Compare commits

...

28 Commits

Author SHA1 Message Date
828c7c1300 chore: publish 3.0.2+1.10.3 release
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2025-06-10 17:29:07 +02:00
f0c6a3c19c
critical fix to run postgres database 2025-06-10 17:26:40 +02:00
94f238c4af
add breaking change release note to version 1.2.2+1.10.1
All checks were successful
continuous-integration/drone/push Build is passing
2025-05-27 19:56:55 +02:00
1dfdd90845
fix CI
All checks were successful
continuous-integration/drone/push Build is passing
2025-05-27 19:40:49 +02:00
f
660a5fee21 chore: publish 3.0.1+1.10.3 release
Some checks failed
continuous-integration/drone/push Build is failing
continuous-integration/drone/tag Build is passing
2025-04-23 16:48:57 -03:00
8d23542076 Merge pull request 'security upgrade' (#17) from upgrade into main
Some checks failed
continuous-integration/drone/push Build is failing
Reviewed-on: #17
Reviewed-by: decentral1se <decentral1se@noreply.git.coopcloud.tech>
2025-04-23 19:46:19 +00:00
f
29968706fc fix: check for password file presence to build db url
Some checks failed
continuous-integration/drone/pr Build is failing
2025-04-11 17:02:46 -03:00
f
1db30e2cda fix: typo 2025-04-11 17:01:25 -03:00
f
ec1735a005 feat: set db type 2025-04-11 17:00:56 -03:00
f
29a7d585dc fix: provide default values for variables
Some checks failed
continuous-integration/drone/pr Build is failing
2025-04-10 15:42:21 -03:00
f
d0191f1c49 fix: prevent unbound variable error
Some checks failed
continuous-integration/drone/pr Build is failing
2025-04-10 09:50:06 -03:00
f
58bfa65b8a fix: security upgrade
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-3983-rrqh-mvx5
2025-04-10 09:26:42 -03:00
3wc
98c0268b72 chore: publish 3.0.0+1.10.1 release 2025-02-24 12:34:13 -05:00
3wc
73c8b662d4 Switch to pgautoupgrade to handle major database upgrades 2025-02-24 12:33:07 -05:00
3wc
674cbd0431 Fix CMD_DB_URL setting for postgres 2025-02-24 12:32:54 -05:00
f
4972af78e8 chore: publish 2.0.0+1.10.1 release
Some checks failed
continuous-integration/drone/push Build is failing
continuous-integration/drone/tag Build is passing
2025-02-04 12:57:45 +01:00
aa2afc2270 Revert "chore: publish 1.3.0+1.10.1 release"
This reverts commit 6fbaeb7af07940e21e7c22abd7f55cecdc7c4baf.
2025-02-04 12:56:14 +01:00
f
6fbaeb7af0 chore: publish 1.3.0+1.10.1 release
Some checks failed
continuous-integration/drone/push Build is failing
continuous-integration/drone/tag Build is passing
2025-02-03 09:45:58 -03:00
f
aa70a53ef1 Merge branch 'sqlite' of ssh://git.coopcloud.tech:2222/fauno/hedgedoc 2025-02-03 09:44:47 -03:00
f
3efbfec419 chore: publish 1.2.2+1.10.1 release
Some checks failed
continuous-integration/drone/push Build is failing
continuous-integration/drone/tag Build is passing
2025-02-03 09:42:30 -03:00
f
93e5604fcb fix: GHSA-6w39-x2c6-6mpf
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-6w39-x2c6-6mpf
2025-02-03 09:34:32 -03:00
917766023b Update .drone.yml
Some checks failed
continuous-integration/drone/push Build is failing
2025-01-08 10:09:12 -08:00
f
24c3349074 fix: backup bot configuration
Some checks failed
continuous-integration/drone/pr Build is failing
2024-10-26 13:20:05 -03:00
f
6429b2720f fix: chown the database
Some checks failed
continuous-integration/drone/pr Build is failing
2024-10-26 13:11:12 -03:00
f
45986d1af4 fix: db_password secret not needed
Some checks failed
continuous-integration/drone/pr Build is failing
2024-10-26 10:59:54 -03:00
f
35e78f4834 fix: don't overwrite CMD_DB_URL
Some checks failed
continuous-integration/drone/pr Build is failing
2024-10-25 17:52:50 -03:00
f
3a98857b5c feat: postgresql support is optional 2024-10-25 17:51:49 -03:00
f
2310cb9378 feat: support sqlite 2024-10-25 17:50:18 -03:00
11 changed files with 86 additions and 52 deletions

View File

@ -18,6 +18,7 @@ steps:
STACK_NAME: hedgedoc
LETS_ENCRYPT_ENV: production
SECRET_DB_PASSWORD_VERSION: v1
SECRET_SESSION_SECRET_VERSION: v1
ENTRYPOINT_CONF_VERSION: v1
PG_BACKUP_VERSION: v1
trigger:
@ -35,7 +36,7 @@ steps:
from_secret: drone_abra-bot_token
fork: true
repositories:
- coop-cloud/auto-recipes-catalogue-json
- toolshed/auto-recipes-catalogue-json
trigger:
event: tag

View File

@ -8,11 +8,15 @@ DOMAIN=hedgedoc.example.com
#EXTRA_DOMAINS=', `www.hedgedoc.example.com`'
LETS_ENCRYPT_ENV=production
SECRET_DB_PASSWORD_VERSION=v1
SECRET_SESSION_SECRET_VERSION=v1
COMPOSE_FILE="compose.yml"
# PostgreSQL
#COMPOSE_FILE="$COMPOSE_FILE:compose.postgresql.yml"
#SECRET_DB_PASSWORD_VERSION=v1
# OAuth, see https://docs.hedgedoc.org/guides/auth/keycloak/
#COMPOSE_FILE="$COMPOSE_FILE:compose.oauth.yml"

View File

@ -1,2 +1,2 @@
export ENTRYPOINT_CONF_VERSION=v9
export ENTRYPOINT_CONF_VERSION=v13
export PG_BACKUP_VERSION=v1

55
compose.postgresql.yml Normal file
View File

@ -0,0 +1,55 @@
version: "3.8"
services:
app:
environment:
- CMD_DB_TYPE=postgres
- CMD_DB_NAME=codimd
- CMD_DB_USER=codimd
- CMD_DB_HOST=db
- CMD_DB_PASSWORD_FILE=/run/secrets/db_password
depends_on:
- db
networks:
- internal
secrets:
- db_password
db:
image: pgautoupgrade/pgautoupgrade:16-alpine
environment:
- POSTGRES_USER=codimd
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password
- POSTGRES_DB=codimd
volumes:
- "postgres:/var/lib/postgresql/data"
secrets:
- db_password
networks:
- internal
deploy:
labels:
backupbot.backup: "${ENABLE_BACKUPS:-true}"
backupbot.backup.pre-hook: "/pg_backup.sh backup"
backupbot.backup.volumes.postgres.path: "backup.sql"
backupbot.restore.post-hook: '/pg_backup.sh restore'
healthcheck:
test: "pg_isready"
interval: 30s
timeout: 10s
retries: 5
start_period: 1m
configs:
- source: pg_backup
target: /pg_backup.sh
mode: 0555
volumes:
postgres:
secrets:
db_password:
external: true
name: ${STACK_NAME}_db_password_${SECRET_DB_PASSWORD_VERSION}
networks:
internal:
configs:
pg_backup:
name: ${STACK_NAME}_pg_backup_${PG_BACKUP_VERSION}
file: pg_backup.sh

View File

@ -1,17 +1,14 @@
version: "3.8"
services:
app:
image: quay.io/hedgedoc/hedgedoc:1.10.0
image: quay.io/hedgedoc/hedgedoc:1.10.3
environment:
- CMD_USECDN=false
- CMD_URL_ADDPORT=false
- CMD_DOMAIN=$DOMAIN
- CMD_PROTOCOL_USESSL=true
- CMD_HSTS_ENABLE=false
- CMD_DB_NAME=codimd
- CMD_DB_USER=codimd
- CMD_DB_HOST=db
- CMD_DB_PASSWORD_FILE=/run/secrets/db_password
- CMD_DB_URL=sqlite:/database/db.sqlite3
- CMD_ALLOW_ANONYMOUS
- CMD_ALLOW_ANONYMOUS_EDITS
- CMD_ALLOW_EMAIL_REGISTER
@ -29,15 +26,12 @@ services:
- CMD_SESSION_LIFE
- CMD_SESSION_SECRET_FILE=/run/secrets/session_secret
- DOCUMENT_MAX_LENGTH
depends_on:
- db
networks:
- proxy
- internal
volumes:
- codimd_uploads:/hedgedoc/public/uploads
- codimd_database:/database
secrets:
- db_password
- session_secret
entrypoint: /docker-entrypoint.sh
configs:
@ -60,56 +54,24 @@ services:
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
- "coop-cloud.${STACK_NAME}.version=1.2.1+1.10.0"
- "coop-cloud.${STACK_NAME}.version=3.0.2+1.10.3"
- "backupbot.backup=${ENABLE_BACKUPS:-true}"
healthcheck:
test: "nodejs -e \"http.get('http://localhost:3000', (res) => { console.log('status: ', res.statusCode); if (res.statusCode == 200) { process.exit(0); } else { process.exit(1); } });\""
interval: 30s
timeout: 10s
retries: 10
start_period: 1m
db:
image: postgres:16.4-alpine
environment:
- POSTGRES_USER=codimd
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password
- POSTGRES_DB=codimd
volumes:
- "postgres:/var/lib/postgresql/data"
secrets:
- db_password
networks:
- internal
deploy:
labels:
backupbot.backup: "${ENABLE_BACKUPS:-true}"
backupbot.backup.pre-hook: "/pg_backup.sh backup"
backupbot.backup.volumes.postgres.path: "backup.sql"
backupbot.restore.post-hook: '/pg_backup.sh restore'
healthcheck:
test: "pg_isready"
interval: 30s
timeout: 10s
retries: 5
start_period: 1m
configs:
- source: pg_backup
target: /pg_backup.sh
mode: 0555
volumes:
postgres:
codimd_uploads:
codimd_database:
secrets:
db_password:
external: true
name: ${STACK_NAME}_db_password_${SECRET_DB_PASSWORD_VERSION}
session_secret:
external: true
name: ${STACK_NAME}_session_secret_${SECRET_SESSION_SECRET_VERSION}
networks:
proxy:
external: true
internal:
configs:
config_json:
name: ${STACK_NAME}_config_${ENTRYPOINT_CONF_VERSION}
@ -119,6 +81,3 @@ configs:
name: ${STACK_NAME}_entrypoint_${ENTRYPOINT_CONF_VERSION}
file: entrypoint.sh.tmpl
template_driver: golang
pg_backup:
name: ${STACK_NAME}_pg_backup_${PG_BACKUP_VERSION}
file: pg_backup.sh

View File

@ -22,7 +22,9 @@ file_env() {
}
load_vars() {
if [ -n "${CMD_DB_PASSWORD_FILE:-""}" ] ; then
file_env "CMD_DB_PASSWORD"
fi
file_env "CMD_OAUTH2_CLIENT_SECRET"
file_env "CMD_SESSION_SECRET"
}
@ -34,11 +36,15 @@ main() {
mkdir -p "/hedgedoc/.npm" && \
chown -R 10000:65534 "/hedgedoc/.npm" && \
chmod "u+rwx" "/hedgedoc/.npm"
chown -R 10000:65534 /database
}
main
export CMD_DB_URL=postgres://$CMD_DB_USER:$CMD_DB_PASSWORD@$CMD_DB_HOST:5432/$CMD_DB_NAME
if [ -n "${CMD_DB_PASSWORD:-""}" ] ; then
export CMD_DB_URL="${CMD_DB_TYPE}://$CMD_DB_USER:$CMD_DB_PASSWORD@$CMD_DB_HOST:5432/$CMD_DB_NAME"
fi
# 3wc: `source /docker-entrypoint.sh -e` to load CMD_DB_URL for CLI scripts
if [ ! "${1-}" == "-e" ]; then

5
release/1.2.2+1.10.1 Normal file
View File

@ -0,0 +1,5 @@
Upgrade to fix GHSA-6w39-x2c6-6mpf
BREAKING CHANGE!! new secret "session_secret" added, run:
abra app secret generate <app_domain> session_secret v1

1
release/1.3.0+1.10.1 Normal file
View File

@ -0,0 +1 @@
This release adds SQLite support by default, if you were using PostgreSQL make sure to update the env file!

1
release/3.0.0+1.10.1 Normal file
View File

@ -0,0 +1 @@
This release switches to `pgaautoupgrade` for easier Postgresql upgrades. If you are using Postgres, please take extra care to take a backup before upgrading.

1
release/3.0.1+1.10.3 Normal file
View File

@ -0,0 +1 @@
Security upgrade for GHSA-3983-rrqh-mvx5

1
release/3.0.2+1.10.3 Normal file
View File

@ -0,0 +1 @@
CRITICAL FIX: since version 3 this recipe uses always sqlite as database. This patch fixes instances running postgres