Installing SFP Server
Availability
✅
❌
From
December 24
This document outlines the system requirements and infrastructure needed to host an SFP server instance. The SFP server is a containerized application that provides API endpoints for Salesforce DevOps automation.
System Requirements
Hardware Requirements
CPU
2 cores
4+ cores
RAM
4 GB
8+ GB
Storage
20 GB
50+ GB
Network
100 Mbps
1 Gbps
Software Requirements
Operating System
Linux (Ubuntu 20.04+)
Docker
20.10.0+
Required for container orchestration
Docker Compose
2.0.0+
Required for multi-container applications
Node.js
16.x+
Required for CLI tools
Network Requirements
443
HTTPS
Primary port for API access (configurable)
3029
API Server
Internal port used by the API server
6379
Redis
Internal port used by Redis
External Dependencies
Supabase
Docker Registry
Access to a Docker registry is required to pull container images:
Default: Uses GitHub Container Registry (ghcr.io)
Custom: Can configure a private registry
Deployment Model
The SFP server is designed to run on a single server with all components deployed as Docker containers:
API Server: Handles HTTP requests and business logic
Worker Containers: Process asynchronous tasks (critical, normal, batch)
Redis: Manages task queues and inter-service communication
Caddy: Handles HTTPS termination and proxying
This single-server deployment is suitable for most teams and workloads. The server components are managed through Docker Compose for simplified orchestration.
Domain and SSL
For production deployments:
Domain Name: Required for production mode
SSL Certificate: Automatically provisioned by Caddy
DNS Configuration: A record pointing to the server IP
Networking
Outbound Traffic
The server requires outbound access to:
GitHub API (api.github.com)
Docker Registry (ghcr.io or custom)
Supabase instance
Salesforce APIs (login.salesforce.com, test.salesforce.com)
Required Secrets
The SFP server requires several secrets to be configured for proper operation. These secrets are used for authentication, database access, and container image retrieval.
Critical Secrets
The following secrets are required for server initialization:
Docker Registry Access
These secrets are required to pull container images from the registry:
DOCKER_REGISTRY
: The Docker registry URL (default: ghcr.io)DOCKER_REGISTRY_TOKEN
: Authentication token for the Docker registry with read access
Database Access
This secret is required for database migrations during initialization:
SUPABASE_DB_URL
: The PostgreSQL connection URL including credentials (format:postgresql://username:password@host:port/database
)
Supabase Configuration
These secrets are required for Supabase integration:
SUPABASE_URL
: URL of your Supabase instanceSUPABASE_SERVICE_KEY
: Service key for Supabase API accessSUPABASE_ANON_KEY
: Anonymous key for public Supabase accessSUPABASE_JWT_SECRET
: JWT secret for authentication token generationSUPABASE_ENCRYPTION_KEY
: Key used for encrypting sensitive data in the database
GitHub Integration
These secrets are required for GitHub operations:
GITHUB_TOKEN
: GitHub personal access token with appropriate scopesGITHUB_APP_ID
: GitHub App ID (if using GitHub Apps instead of PAT)GITHUB_APP_PRIVATE_KEY
: GitHub App private key (if using GitHub Apps instead of PAT)
Authentication Configuration
These secrets are required for authentication:
AUTH_USE_GLOBAL_AUTH
: Whether to use global authentication service (true/false)AUTH_SUPABASE_URL
: URL for authentication Supabase instanceAUTH_SUPABASE_ANON_KEY
: Anonymous key for authentication Supabase instanceGLOBALSUPABASE_JWTSECRET
: JWT secret for global authentication (if using global auth)
Secrets Management Options
The server supports different methods for providing these secrets:
Environment Variables (recommended)
Set secrets as environment variables before running the init command
Example:
export DOCKER_REGISTRY=ghcr.io && export DOCKER_REGISTRY_TOKEN=your-token && sfp server init --tenant my-app --secrets-provider custom
Interactive Mode
The system will prompt for required secrets during initialization
Example:
sfp server init --tenant my-app --interactive
Configuration File
Provide secrets in a JSON configuration file
Example:
sfp server init --tenant my-app --config-file ./server-config.json
Infisical Integration
Use Infisical for secure secrets management
Example:
sfp server init --tenant my-app --secrets-provider infisical --infisical-token your-token --infisical-workspace your-workspace
Last updated