Compare commits

...

19 Commits

Author SHA1 Message Date
6c4fb2c70b chore: publish 2.9.1+0.82.0 release
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2025-06-07 15:07:39 -04:00
ca0eebcc64 Merge pull request 'add service dependencies and extend deployment timeout' (#21) from deploy-timeout into main
All checks were successful
continuous-integration/drone/push Build is passing
Reviewed-on: #21
2025-06-07 19:05:11 +00:00
400445f8f5 Merge branch 'main' into deploy-timeout 2025-06-07 19:04:42 +00:00
73ed83f5bf remove depends_on clause because it's ignored by docker swarm 2025-06-07 19:03:44 +00:00
91e73387bf expand SSO documentation
All checks were successful
continuous-integration/drone/push Build is passing
2025-06-07 13:51:39 -04:00
4005524b7b add service dependencies and extend deployment timeout 2025-06-07 13:41:19 -04:00
3wc
ab70b3c4ca chore: publish 2.9.0+0.82.0 release
Some checks are pending
continuous-integration/drone/push Build is pending
continuous-integration/drone/tag Build is pending
2025-02-19 12:22:40 -05:00
59fdc6481a chore: publish 2.8.2+0.81.1 release
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2025-02-05 17:26:30 +01:00
fbcdc57b9d Update .drone.yml
All checks were successful
continuous-integration/drone/push Build is passing
2025-01-08 10:09:13 -08:00
3wc
37c8cf8141 chore: publish 2.8.1+0.81.1 release
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2024-12-15 12:55:30 -05:00
cd3d754eb5 chore: publish 2.8.0+0.81.1 release
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2024-11-21 13:28:21 +01:00
fbe1a99054 chore: publish 2.7.2+0.80.2 release
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2024-10-29 16:48:51 +01:00
529e0d9d26 EXTRA_DOMAINS redirect 2024-10-29 16:48:31 +01:00
5f300f945b chore: publish 2.7.1+0.80.2 release
All checks were successful
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is passing
2024-10-29 16:05:10 +01:00
3a06d0d9a0 update backupbot label
All checks were successful
continuous-integration/drone/push Build is passing
2024-10-24 14:50:21 +02:00
3wc
10c074a96b Add DB_ENTRYPOINT_VERSION for CI test
All checks were successful
continuous-integration/drone/push Build is passing
2024-10-02 14:17:28 -04:00
3wc
33c53a5d94 chore: publish 2.7.0+0.80.2 release
Some checks failed
continuous-integration/drone/tag Build is passing
continuous-integration/drone/push Build is failing
2024-10-02 14:14:35 -04:00
a2713a9a64 chore: publish 2.6.1+0.79.1 release
Some checks failed
continuous-integration/drone/push Build is failing
2024-09-23 17:11:01 +02:00
f6536067ee add secret generation script 2024-09-23 17:05:52 +02:00
8 changed files with 72 additions and 26 deletions

View File

@ -18,6 +18,8 @@ steps:
STACK_NAME: outline
LETS_ENCRYPT_ENV: production
APP_ENTRYPOINT_VERSION: v1
DB_ENTRYPOINT_VERSION: v1
PG_BACKUP_VERSION: v1
SECRET_DB_PASSWORD_VERSION: v1
SECRET_SECRET_KEY_VERSION: v1 # length=64
SECRET_UTILS_SECRET_VERSION: v1 # length=64
@ -36,7 +38,7 @@ steps:
from_secret: drone_abra-bot_token
fork: true
repositories:
- coop-cloud/auto-recipes-catalogue-json
- toolshed/auto-recipes-catalogue-json
trigger:
event: tag

View File

@ -8,6 +8,8 @@ DOMAIN=outline.example.com
#EXTRA_DOMAINS=', `www.outline.example.com`'
LETS_ENCRYPT_ENV=production
ENABLE_BACKUPS=true
COMPOSE_FILE="compose.yml"
# REQUIRED
@ -39,7 +41,7 @@ WEB_CONCURRENCY=1
# Override the maxium size of document imports, could be required if you have
# especially large Word documents with embedded imagery
MAXIMUM_IMPORT_SIZE=5120000
FILE_STORAGE_IMPORT_MAX_SIZE=5120000
# You can remove this line if your reverse proxy already logs incoming http
# requests and this ends up being duplicative

View File

@ -71,12 +71,11 @@ revisions to (instead of deleting them).
- `abra app deploy <domain> -f`
- enjoy getting rid of S3 🥳
## Single Sign On with Keycloak
## Single Sign On with Keycloak/Authentik
`abra app config YOURAPPNAME`, then uncomment everything in the `OIDC_` section.
Create a new client in Keycloak:
- **Valid Redirect URIs**: `https://YOURAPPDOMAIN/auth/oidc.callback`
`abra app deploy YOURAPPDOMAIN`
- Create an OIDC client in Keycloak (in Authentik this is called a provider and application)
- Run `abra app config YOURAPPNAME`, then uncomment everything in the `OIDC_` section.
- **Valid Redirect URIs**: `https://YOURAPPDOMAIN/auth/oidc.callback`
- Reference the client/provider info to populate the `_AUTH_URI` `_TOKEN_URI` and `_USERINFO_URI` values
- Set the OIDC secret using the value from the client/provider `abra app secret insert YOURAPPNAME oidc_client_secret v1 SECRETVALUE`
- `abra app deploy YOURAPPDOMAIN`

View File

@ -1,5 +1,6 @@
export APP_ENTRYPOINT_VERSION=v9
export DB_ENTRYPOINT_VERSION=v2
export PG_BACKUP_VERSION=v1
create_email_user() {
if [ -z "$1" ]; then
@ -19,6 +20,10 @@ migrate() {
yarn db:migrate --env=production-ssl-disabled
}
generate_secret() {
abra app secret insert $DOMAIN secret_key v1 $(openssl rand -hex 32)
}
delete_user_by_id() {
if [ -z "$1" ] || [ -z "$2" ]; then
echo "Usage: ... delete_user_by_id <userid-to-delete> <userid-to-replace>"

View File

@ -8,10 +8,6 @@ services:
environment:
- FILE_STORAGE
- FILE_STORAGE_UPLOAD_MAX_SIZE
deploy:
labels:
backupbot.backup: "true"
backupbot.backup.path: "/var/lib/outline/data/"
volumes:
storage-data:

View File

@ -6,7 +6,7 @@ services:
networks:
- backend
- proxy
image: outlinewiki/outline:0.79.1
image: outlinewiki/outline:0.82.0
secrets:
- db_password
- secret_key
@ -34,19 +34,20 @@ services:
- "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`${EXTRA_DOMAINS})"
- "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure"
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
- "coop-cloud.${STACK_NAME}.version=2.6.0+0.79.1"
## Redirect from EXTRA_DOMAINS to DOMAIN
#- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
#- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
- "coop-cloud.${STACK_NAME}.version=2.9.0+0.82.0"
# Redirect from EXTRA_DOMAINS to DOMAIN
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-80}"
cache:
image: redis:7.4.0
image: redis:7.4.2
networks:
- backend
db:
image: postgres:16.4
image: postgres:17.3
networks:
- backend
secrets:
@ -55,6 +56,9 @@ services:
- source: db_entrypoint
target: /docker-entrypoint.sh
mode: 0555
- source: pg_backup
target: /pg_backup.sh
mode: 0555
environment:
POSTGRES_DB: outline
POSTGRES_PASSWORD_FILE: /run/secrets/db_password
@ -64,10 +68,10 @@ services:
entrypoint: /docker-entrypoint.sh
deploy:
labels:
backupbot.backup: "true"
backupbot.backup.path: "/var/lib/postgresql/data/dump.sql.gz"
backupbot.backup.post-hook: "rm -f /var/lib/postgresql/data/dump.sql.gz"
backupbot.backup.pre-hook: "sh -c 'PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U outline outline | gzip > /var/lib/postgresql/data/dump.sql.gz'"
backupbot.backup: "${ENABLE_BACKUPS:-true}"
backupbot.backup.pre-hook: "/pg_backup.sh backup"
backupbot.backup.volumes.postgres_data.path: "backup.sql"
backupbot.restore.post-hook: '/pg_backup.sh restore'
secrets:
secret_key:
@ -97,3 +101,6 @@ configs:
name: ${STACK_NAME}_db_entrypoint_${DB_ENTRYPOINT_VERSION}
file: entrypoint.postgres.sh.tmpl
template_driver: golang
pg_backup:
name: ${STACK_NAME}_pg_backup_${PG_BACKUP_VERSION}
file: pg_backup.sh

34
pg_backup.sh Normal file
View File

@ -0,0 +1,34 @@
#!/bin/bash
set -e
BACKUP_FILE='/var/lib/postgresql/data/backup.sql'
function backup {
export PGPASSWORD=$(cat $POSTGRES_PASSWORD_FILE)
pg_dump -U ${POSTGRES_USER} ${POSTGRES_DB} > $BACKUP_FILE
}
function restore {
cd /var/lib/postgresql/data/
restore_config(){
# Restore allowed connections
cat pg_hba.conf.bak > pg_hba.conf
su postgres -c 'pg_ctl reload'
}
# Don't allow any other connections than local
cp pg_hba.conf pg_hba.conf.bak
echo "local all all trust" > pg_hba.conf
su postgres -c 'pg_ctl reload'
trap restore_config EXIT INT TERM
# Recreate Database
psql -U ${POSTGRES_USER} -d postgres -c "DROP DATABASE ${POSTGRES_DB} WITH (FORCE);"
createdb -U ${POSTGRES_USER} ${POSTGRES_DB}
psql -U ${POSTGRES_USER} -d ${POSTGRES_DB} -1 -f $BACKUP_FILE
trap - EXIT INT TERM
restore_config
}
$@

1
release/2.9.1+0.82.0 Normal file
View File

@ -0,0 +1 @@
Fixes a problem where deployments were consistently giving a timeout response even though they were successful