Skip to content

Coterm

Coterm banner

Convoy terminal is a console proxy for Convoy that hides the Proxmox origin IP address. Written with Rust and utilizing Svelte, Coterm is built for performance, and every millisecond counts.

Quick start

docker run -p 2115:2115 -e CONVOY_URL="<panel url>" -e COTERM_TOKEN="<coterm token>" ghcr.io/convoypanel/coterm:latest

The port can be modified by editing the first number to a different value. For example, if you want to broadcast on port 80, you do ...-p 80:2115.... More information about publishing ports can be found here on the Docker documentation.

Docker compose

While the quick start is an easy way to get up and running, you may want to enable TLS for Coterm to serve console sessions securely. For that reason, we recommend using a docker-compose.yml configuration. The default configuration we have below is for Caddy. You may modify the settings to use other web servers like Nginx, Apache, etc.

Download the example compose file and environment file

sh
curl -o docker-compose.yml https://raw.githubusercontent.com/ConvoyPanel/coterm/develop/docker-compose.example.yml
curl -o .env https://raw.githubusercontent.com/ConvoyPanel/coterm/develop/.env.docker.example

Please open the .env environment file in your editor of choice and populate the variables.

If you need to modify the Caddy web server configuration, please refer to the Caddyfile documentation.

Updating Coterm

Compose file

To update Coterm to the latest version, simply run docker compose pull, docker compose down, and docker compose up -d.

Docker run command

To update Coterm to the latest version, run docker pull ghcr.io/convoypanel/coterm:latest. Then, stop the existing container with docker stop <container id> (you can find the container id by running docker ps). Finally, run the new container with the same command you used to start it.

FAQ

Invalid TLS Certificates

DANGER

This option makes your Coterm vulnerable to man-in-the-middle attacks. Only use this option if you know what you are doing. It's also pretty irresponsible to use this option in production, especially as a hosting provider.

If you are using a self-signed certificate that isn't trusted in the Docker container that's running Coterm, you will get TLS verification errors. Although very insecure, you can set this option in your environment file to disable TLS

ini
DANGEROUS_DISABLE_TLS_VERIFICATION=true

or use this flag on your Docker run command

sh
-e DANGEROUS_DISABLE_TLS_VERIFICATION=true

After setting this option, you will need to restart your Coterm container for the changes to take effect. You can check when you see this message in the logs below.

Console message indicating that Coterm TLS verification is disabled

Released under the Business Source License.