Compare commits

..

2 Commits

Author SHA1 Message Date
97be5543f9 chore: update readme 2023-03-22 17:01:31 +01:00
212559c8fc authentik autoconfiguration 2023-03-22 17:01:22 +01:00
11 changed files with 58 additions and 115 deletions

View File

@ -31,19 +31,3 @@ steps:
trigger: trigger:
branch: branch:
- main - main
---
kind: pipeline
name: generate recipe catalogue
steps:
- name: release a new version
image: plugins/downstream
settings:
server: https://build.coopcloud.tech
token:
from_secret: drone_abra-bot_token
fork: true
repositories:
- coop-cloud/auto-recipes-catalogue-json
trigger:
event: tag

View File

@ -1,6 +1,4 @@
TYPE=nextcloud TYPE=nextcloud
TIMEOUT=500
ENABLE_AUTO_UPDATE=true
DOMAIN=nextcloud.example.com DOMAIN=nextcloud.example.com
## Domain aliases ## Domain aliases
@ -11,8 +9,6 @@ COMPOSE_FILE="compose.yml"
COMPOSE_FILE="$COMPOSE_FILE:compose.mariadb.yml" COMPOSE_FILE="$COMPOSE_FILE:compose.mariadb.yml"
#COMPOSE_FILE="$COMPOSE_FILE:compose.postgres.yml" #COMPOSE_FILE="$COMPOSE_FILE:compose.postgres.yml"
#MAX_DB_CONNECTIONS=500
ADMIN_USER=admin ADMIN_USER=admin
SECRET_DB_ROOT_PASSWORD_VERSION=v1 SECRET_DB_ROOT_PASSWORD_VERSION=v1
@ -21,12 +17,11 @@ SECRET_ADMIN_PASSWORD_VERSION=v1
EXTRA_VOLUME=/dev/null:/tmp/.dummy EXTRA_VOLUME=/dev/null:/tmp/.dummy
PHP_MEMORY_LIMIT=1G
# fpm-tune, see: https://spot13.com/pmcalculator/ # fpm-tune, see: https://spot13.com/pmcalculator/
FPM_MAX_CHILDREN=16 FPM_MAX_CHILDREN=131
FPM_START_SERVERS=4 FPM_START_SERVERS=32
FPM_MIN_SPARE_SERVERS=4 FPM_MIN_SPARE_SERVERS=32
FPM_MAX_SPARE_SERVERS=12 FPM_MAX_SPARE_SERVERS=98
DEFAULT_QUOTA="10 GB" DEFAULT_QUOTA="10 GB"
@ -60,5 +55,5 @@ DEFAULT_QUOTA="10 GB"
# COMPOSE_FILE="$COMPOSE_FILE:compose.authentik.yml" # COMPOSE_FILE="$COMPOSE_FILE:compose.authentik.yml"
# AUTHENTIK_USER_PREFIX=authentik # AUTHENTIK_USER_PREFIX=authentik
# AUTHENTIK_DOMAIN=authentik.example.com # AUTHENTIK_DOMAIN=authentik.example.com
# SECRET_AUTHENTIK_SECRET_VERSION=v1 # AUTHENTIK_SECRET_NAME=authentik_example_com_nextcloud_secret_v1 # the same as in authentik
# SECRET_AUTHENTIK_ID_VERSION=v1 # AUTHENTIK_ID_NAME=authentik_example_com_nextcloud_id_v1 # the same as in authentik

View File

@ -120,7 +120,7 @@ Use [this plugin](https://github.com/pulsejet/nextcloud-oidc-login). Unlike the
``` ```
'oidc_login_client_id' => 'nextcloud', 'oidc_login_client_id' => 'nextcloud',
'oidc_login_client_secret' => 'mysecret', 'oidc_login_client_secret' => 'mysecret',
'oidc_login_provider_url' => 'https://example.com/realms/myrealm', 'oidc_login_provider_url' => 'https://example.com/auth/realms/myrealm',
'oidc_login_disable_registration' => false, 'oidc_login_disable_registration' => false,
'oidc_login_hide_password_form' => true, 'oidc_login_hide_password_form' => true,
'oidc_login_button_text' => 'Log in with your myssodomain', 'oidc_login_button_text' => 'Log in with your myssodomain',

71
abra.sh
View File

@ -2,78 +2,62 @@
export FPM_TUNE_VERSION=v5 export FPM_TUNE_VERSION=v5
export NGINX_CONF_VERSION=v4 export NGINX_CONF_VERSION=v4
export MY_CNF_VERSION=v5 export MY_CNF_VERSION=v4
export ENTRYPOINT_VERSION=v3 export ENTRYPOINT_VERSION=v3
run_occ() { run_occ(){
su -p www-data -s /bin/sh -c "/var/www/html/occ $@" su -p www-data -s /bin/sh -c "/var/www/html/occ $@"
} }
post_install_occ() { post_install_occ(){
IFS='|' read -ra CMD <<<"$OCC_CMDS" IFS='|' read -ra CMD <<< "$OCC_CMDS"
for cmd in "${CMD[@]}"; do for cmd in "${CMD[@]}"; do
run_occ "$cmd" run_occ "$cmd"
done done
} }
install_apps() { install_apps(){
install_apps="$@" install_apps="$@"
if [ -z "$install_apps" ]; then if [ -z "$install_apps" ]
then
install_apps=$APPS install_apps=$APPS
fi fi
for app in $install_apps; do for app in $install_apps
do
run_occ "app:install $app" run_occ "app:install $app"
done done
} }
set_app_config() { set_app_config(){
APP=$1 APP=$1
KEY=$2 KEY=$2
VALUE=$3 VALUE=$3
run_occ "config:app:set $APP $KEY --value '$VALUE'" run_occ "config:app:set $APP $KEY --value '$VALUE'"
} }
set_system_config() { install_bbb(){
KEY=$1
VALUE=$2
run_occ "config:system:set $KEY --value '$VALUE'"
}
set_trusted_proxies() {
trusted_proxies="$@"
if [ -z "$1" ]; then
trusted_proxies="$TRUSTED_PROXIES"
fi
set_system_config trusted_proxies "$trusted_proxies"
}
set_logfile_stdout() {
set_system_config logfile '/dev/stdout'
}
install_bbb() {
install_apps bbb install_apps bbb
set_app_config bbb app.navigation true set_app_config bbb app.navigation true
set_app_config bbb api.url "$BBB_URL" set_app_config bbb api.url "$BBB_URL"
set_app_config bbb api.secret "$(cat /run/secrets/bbb_secret)" set_app_config bbb api.secret "$(cat /run/secrets/bbb_secret)"
} }
install_onlyoffice() { install_onlyoffice(){
install_apps onlyoffice install_apps onlyoffice
set_app_config onlyoffice DocumentServerUrl "$ONLYOFFICE_URL" set_app_config onlyoffice DocumentServerUrl "$ONLYOFFICE_URL"
set_app_config onlyoffice jwt_secret "$(cat /run/secrets/onlyoffice_jwt)" set_app_config onlyoffice jwt_secret "$(cat /run/secrets/onlyoffice_jwt)"
set_app_config onlyoffice customizationForcesave true set_app_config onlyoffice customizationForcesave true
} }
set_default_quota() { set_default_quota(){
set_app_config files default_quota "$DEFAULT_QUOTA" set_app_config files default_quota '"$DEFAULT_QUOTA"'
} }
set_authentik() { set_authentik(){
install_apps sociallogin install_apps sociallogin
AUTHENTIK_SECRET=$(cat /run/secrets/authentik_secret) AUTHENTIK_SECRET=$(cat /run/secrets/authentik_secret)
AUTHENTIK_ID=$(cat /run/secrets/authentik_id) AUTHENTIK_ID=$(cat /run/secrets/authentik_id)
set_app_config sociallogin custom_providers " set_app_config sociallogin custom_providers "
{ {
\"custom_oidc\":[ \"custom_oidc\":[
{ {
@ -91,17 +75,16 @@ set_authentik() {
\"style\":\"openid\", \"style\":\"openid\",
\"defaultGroup\":\"\", \"defaultGroup\":\"\",
\"groupMapping\": { \"groupMapping\": {
\"admin\": \"admin\", \"admin\": \"admin\"
\"authentik Admins\": \"admin\"
} }
} }
] ]
}" }"
set_app_config sociallogin update_profile_on_login 1 set_app_config sociallogin update_profile_on_login 1
set_app_config sociallogin auto_create_groups 1 set_app_config sociallogin auto_create_groups 1
set_app_config sociallogin hide_default_login 1 set_app_config sociallogin hide_default_login 1
run_occ 'config:system:set social_login_auto_redirect --value true' run_occ 'config:system:set social_login_auto_redirect --value true'
run_occ 'config:system:set allow_user_to_change_display_name --value=false' run_occ 'config:system:set allow_user_to_change_display_name --value=false'
run_occ 'config:system:set lost_password_link --value=disabled' run_occ 'config:system:set lost_password_link --value=disabled'
} }

View File

@ -8,7 +8,7 @@ services:
secrets: secrets:
authentik_secret: authentik_secret:
external: true external: true
name: ${STACK_NAME}_authentik_secret_${SECRET_AUTHENTIK_SECRET_VERSION} name: ${AUTHENTIK_SECRET_NAME}
authentik_id: authentik_id:
external: true external: true
name: ${STACK_NAME}_authentik_id_${SECRET_AUTHENTIK_ID_VERSION} name: ${AUTHENTIK_ID_NAME}

View File

@ -15,7 +15,6 @@ services:
- MYSQL_USER=nextcloud - MYSQL_USER=nextcloud
- MYSQL_PASSWORD_FILE=/run/secrets/db_password - MYSQL_PASSWORD_FILE=/run/secrets/db_password
- MYSQL_ROOT_PASSWORD_FILE=/run/secrets/db_root_password - MYSQL_ROOT_PASSWORD_FILE=/run/secrets/db_root_password
- MAX_DB_CONNECTIONS=${MAX_DB_CONNECTIONS:-100}
configs: configs:
- source: my_tune - source: my_tune
target: /etc/mysql/conf.d/my-tune.cnf target: /etc/mysql/conf.d/my-tune.cnf
@ -29,9 +28,9 @@ services:
deploy: deploy:
labels: labels:
backupbot.backup: "true" backupbot.backup: "true"
backupbot.backup.pre-hook: 'mysqldump --single-transaction -u root -p"$$(cat /run/secrets/db_root_password)" nextcloud > /var/lib/mysql/backup.sql' backupbot.backup.pre-hook: 'mkdir -p /tmp/backup/ && mysqldump --single-transaction -u root -p"$$(cat /run/secrets/db_root_password)" nextcloud > /tmp/backup/backup.sql'
backupbot.backup.post-hook: "rm -rf /var/lib/mysql/backup.sql" backupbot.backup.post-hook: "rm -rf /tmp/backup"
backupbot.backup.path: "/var/lib/mysql/backup.sql" backupbot.backup.path: "/tmp/backup/"
healthcheck: healthcheck:
test: ["CMD-SHELL", 'mysqladmin -p"$$(cat /run/secrets/db_root_password)" ping'] test: ["CMD-SHELL", 'mysqladmin -p"$$(cat /run/secrets/db_root_password)" ping']
interval: 30s interval: 30s
@ -42,7 +41,6 @@ configs:
my_tune: my_tune:
name: ${STACK_NAME}_my_cnf_${MY_CNF_VERSION} name: ${STACK_NAME}_my_cnf_${MY_CNF_VERSION}
file: my-tune.cnf file: my-tune.cnf
template_driver: golang
volumes: volumes:
mariadb: mariadb:

View File

@ -11,28 +11,27 @@ services:
db: db:
image: "postgres:12" image: "postgres:12"
command: -c "max_connections=${MAX_DB_CONNECTIONS:-100}"
volumes: volumes:
- "postgres:/var/lib/postgresql/data" - "postgres:/var/lib/postgresql/data"
networks: networks:
- internal - internal
environment: environment:
POSTGRES_USER: nextcloud POSTGRES_USER: nextcloud
POSTGRES_PASSWORD_FILE: /run/secrets/db_password POSTGRES_PASSWORD_FILE: /run/secrets/db_password
POSTGRES_DB: nextcloud POSTGRES_DB: nextcloud
secrets: secrets:
- db_password - db_password
healthcheck: healthcheck:
test: ["CMD-SHELL", "pg_isready", "-U", "nextcloud"] test: ["CMD-SHELL", "pg_isready"]
interval: 10s interval: 10s
timeout: 5s timeout: 5s
retries: 5 retries: 5
deploy: deploy:
labels: labels:
backupbot.backup: "true" backupbot.backup: "true"
backupbot.backup.pre-hook: "PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /var/lib/postgresql/data/backup.sql" backupbot.backup.pre-hook: "mkdir -p /tmp/backup/ && PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /tmp/backup/backup.sql"
backupbot.backup.post-hook: "rm -rf /var/lib/postgresql/data/backup.sql" backupbot.backup.post-hook: "rm -rf /tmp/backup"
backupbot.backup.path: "/var/lib/postgresql/data/" backupbot.backup.path: "/tmp/backup/"
volumes: volumes:
postgres: postgres:

View File

@ -1,7 +1,7 @@
version: "3.8" version: "3.8"
services: services:
web: web:
image: nginx:1.25.1 image: nginx:1.23.3
configs: configs:
- source: nginx_conf - source: nginx_conf
target: /etc/nginx/nginx.conf target: /etc/nginx/nginx.conf
@ -33,9 +33,6 @@ services:
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect" - "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true" - "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}" - "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
- "caddy=${DOMAIN}"
- "caddy.reverse_proxy={{upstreams 80}}"
- "caddy.tls.on_demand="
healthcheck: healthcheck:
test: ["CMD-SHELL", 'curl -s -N curl -Ns localhost/status.php | grep "installed\":true"'] test: ["CMD-SHELL", 'curl -s -N curl -Ns localhost/status.php | grep "installed\":true"']
interval: 30s interval: 30s
@ -44,12 +41,12 @@ services:
start_period: 5m start_period: 5m
app: app:
image: nextcloud:27.0.1-fpm image: nextcloud:25.0.4-fpm
depends_on: depends_on:
- db - db
configs: configs:
- source: fpm_tune - source: fpm_tune
target: /usr/local/etc/php-fpm.d/zzz-fpm-tune.conf target: /usr/local/etc/php-fpm.d/fpm-tune.conf
- source: entrypoint - source: entrypoint
target: /custom-entrypoint.sh target: /custom-entrypoint.sh
mode: 555 mode: 555
@ -67,14 +64,14 @@ services:
- NEXTCLOUD_ADMIN_USER=${ADMIN_USER} - NEXTCLOUD_ADMIN_USER=${ADMIN_USER}
- NEXTCLOUD_ADMIN_PASSWORD_FILE=/run/secrets/admin_password - NEXTCLOUD_ADMIN_PASSWORD_FILE=/run/secrets/admin_password
- NEXTCLOUD_TRUSTED_DOMAINS=${DOMAIN} - NEXTCLOUD_TRUSTED_DOMAINS=${DOMAIN}
- TRUSTED_PROXIES=10.0.0.0/8 - TRUSTED_PROXIES=traefik
- REDIS_HOST=cache - REDIS_HOST=cache
- OVERWRITEPROTOCOL=https - OVERWRITEPROTOCOL=https
- PHP_MEMORY_LIMIT=${PHP_MEMORY_LIMIT:-1G} - PHP_MEMORY_LIMIT=1G
- FPM_MAX_CHILDREN=${FPM_MAX_CHILDREN:-131} - FPM_MAX_CHILDREN=131
- FPM_START_SERVERS=${FPM_START_SERVERS:-32} - FPM_START_SERVERS=32
- FPM_MIN_SPARE_SERVERS=${FPM_MIN_SPARE_SERVERS:-32} - FPM_MIN_SPARE_SERVERS=32
- FPM_MAX_SPARE_SERVERS=${FPM_MAX_SPARE_SERVERS:-98} - FPM_MAX_SPARE_SERVERS=98
- DEFAULT_QUOTA - DEFAULT_QUOTA
volumes: volumes:
- nextcloud:/var/www/html/ - nextcloud:/var/www/html/
@ -89,8 +86,7 @@ services:
failure_action: rollback failure_action: rollback
order: start-first order: start-first
labels: labels:
- "coop-cloud.${STACK_NAME}.version=5.0.3+27.0.1-fpm" - "coop-cloud.${STACK_NAME}.version=3.1.2+25.0.4-fpm"
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
- "backupbot.backup=true" - "backupbot.backup=true"
- "backupbot.backup.path=/var/www/html/config/,/var/www/html/data/,/var/www/html/custom_apps/" - "backupbot.backup.path=/var/www/html/config/,/var/www/html/data/,/var/www/html/custom_apps/"
healthcheck: healthcheck:
@ -101,7 +97,7 @@ services:
start_period: 5m start_period: 5m
cron: cron:
image: nextcloud:27.0.1-fpm image: nextcloud:25.0.4-fpm
volumes: volumes:
- nextcloud:/var/www/html/ - nextcloud:/var/www/html/
- nextapps:/var/www/html/custom_apps:cached - nextapps:/var/www/html/custom_apps:cached
@ -113,7 +109,7 @@ services:
entrypoint: /cron.sh entrypoint: /cron.sh
cache: cache:
image: redis:7.0.12-alpine image: redis:7.0.9-alpine
networks: networks:
- internal - internal
volumes: volumes:

View File

@ -13,7 +13,7 @@ key_buffer_size = 16M
innodb_log_file_size = 256M innodb_log_file_size = 256M
long_query_time = 1 long_query_time = 1
max_allowed_packet = 256M max_allowed_packet = 256M
max_connections = {{ env "MAX_DB_CONNECTIONS" }} max_connections = 100
max_heap_table_size = 64M max_heap_table_size = 64M
max_user_connections = 0 max_user_connections = 0
myisam_recover_options = BACKUP myisam_recover_options = BACKUP

View File

@ -1,11 +0,0 @@
If the authentik configuration should be handled by abra add the following to the env:
COMPOSE_FILE="$COMPOSE_FILE:compose.authentik.yml"
AUTHENTIK_USER_PREFIX=authentik
AUTHENTIK_DOMAIN=authentik.example.com
AUTHENTIK_SECRET_NAME=authentik_example_com_nextcloud_secret_v1 # the same as in authentik
AUTHENTIK_ID_NAME=authentik_example_com_nextcloud_id_v1 # the same as in authentik
And run:
abra app cmd <app-name> app set_authentik

View File

@ -1 +0,0 @@
The authentik secrets need to be inserted again, as nextcloud is not sharing the secret with authentik any more.