Skip to main content

Nginx

This guide is for configuring Nginx for use with Pocket Relay.

Setup

When using a reverse proxy make sure you enable the reverse_proxy mode in the server configuration file. Server Config Reverse Proxy

tip

If you are using the Nginx reverse proxy within Docker through docker-compose you can use the Docker Compose Reverse Proxy example as a base for your setup

info

You can find your Nginx configuration using the guide here: https://docs.nginx.com/nginx/admin-guide/basic-functionality/managing-configuration-files/ it will likely be present at /etc/nginx/nginx.conf

In order to support HTTP Upgrades and X-Real-IP in your Nginx config you'll need to add the following lines inside the location block for your Pocket Relay server:

# Provide server with real IP address of clients
proxy_set_header X-Real-IP $remote_addr;

# Upgrade websocket connections
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;

Its also recommended that you disable proxy buffering in your nginx config for Pocket Relay. With the new tunneling system implemented in v0.6.0 the latency between players could be affected, greatly reducing your experience:

# Disable buffering (Buffering can affect network tunneling latency)
proxy_buffering off;

An example config using this is the following (This example is a modified version of the example found on https://www.nginx.com/blog/websocket-nginx/)


events {}

http {
server {
listen 80;

server_name localhost;

location / {
# Update this with the address and port to your Pocket Relay server
proxy_pass http://server:80;

# Provide server with real IP address of clients
proxy_set_header X-Real-IP $remote_addr;

# Upgrade websocket connections
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_http_version 1.1;

# Disable buffering (Buffering can affect network tunneling latency)
proxy_buffering off;
}
}
}

UDP Tunnel

Only available in beta 0.7

For newer releases beta v0.7 and above there is an alternative network tunnel implementation that enables faster connectivity, if you have this enabled you will need to add the configuration below in order to forward those packets through NGINX

This block is at the top level like the http block in the previous step

stream {
server {
# Update port 8081 with the `external_port` you've specified in your
# udp_tunnel configuration
listen 8081 udp;

# Update port 9032 with the `port` specified in your udp_tunnel configuration
proxy_pass server:9032;
}
}

This requires the NGINX Stream Core Module this should come by default if you are using the NGINX docker image, otherwise you may need to find a guide for installing a version of NGINX with the module.

Sub directories

If you'd like to host the server within a subdirectory you can change the location portion to look like this:

location /test/ {
# Remove the /test/ sub directory prefix from the url before it gets to the server
rewrite /test/(.*) /$1 break;

# ^..the other configuration from previous example
}

If you change the server sub directory in order for the dashboard to work you will need to recompile the dashboard sources to use a different base url, you can do this by cloning the repository from https://github.com/PocketRelay/Dashboard, installing the dependencies, then updating the svelte.config.js file like the following:


import adapter from '@sveltejs/adapter-static';
import { vitePreprocess } from '@sveltejs/kit/vite';

/** @type {import('@sveltejs/kit').Config} */
const config = {
// Consult https://kit.svelte.dev/docs/integrations#preprocessors
// for more information about preprocessors
preprocess: vitePreprocess(),

kit: {
adapter: adapter({
fallback: "index.html"
}),
prerender: {
entries: [],
},
// ADD THIS SECTION HERE
paths: {
// Replace /test with the sub directory you used above in nginx
base: "/test"
}
}
};

export default config;

Once you've updated the config you can build the dashboard sources. Then copy the built sources from the build directory into a new folder name public in the server data folder (data/public)

Client Certificate Auth

Requires client version v0.2.8 or greater for the standalone tool, and version v0.0.4 or later for the asi plugin

When using a reverse proxy like Nginx you can force clients to provide a client "identity" to authorize using the server. This can be helpful if you want to expose your server but only want to allow certain people access to the server.

info

Client certificate auth also prevents users without the identity from accessing the dashboard (Unless manually configured to not), most modern browsers support choosing custom certificates so the solution to this should be as simple as importing the client identity.

Server Portion

The guide below shows a basic configuration with Nginx for enabling client certificate authorization.

If you are using a different reverse proxy, or some other method of enabling client certificate authorization then you can skip to the Client Portion

caution

The guide below only contains the bare minimum configuration changes required, you are expected to properly setup your Nginx configuration yourself


events {}
http {
server {
# Basic TLS serving (You should configure these lines yourself properly)
listen 443 ssl;
ssl_certificate /etc/nginx/server.crt;
ssl_certificate_key /etc/nginx/server.key;

# Specify the client certificate
ssl_client_certificate /etc/nginx/client.crt;
# Verify client certificates
ssl_verify_client on;

# ... other nginx configuration mentioned above
}
}

The important lines from the above example are the following, you can alter the rest to your liking:

# Specify the client certificate
ssl_client_certificate /etc/nginx/client.crt;
# Verify client certificates
ssl_verify_client on;

Client Portion

Once your server is setup to verify client certificates you will need to provide a your client identity to everyone who you would like to allow access to.

Every client will need to be provided a pocket-relay-identity.p12 this file should be a PKCS#12 archive containing the client certificate and private key, this archive must NOT have a password as the Pocket Relay client cannot handle password encrypted identities.

You should place the pocket-relay-identity.p12 file in the same folder as your pocket-relay-client.exe, like the following:

Client identity

note

If you are using the asi plugin client version put the file next to your MassEffect3.exe instead

Make sure your identity file is named exactly pocket-relay-identity.p12 otherwise it will NOT be loaded.

The client will now use that identity when connecting to the server