Compare commits
10 Commits
1.2.0+1.10
...
1.2.2+1.10
Author | SHA1 | Date | |
---|---|---|---|
3efbfec419 | |||
93e5604fcb | |||
917766023b | |||
6feab6a99e | |||
ca5a95bea6 | |||
6a036c4c82 | |||
d19f286c11 | |||
635eee710b | |||
49f06173e9 | |||
9194256835 |
@ -19,6 +19,7 @@ steps:
|
|||||||
LETS_ENCRYPT_ENV: production
|
LETS_ENCRYPT_ENV: production
|
||||||
SECRET_DB_PASSWORD_VERSION: v1
|
SECRET_DB_PASSWORD_VERSION: v1
|
||||||
ENTRYPOINT_CONF_VERSION: v1
|
ENTRYPOINT_CONF_VERSION: v1
|
||||||
|
PG_BACKUP_VERSION: v1
|
||||||
trigger:
|
trigger:
|
||||||
branch:
|
branch:
|
||||||
- main
|
- main
|
||||||
@ -34,7 +35,7 @@ steps:
|
|||||||
from_secret: drone_abra-bot_token
|
from_secret: drone_abra-bot_token
|
||||||
fork: true
|
fork: true
|
||||||
repositories:
|
repositories:
|
||||||
- coop-cloud/auto-recipes-catalogue-json
|
- toolshed/auto-recipes-catalogue-json
|
||||||
|
|
||||||
trigger:
|
trigger:
|
||||||
event: tag
|
event: tag
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
TYPE=hedgedoc
|
TYPE=hedgedoc
|
||||||
TIMEOUT=300
|
TIMEOUT=300
|
||||||
ENABLE_AUTO_UPDATE=true
|
ENABLE_AUTO_UPDATE=true
|
||||||
|
ENABLE_BACKUPS=true
|
||||||
|
|
||||||
DOMAIN=hedgedoc.example.com
|
DOMAIN=hedgedoc.example.com
|
||||||
## Domain aliases
|
## Domain aliases
|
||||||
@ -8,6 +9,7 @@ DOMAIN=hedgedoc.example.com
|
|||||||
LETS_ENCRYPT_ENV=production
|
LETS_ENCRYPT_ENV=production
|
||||||
|
|
||||||
SECRET_DB_PASSWORD_VERSION=v1
|
SECRET_DB_PASSWORD_VERSION=v1
|
||||||
|
SECRET_SESSION_SECRET_VERSION=v1
|
||||||
|
|
||||||
COMPOSE_FILE="compose.yml"
|
COMPOSE_FILE="compose.yml"
|
||||||
|
|
||||||
@ -33,6 +35,7 @@ COMPOSE_FILE="compose.yml"
|
|||||||
# CMD_ALLOW_ANONYMOUS_EDITS=false
|
# CMD_ALLOW_ANONYMOUS_EDITS=false
|
||||||
# CMD_ALLOW_EMAIL_REGISTER=true
|
# CMD_ALLOW_EMAIL_REGISTER=true
|
||||||
# CMD_ALLOW_FREEURL=false
|
# CMD_ALLOW_FREEURL=false
|
||||||
|
# CMD_REQUIRE_FREEURL_AUTHENTICATION=true
|
||||||
# CMD_ALLOW_GRAVATAR=true
|
# CMD_ALLOW_GRAVATAR=true
|
||||||
# CMD_ALLOW_ORIGIN=localhost
|
# CMD_ALLOW_ORIGIN=localhost
|
||||||
# CMD_COOKIE_POLICY=lax
|
# CMD_COOKIE_POLICY=lax
|
||||||
|
1
abra.sh
1
abra.sh
@ -1 +1,2 @@
|
|||||||
export ENTRYPOINT_CONF_VERSION=v9
|
export ENTRYPOINT_CONF_VERSION=v9
|
||||||
|
export PG_BACKUP_VERSION=v1
|
||||||
|
27
compose.yml
27
compose.yml
@ -1,7 +1,7 @@
|
|||||||
version: "3.8"
|
version: "3.8"
|
||||||
services:
|
services:
|
||||||
app:
|
app:
|
||||||
image: quay.io/hedgedoc/hedgedoc:1.10.0
|
image: quay.io/hedgedoc/hedgedoc:1.10.1
|
||||||
environment:
|
environment:
|
||||||
- CMD_USECDN=false
|
- CMD_USECDN=false
|
||||||
- CMD_URL_ADDPORT=false
|
- CMD_URL_ADDPORT=false
|
||||||
@ -16,6 +16,7 @@ services:
|
|||||||
- CMD_ALLOW_ANONYMOUS_EDITS
|
- CMD_ALLOW_ANONYMOUS_EDITS
|
||||||
- CMD_ALLOW_EMAIL_REGISTER
|
- CMD_ALLOW_EMAIL_REGISTER
|
||||||
- CMD_ALLOW_FREEURL
|
- CMD_ALLOW_FREEURL
|
||||||
|
- CMD_REQUIRE_FREEURL_AUTHENTICATION
|
||||||
- CMD_ALLOW_GRAVATAR
|
- CMD_ALLOW_GRAVATAR
|
||||||
- CMD_ALLOW_ORIGIN
|
- CMD_ALLOW_ORIGIN
|
||||||
- CMD_COOKIE_POLICY
|
- CMD_COOKIE_POLICY
|
||||||
@ -26,6 +27,7 @@ services:
|
|||||||
- CMD_DEFAULT_PERMISSION
|
- CMD_DEFAULT_PERMISSION
|
||||||
- CMD_EMAIL
|
- CMD_EMAIL
|
||||||
- CMD_SESSION_LIFE
|
- CMD_SESSION_LIFE
|
||||||
|
- CMD_SESSION_SECRET_FILE=/run/secrets/session_secret
|
||||||
- DOCUMENT_MAX_LENGTH
|
- DOCUMENT_MAX_LENGTH
|
||||||
depends_on:
|
depends_on:
|
||||||
- db
|
- db
|
||||||
@ -36,6 +38,7 @@ services:
|
|||||||
- codimd_uploads:/hedgedoc/public/uploads
|
- codimd_uploads:/hedgedoc/public/uploads
|
||||||
secrets:
|
secrets:
|
||||||
- db_password
|
- db_password
|
||||||
|
- session_secret
|
||||||
entrypoint: /docker-entrypoint.sh
|
entrypoint: /docker-entrypoint.sh
|
||||||
configs:
|
configs:
|
||||||
- source: entrypoint_conf
|
- source: entrypoint_conf
|
||||||
@ -57,7 +60,7 @@ services:
|
|||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
||||||
- "coop-cloud.${STACK_NAME}.version=1.2.0+1.10.0"
|
- "coop-cloud.${STACK_NAME}.version=1.2.2+1.10.1"
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: "nodejs -e \"http.get('http://localhost:3000', (res) => { console.log('status: ', res.statusCode); if (res.statusCode == 200) { process.exit(0); } else { process.exit(1); } });\""
|
test: "nodejs -e \"http.get('http://localhost:3000', (res) => { console.log('status: ', res.statusCode); if (res.statusCode == 200) { process.exit(0); } else { process.exit(1); } });\""
|
||||||
interval: 30s
|
interval: 30s
|
||||||
@ -78,18 +81,20 @@ services:
|
|||||||
- internal
|
- internal
|
||||||
deploy:
|
deploy:
|
||||||
labels:
|
labels:
|
||||||
backupbot.backup: "true"
|
backupbot.backup: "${ENABLE_BACKUPS:-true}"
|
||||||
backupbot.backup.pre-hook: "PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /var/lib/postgresql/data/backup.sql"
|
backupbot.backup.pre-hook: "/pg_backup.sh backup"
|
||||||
backupbot.backup.post-hook: "rm -f /var/lib/postgresql/data/backup.sql"
|
backupbot.backup.volumes.postgres.path: "backup.sql"
|
||||||
backupbot.backup.path: "/var/lib/postgresql/data/backup.sql"
|
backupbot.restore.post-hook: '/pg_backup.sh restore'
|
||||||
backupbot.restore: "true"
|
|
||||||
backupbot.restore.post-hook: "sh -c 'psql -U $${POSTGRES_USER} -d $${POSTGRES_DB} < /var/lib/postgresql/data/backup.sql && rm -f /var/lib/postgresql/data/backup.sql'"
|
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: "pg_isready"
|
test: "pg_isready"
|
||||||
interval: 30s
|
interval: 30s
|
||||||
timeout: 10s
|
timeout: 10s
|
||||||
retries: 5
|
retries: 5
|
||||||
start_period: 1m
|
start_period: 1m
|
||||||
|
configs:
|
||||||
|
- source: pg_backup
|
||||||
|
target: /pg_backup.sh
|
||||||
|
mode: 0555
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
postgres:
|
postgres:
|
||||||
@ -98,6 +103,9 @@ secrets:
|
|||||||
db_password:
|
db_password:
|
||||||
external: true
|
external: true
|
||||||
name: ${STACK_NAME}_db_password_${SECRET_DB_PASSWORD_VERSION}
|
name: ${STACK_NAME}_db_password_${SECRET_DB_PASSWORD_VERSION}
|
||||||
|
session_secret:
|
||||||
|
external: true
|
||||||
|
name: ${STACK_NAME}_session_secret_${SECRET_SESSION_SECRET_VERSION}
|
||||||
networks:
|
networks:
|
||||||
proxy:
|
proxy:
|
||||||
external: true
|
external: true
|
||||||
@ -111,3 +119,6 @@ configs:
|
|||||||
name: ${STACK_NAME}_entrypoint_${ENTRYPOINT_CONF_VERSION}
|
name: ${STACK_NAME}_entrypoint_${ENTRYPOINT_CONF_VERSION}
|
||||||
file: entrypoint.sh.tmpl
|
file: entrypoint.sh.tmpl
|
||||||
template_driver: golang
|
template_driver: golang
|
||||||
|
pg_backup:
|
||||||
|
name: ${STACK_NAME}_pg_backup_${PG_BACKUP_VERSION}
|
||||||
|
file: pg_backup.sh
|
||||||
|
@ -24,6 +24,7 @@ file_env() {
|
|||||||
load_vars() {
|
load_vars() {
|
||||||
file_env "CMD_DB_PASSWORD"
|
file_env "CMD_DB_PASSWORD"
|
||||||
file_env "CMD_OAUTH2_CLIENT_SECRET"
|
file_env "CMD_OAUTH2_CLIENT_SECRET"
|
||||||
|
file_env "CMD_SESSION_SECRET"
|
||||||
}
|
}
|
||||||
|
|
||||||
main() {
|
main() {
|
||||||
|
34
pg_backup.sh
Normal file
34
pg_backup.sh
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
BACKUP_FILE='/var/lib/postgresql/data/backup.sql'
|
||||||
|
|
||||||
|
function backup {
|
||||||
|
export PGPASSWORD=$(cat /run/secrets/db_password)
|
||||||
|
pg_dump -U ${POSTGRES_USER} ${POSTGRES_DB} > $BACKUP_FILE
|
||||||
|
}
|
||||||
|
|
||||||
|
function restore {
|
||||||
|
cd /var/lib/postgresql/data/
|
||||||
|
restore_config(){
|
||||||
|
# Restore allowed connections
|
||||||
|
cat pg_hba.conf.bak > pg_hba.conf
|
||||||
|
su postgres -c 'pg_ctl reload'
|
||||||
|
}
|
||||||
|
# Don't allow any other connections than local
|
||||||
|
cp pg_hba.conf pg_hba.conf.bak
|
||||||
|
echo "local all all trust" > pg_hba.conf
|
||||||
|
su postgres -c 'pg_ctl reload'
|
||||||
|
trap restore_config EXIT INT TERM
|
||||||
|
|
||||||
|
# Recreate Database
|
||||||
|
psql -U ${POSTGRES_USER} -d postgres -c "DROP DATABASE ${POSTGRES_DB} WITH (FORCE);"
|
||||||
|
createdb -U ${POSTGRES_USER} ${POSTGRES_DB}
|
||||||
|
psql -U ${POSTGRES_USER} -d ${POSTGRES_DB} -1 -f $BACKUP_FILE
|
||||||
|
|
||||||
|
trap - EXIT INT TERM
|
||||||
|
restore_config
|
||||||
|
}
|
||||||
|
|
||||||
|
$@
|
1
release/1.2.2+1.10.1
Normal file
1
release/1.2.2+1.10.1
Normal file
@ -0,0 +1 @@
|
|||||||
|
Upgrade to fix GHSA-6w39-x2c6-6mpf
|
Reference in New Issue
Block a user