Docker Compose
(installation guide)- Brief Docker Crash Course
Important Note: If you followed the guide some time ago, it's recommended to clean the existing data:
- Remove containers:
docker-compose down -v
. - Remove docker volumes:
docker-compose rm -f -v
. - Remove
./data
folder, that holds the database. - Download last versions of the images:
docker-compose pull
We recommend using what is available in the .env.sample
file:
cp .env.sample .env
Then edit your .env
and set RPC_NODE_URL
to the chain you want the services running against.
By default, last stable version will be used for every service.
Important Note: Only L2 Safes are supported in the setup provided. Change this at your own risk.
We provide a script to automate this second step, if you want to use it, simply write:
cd scripts
sh run_locally.sh
Start Docker containers:
docker compose pull
docker compose down -v
docker compose up
You will need to identify the ID or name of the containers using docker ps
. To create the default super user for the Safe Config Service, we run the following command:
docker compose exec cfg-web python src/manage.py createsuperuser --noinput
You can now access http://localhost:8000/cfg/admin/ and login using the credentials root/admin
.
To achieve the same for the Safe Transaction service:
docker compose exec txs-web python manage.py createsuperuser --username root
Note 1: note that the path to manage.py
is different. In case you need to run other commands.
We need to be able to define a ChainInfo
object in the Safe Config service so that the Client Gateway knows the URL of the Safe Transaction service instance it needs to request against for a given safe.
Check this section for a guide on the fields for ChainInfo
.
You can do this in the admin interface of the Safe Config service: http://localhost:8000/cfg/admin/chains/chain/add/
.
You can verify that your ChainInfo
was successfully added by going to http://localhost:8000/cfg/api/v1/chains
.
Remember to edit your ChainInfo
json fields transaction_service_uri
and vpc_transaction_service_uri
to point to your local instance of the transaction service. The values should be http://nginx:8000/txs
By default, tx service will auto setup MasterCopies
and Proxy Factories
for
a of networks.
If your network is not supported you have to add the addresses manually in http://localhost:8000/txs/admin/
Our services invalidate the caches of the client gateway using webhooks. Both the Config and Events service need to be configured. For the Config service, unless you've changed the values in cgw.env
and cfg.env
then you don't need to do anything, otherwise:
# Inside the file "container_env_files/cfg.env"
#...
CGW_URL=http://nginx:8000/cgw
CGW_FLUSH_TOKEN=some_random_token
# Inside the file "container_env_files/cgw.env"
AUTH_TOKEN=some_random_token
AUTH_TOKEN
and CGW_FLUSH_TOKEN
must be the same.
For the Events service, follow these steps:
- Access the admin panel at
http://localhost:8000/events/admin
- Default user and password is defined in
container_env_files/events.env
- Click on
Webhook
at the left column and then click onCreate new
- Set the
Url
field tohttp://nginx:8000/cgw/v1/hooks/events
- Set description
CGW
- Enable
Is Active
field - Set the
Authorization
field toBasic <AUTH_TOKEN>
, where<AUTH_TOKEN>
corresponds to the value ofAUTH_TOKEN
in thecontainer_env_files/cgw.env
file of this repository - Leave chains field blank
- Enable every webhook option and click
Save
The Safe Web app will be available at at http://localhost:8000/ although check the output of docker compose
to see that the container is already running, as in some step-ups, it can take longer than expected ( >15 minutes).
Add your NEXT_PUBLIC_INFURA_TOKEN
value if its required for the chain RCP uri in the container_env_files/ui.env file.
Additionally, the Safe Web app itself, defines which instance of the Safe CGW to use in this container_env_files/ui.env file. The value of NEXT_PUBLIC_GATEWAY_URL_PRODUCTION
defines the URL where the Safe CGW can be reached. The default in this repo, points to the instance running as part of the docker-compose.yml
file, but can be adjusted to point to our production instances, or your own hosted instance.
Not recorded by the Safe team, but here you can find an example of setting up Avalanche Fuji C-Chain