Compare commits

7 Commits

Author SHA1 Message Date
5f610c96ce more s3 env 2025-06-30 20:10:10 +01:00
1bdd42fa9f UPLOADS_S3_DEFAULT_URL 2025-06-29 11:16:20 +01:00
4195dafa38 ENABLE_SSO_PROVIDER 2025-06-29 11:14:25 +01:00
4371d2fedf more SSO env 2025-06-29 11:13:18 +01:00
0c1f6038d6 more SSO config 2025-06-28 11:14:36 +01:00
e0291cb1fa cleanup 2025-06-27 15:17:52 +01:00
966c717638 misc 2025-04-21 17:57:43 +01:00
4 changed files with 56 additions and 24 deletions

View File

@ -40,9 +40,6 @@ ENABLE_BACKUPS=true
# what service to use for sending out emails (eg. smtp, mailgun, none) NOTE: you should also set the corresponding keys in secrets.env
MAIL_BACKEND=none
# require an email address to be invited before being able to sign up? (true or false)
INVITE_ONLY=true
# uncomment in order to NOT automatically change the database schema when you upgrade the app
# DISABLE_DB_AUTOMIGRATION=true
@ -62,8 +59,6 @@ LOG_LEVEL=info
# and do not check your env file into any public git repo
# change ALL the values:
# if `INVITE_ONLY` is true, what should be the secret code to sign up?
# INVITE_KEY=123
# signup to an email service and edit with relevant info, see: https://docs.bonfirenetworks.org/Bonfire.Mailer.html
# MAIL_DOMAIN=mgo.example.com
@ -92,20 +87,41 @@ LOG_LEVEL=info
# UPLOADS_S3_HOST=s3.fr-par.scw.cloud
# UPLOADS_S3_SCHEME=https://
# UPLOADS_S3_URL=
# UPLOADS_S3_DEFAULT_URL=
# AWS_ROLE_ARN=
# AWS_WEB_IDENTITY_TOKEN_FILE=
# OpenID Connect:
# Enable using Bonfire as an SSO provider for external apps to sign in with?
# ENABLE_SSO_PROVIDER=false
# OpenID Connect: connect as a client to the OpenID Connect provider with callback url https://yourinstance.tld/oauth/client/openid_1
# OPENID_1_DISCOVERY=
# OPENID_1_DISPLAY_NAME=
# OPENID_1_CLIENT_ID=
# OPENID_1_CLIENT_SECRET=
# OPENID_1_SCOPE=
# OPENID_1_RESPONSE_TYPE=code
# OPENID_1_ENABLE_SIGNUP=false
# ^ can be code, token or id_token
# orcid.org SSO: connect as a client to the orcid.org OpenID Connect provider with callback url https://yourinstance.tld/oauth/client/orcid
# ORCID_CLIENT_ID=
# ORCID_CLIENT_SECRET=
# Bonfire extensions configs:
# OAuth2 provider: connect as a client to the OAuth2 provider with callback url https://yourinstance.tld/oauth/client/oauth_1
# OAUTH_1_DISPLAY_NAME=
# OAUTH_1_CLIENT_ID=
# OAUTH_1_CLIENT_SECRET=
# OAUTH_1_AUTHORIZE_URI=
# OAUTH_1_ACCESS_TOKEN_URI=
# OAUTH_1_USER_INFO_URI=
# OAUTH_1_ENABLE_SIGNUP=false
# github.com SSO: connect as a client to the github.com OAuth2 provider with callback url https://yourinstance.tld/oauth/client/github
# GITHUB_APP_CLIENT_ID=
# GITHUB_CLIENT_SECRET=
# More Bonfire extensions configs:
# WEB_PUSH_SUBJECT=mailto:admin@example.com
# WEB_PUSH_PUBLIC_KEY=xyz
# WEB_PUSH_PRIVATE_KEY=abc

View File

@ -9,7 +9,7 @@ services:
- SEARCH_MEILI_INSTANCE=http://${STACK_NAME}_search:7700
search:
image: getmeili/meilisearch:v1.11 # WIP: upgrade from v1.11 to 1.14
image: getmeili/meilisearch:v1.14 # WIP: upgrade from v1.11 to 1.14
secrets:
- meili_master_key
volumes:

View File

@ -19,7 +19,6 @@ services:
- MIX_ENV=prod
- HOSTNAME
- INVITE_ONLY
- INSTANCE_DESCRIPTION
- DISABLE_DB_AUTOMIGRATION
- UPLOAD_LIMIT
@ -79,6 +78,12 @@ services:
- UPLOADS_S3_HOST
- UPLOADS_S3_SCHEME
- UPLOADS_S3_URL
- UPLOADS_S3_DEFAULT_URL
- UPLOADS_S3_URL_EXPIRATION_TTL
- AWS_ROLE_ARN
- AWS_WEB_IDENTITY_TOKEN_FILE
- ENABLE_SSO_PROVIDER
- OPENID_1_DISPLAY_NAME
- OPENID_1_DISCOVERY
@ -86,6 +91,18 @@ services:
- OPENID_1_CLIENT_SECRET
- OPENID_1_SCOPE
- OPENID_1_RESPONSE_TYPE
- OPENID_1_ENABLE_SIGNUP
- OAUTH_1_DISPLAY_NAME
- OAUTH_1_CLIENT_ID
- OAUTH_1_CLIENT_SECRET
- OAUTH_1_AUTHORIZE_URI
- OAUTH_1_ACCESS_TOKEN_URI
- OAUTH_1_USER_INFO_URI
- OAUTH_1_ENABLE_SIGNUP
- GITHUB_APP_CLIENT_ID
- GITHUB_CLIENT_SECRET
- ORCID_CLIENT_ID
- ORCID_CLIENT_SECRET
@ -113,20 +130,19 @@ services:
restart_policy:
condition: on-failure
labels:
backupbot.backup: ${ENABLE_BACKUPS:-true}
# backupbot.backup.volumes.upload-data: "true"
# backupbot.backup.volumes.upload-data.path: "/opt/app/data/uploads"
traefik.enable: "true"
traefik.http.services.${STACK_NAME}.loadbalancer.server.port: "4000"
traefik.http.routers.${STACK_NAME}.rule: Host(`${DOMAIN}`${EXTRA_DOMAINS})
traefik.http.routers.${STACK_NAME}.entrypoints: web-secure
traefik.http.routers.${STACK_NAME}.tls.certresolver: ${LETS_ENCRYPT_ENV}
#traefik.http.routers.${STACK_NAME}.middlewares: error-pages-middleware
#traefik.http.services.${STACK_NAME}.loadbalancer.server.port: 80
## Redirect from EXTRA_DOMAINS to DOMAIN
#traefik.http.routers.${STACK_NAME}.middlewares: ${STACK_NAME}-redirect
#traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost: true
#traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost: ${DOMAIN}
- "backupbot.backup=${ENABLE_BACKUPS:-true}"
#- backupbot.backup.volumes.upload-data: "true"
#- backupbot.backup.volumes.upload-data.path: "/opt/app/data/uploads"
- "traefik.enable=true"
- "traefik.http.services.${STACK_NAME}.loadbalancer.server.port=4000"
- "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`${EXTRA_DOMAINS})"
- "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure"
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
#- "traefik.http.routers.${STACK_NAME}.middlewares=error-pages-middleware"
#- "traefik.http.services.${STACK_NAME}.loadbalancer.server.port=80"
#- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
# healthcheck:
# test: ["CMD", "curl", "-f", "http://localhost"]
# interval: 30s

View File

@ -24,7 +24,7 @@ function backup {
function restore {
echo "Restoring database from ${LATEST_BACKUP_FILE}..."
cd /var/lib/postgresql/data/
cd ${BACKUP_PATH}
function restore_config {
echo "Restoring original pg_hba.conf configuration..."