icecast) and HTTPs (under a frontend Apache webserver).
* http://stream.border-radio.it:8000/radio.mp3
* https://stream.border-radio.it/radio.mp3
== Podcast Drive ==
This is the Border Radio Podcast drive:
* http://static.border-radio.it/podcast/
* https://static.border-radio.it/podcast/
Because storage is expensive, the Border Radio Podcast Drive it's a single board computer with a 1TB hard drive hidden in a LAN. It has a webserver but it's not reachable from itself because actually we have not the ability to configure its router.
In order to be available to the world, that node keep online an SSH reverse tunnel to #reyboz similar to this one:
```
autossh -R 8081:localhost:80 border-tunnel@reyboz
```
And in #reyboz we have a small Apache proxy that exposes the incoming HTTP traffic to that opened `8081` loopback port with something like this:
```
name=/etc/apache2/sites-enabled/border-radio.static.conf
<VirtualHost *:80>
ServerName static.border-radio.it
# serve some local files (just temporary certificates actually)
DocumentRoot /home/www-data/reyboz.it/static/border-radio
# allow to renew let's encrypt certificates when it creates temporary stuff in this directory
ProxyPass "/.well-known" "!"
# proxy enabled by a reverse SSH tunnel from an hidden LAN from a secret single board computer. asd
ProxyPass / http://localhost:8081/border-radio/
ProxyPassReverse / http://localhost:8081/border-radio/
</VirtualHost>
```
== Stream Director ==
We have a computer in the Border Radio LAN.
TODO
== Website ==
* https://border-radio.it/
The website is a WordPress instance installed via the `wordpress` package in Debian GNU/Linux stable (currently codename `buster`). This choice was done in order to keep the website secure via the package manager and do not break the website on unintended WordPress upgrades.
The current WordPress version can be seen there:
* https://packages.debian.org/buster/wordpress
It's served by the main #reyboz webserver.
This is a reference of the current implementation of #border_radio infrastructure currently hosted in #reyboz.
== Overview ==
{F32030, size=full}
== Icecast Stream ==
The stream is broadcasted to the people via Icecast. The current installed version can be seen there:
https://packages.debian.org/buster/icecast2
It's served by the main #reyboz webserver.
It's exposed by HTTP (directly via Icecast) and HTTPs (under a frontend Apache webserver).
* http://stream.border-radio.it:8000/radio.mp3
* https://stream.border-radio.it/radio.mp3
== Podcast Drive ==
This is the Border Radio Podcast drive:
* http://static.border-radio.it/podcast/
* https://static.border-radio.it/podcast/
Because storage is expensive, the Border Radio Podcast Drive it's a single board computer with a 1TB hard drive hidden in a LAN. It has a webserver but it's not reachable from itself because actually we have not the ability to configure its router.
In order to be available to the world, that node keep online an SSH reverse tunnel to #reyboz similar to this one:
```
autossh -R 8081:localhost:80 border-tunnel@reyboz
```
And in #reyboz we have a small Apache proxy that exposes the incoming HTTP traffic to that opened `8081` loopback port with something like this:
```
name=/etc/apache2/sites-enabled/border-radio.static.conf
<VirtualHost *:80>
ServerName static.border-radio.it
# serve some local files (just temporary certificates actually)
DocumentRoot /home/www-data/reyboz.it/static/border-radio
# allow to renew let's encrypt certificates when it creates temporary stuff in this directory
ProxyPass "/.well-known" "!"
# proxy enabled by a reverse SSH tunnel from an hidden LAN from a secret single board computer. asd
ProxyPass / http://localhost:8081/border-radio/
ProxyPassReverse / http://localhost:8081/border-radio/
</VirtualHost>
```
== Stream Director ==
We have a computer in the Border Radio LAN.
TODO
== Website ==
* https://border-radio.it/
The website is a WordPress instance installed via the `wordpress` package in Debian GNU/Linux stable (currently codename `buster`). This choice was done in order to keep the website secure via the package manager and do not break the website on unintended WordPress upgrades.
The current WordPress version can be seen there:
* https://packages.debian.org/buster/wordpress
It's served by the main #reyboz webserver.
This is a reference of the current implementation of #border_radio infrastructure currently hosted in #reyboz.
== Overview ==
{F32030, size=full}
== Icecast Stream ==
The stream is broadcasted to the people via Icecast. The current installed version can be seen there:
https://packages.debian.org/buster/icecast2
It's served by the main #reyboz webserver.
It's exposed by HTTP (directly via Icecast) and HTTPs (under a frontend Apache webserver).
* http://stream.border-radio.it:8000/radio.mp3
* https://stream.border-radio.it/radio.mp3
== Podcast Drive ==
This is the Border Radio Podcast drive:
* http://static.border-radio.it/podcast/
* https://static.border-radio.it/podcast/
Because storage is expensive, the Border Radio Podcast Drive it's a single board computer with a 1TB hard drive hidden in a LAN. It has a webserver but it's not reachable from itself because actually we have not the ability to configure its router.
In order to be available to the world, that node keep online an SSH reverse tunnel to #reyboz similar to this one:
```
autossh -R 8081:localhost:80 border-tunnel@reyboz
```
And in #reyboz we have a small Apache proxy that exposes the incoming HTTP traffic to that opened `8081` loopback port with something like this:
```
name=/etc/apache2/sites-enabled/border-radio.static.conf
<VirtualHost *:80>
ServerName static.border-radio.it
# serve some local files (just temporary certificates actually)
DocumentRoot /home/www-data/reyboz.it/static/border-radio
# allow to renew let's encrypt certificates when it creates temporary stuff in this directory
ProxyPass "/.well-known" "!"
# proxy enabled by a reverse SSH tunnel from an hidden LAN from a secret single board computer. asd
ProxyPass / http://localhost:8081/border-radio/
ProxyPassReverse / http://localhost:8081/border-radio/
</VirtualHost>
```
== Stream Director ==
We have a computer in the Border Radio LAN.
TODO
== Website ==
* https://border-radio.it/
The website is a WordPress instance installed via the `wordpress` package in Debian GNU/Linux stable (currently codename `buster`). This choice was done in order to keep the website secure via the package manager and do not break the website on unintended WordPress upgrades.
The current WordPress version can be seen there:
* https://packages.debian.org/buster/wordpress
It's served by the main #reyboz webserver.
Public contents are in Creative Commons Attribution-ShareAlike 4.0 (CC-BY-SA) or GNU Free Documentation License (at your option) unless otherwise noted. · Contact / Register