diff --git a/hush-lite-server.md b/hush-lite-server.md index c2fdd4e..1b625c1 100644 --- a/hush-lite-server.md +++ b/hush-lite-server.md @@ -83,8 +83,14 @@ Install your preferred distro. In this example I am using a VPS running Ubuntu 2 ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot location / { - grpc_pass grpc://localhost:9067; - } + # Replace 9067 with the port of your gRPC server if using a custom port + # Hush Smart Chains should use a different port than 9067 so it doesn't conflict with HUSH lightwalletd + # NOTE: it's only safe to use --no-tls on lightwalletd if this is on localhost + grpc_pass grpc://localhost:9067; + proxy_redirect off; + proxy_set_header Host $host; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + } # Originally posted by Duke in /hush/hush3/issues/102#issuecomment-1651 @@ -122,11 +128,16 @@ Install your preferred distro. In this example I am using a VPS running Ubuntu 2 ``` 1. Run the lightwalletd frontend with the following and your server's hostname: - ```shell script - go run cmd/server/main.go -bind-addr your_host.net:9067 -conf-file /home/YOUR_USERNAME_Running_Hushd/.komodo/HUSH3/HUSH3.conf -no-tls ``` + ./start.sh + ``` + +If you see the following error `"Can't create data directory: /var/lib/lightwalletd"` you need to set the correct user permissions: - Note: Above we use the "-no-tls" option as we are using NGINX as a reverse proxy and letting it handle the TLS authentication for us. +``` +sudo chown -R $USER:$USER /var/lib/lightwalletd +sudo chmod -R 755 /var/lib/lightwalletd +``` Note: You can configure lightwalletd to handle its own TLS authentication, but you will have to consult the [lightwalletd documentation](https://git.hush.is/hush/lightwalletd) for that setup.