Compare commits

..

7 Commits

Author SHA1 Message Date
3wc
738fbe7a4e Re-add SECRET_SESSION_SECRET_VERSION..
..which I accidentally removed while rebasing
2024-10-27 12:36:57 -04:00
f
f05234338e fix: backup bot configuration 2024-10-27 12:36:15 -04:00
f
cb4219e7c3 fix: chown the database 2024-10-27 12:36:15 -04:00
f
b206e7a386 fix: db_password secret not needed 2024-10-27 12:36:13 -04:00
f
b4dd6ddbbd fix: don't overwrite CMD_DB_URL 2024-10-27 12:35:49 -04:00
f
a24809ab38 feat: postgresql support is optional 2024-10-27 12:35:49 -04:00
f
543f0823bb feat: support sqlite 2024-10-27 12:35:48 -04:00
11 changed files with 11 additions and 24 deletions

View File

@ -18,7 +18,6 @@ steps:
STACK_NAME: hedgedoc STACK_NAME: hedgedoc
LETS_ENCRYPT_ENV: production LETS_ENCRYPT_ENV: production
SECRET_DB_PASSWORD_VERSION: v1 SECRET_DB_PASSWORD_VERSION: v1
SECRET_SESSION_SECRET_VERSION: v1
ENTRYPOINT_CONF_VERSION: v1 ENTRYPOINT_CONF_VERSION: v1
PG_BACKUP_VERSION: v1 PG_BACKUP_VERSION: v1
trigger: trigger:
@ -36,7 +35,7 @@ steps:
from_secret: drone_abra-bot_token from_secret: drone_abra-bot_token
fork: true fork: true
repositories: repositories:
- toolshed/auto-recipes-catalogue-json - coop-cloud/auto-recipes-catalogue-json
trigger: trigger:
event: tag event: tag

View File

@ -8,10 +8,10 @@ DOMAIN=hedgedoc.example.com
#EXTRA_DOMAINS=', `www.hedgedoc.example.com`' #EXTRA_DOMAINS=', `www.hedgedoc.example.com`'
LETS_ENCRYPT_ENV=production LETS_ENCRYPT_ENV=production
SECRET_SESSION_SECRET_VERSION=v1
COMPOSE_FILE="compose.yml" COMPOSE_FILE="compose.yml"
SECRET_SESSION_SECRET_VERSION=v1
# PostgreSQL # PostgreSQL
#COMPOSE_FILE="$COMPOSE_FILE:compose.postgresql.yml" #COMPOSE_FILE="$COMPOSE_FILE:compose.postgresql.yml"

View File

@ -1,2 +1,2 @@
export ENTRYPOINT_CONF_VERSION=v13 export ENTRYPOINT_CONF_VERSION=v10
export PG_BACKUP_VERSION=v1 export PG_BACKUP_VERSION=v1

View File

@ -2,7 +2,7 @@ version: "3.8"
services: services:
app: app:
environment: environment:
- CMD_DB_TYPE=postgres - CMD_DB_URL=
- CMD_DB_NAME=codimd - CMD_DB_NAME=codimd
- CMD_DB_USER=codimd - CMD_DB_USER=codimd
- CMD_DB_HOST=db - CMD_DB_HOST=db
@ -14,7 +14,7 @@ services:
secrets: secrets:
- db_password - db_password
db: db:
image: pgautoupgrade/pgautoupgrade:16-alpine image: postgres:16.4-alpine
environment: environment:
- POSTGRES_USER=codimd - POSTGRES_USER=codimd
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password - POSTGRES_PASSWORD_FILE=/run/secrets/db_password

View File

@ -1,7 +1,7 @@
version: "3.8" version: "3.8"
services: services:
app: app:
image: quay.io/hedgedoc/hedgedoc:1.10.3 image: quay.io/hedgedoc/hedgedoc:1.10.0
environment: environment:
- CMD_USECDN=false - CMD_USECDN=false
- CMD_URL_ADDPORT=false - CMD_URL_ADDPORT=false
@ -54,7 +54,7 @@ services:
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true" - "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}" - "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}" - "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
- "coop-cloud.${STACK_NAME}.version=3.0.2+1.10.3" - "coop-cloud.${STACK_NAME}.version=1.2.1+1.10.0"
- "backupbot.backup=${ENABLE_BACKUPS:-true}" - "backupbot.backup=${ENABLE_BACKUPS:-true}"
healthcheck: healthcheck:
test: "nodejs -e \"http.get('http://localhost:3000', (res) => { console.log('status: ', res.statusCode); if (res.statusCode == 200) { process.exit(0); } else { process.exit(1); } });\"" test: "nodejs -e \"http.get('http://localhost:3000', (res) => { console.log('status: ', res.statusCode); if (res.statusCode == 200) { process.exit(0); } else { process.exit(1); } });\""
@ -65,6 +65,7 @@ services:
volumes: volumes:
codimd_uploads: codimd_uploads:
codimd_database: codimd_database:
secrets: secrets:
session_secret: session_secret:
external: true external: true

View File

@ -22,9 +22,7 @@ file_env() {
} }
load_vars() { load_vars() {
if [ -n "${CMD_DB_PASSWORD_FILE:-""}" ] ; then file_env "CMD_DB_PASSWORD"
file_env "CMD_DB_PASSWORD"
fi
file_env "CMD_OAUTH2_CLIENT_SECRET" file_env "CMD_OAUTH2_CLIENT_SECRET"
file_env "CMD_SESSION_SECRET" file_env "CMD_SESSION_SECRET"
} }
@ -42,9 +40,7 @@ main() {
main main
if [ -n "${CMD_DB_PASSWORD:-""}" ] ; then export CMD_DB_URL="${CMD_DB_URL:-postgres://$CMD_DB_USER:$CMD_DB_PASSWORD@$CMD_DB_HOST:5432/$CMD_DB_NAME}"
export CMD_DB_URL="${CMD_DB_TYPE}://$CMD_DB_USER:$CMD_DB_PASSWORD@$CMD_DB_HOST:5432/$CMD_DB_NAME"
fi
# 3wc: `source /docker-entrypoint.sh -e` to load CMD_DB_URL for CLI scripts # 3wc: `source /docker-entrypoint.sh -e` to load CMD_DB_URL for CLI scripts
if [ ! "${1-}" == "-e" ]; then if [ ! "${1-}" == "-e" ]; then

View File

@ -1,5 +0,0 @@
Upgrade to fix GHSA-6w39-x2c6-6mpf
BREAKING CHANGE!! new secret "session_secret" added, run:
abra app secret generate <app_domain> session_secret v1

View File

@ -1 +0,0 @@
This release adds SQLite support by default, if you were using PostgreSQL make sure to update the env file!

View File

@ -1 +0,0 @@
This release switches to `pgaautoupgrade` for easier Postgresql upgrades. If you are using Postgres, please take extra care to take a backup before upgrading.

View File

@ -1 +0,0 @@
Security upgrade for GHSA-3983-rrqh-mvx5

View File

@ -1 +0,0 @@
CRITICAL FIX: since version 3 this recipe uses always sqlite as database. This patch fixes instances running postgres