forked from coop-cloud/rallly
Compare commits
16 Commits
Author | SHA1 | Date | |
---|---|---|---|
45c7b2aaef | |||
91e8018410 | |||
4a4e536125 | |||
0d1bbfa99a | |||
957eb45fea | |||
2b7bcd5a67 | |||
27dd971444 | |||
6be1ac13b8 | |||
db812fd1d3 | |||
4ba224875f | |||
e794bc21fd | |||
e85b902262 | |||
d134057749 | |||
b2319ae650 | |||
466126e7d1 | |||
b95df148f8 |
13
.drone.yml
13
.drone.yml
@ -6,7 +6,7 @@ steps:
|
|||||||
image: git.coopcloud.tech/coop-cloud/stack-ssh-deploy:latest
|
image: git.coopcloud.tech/coop-cloud/stack-ssh-deploy:latest
|
||||||
settings:
|
settings:
|
||||||
host: swarm-test.autonomic.zone
|
host: swarm-test.autonomic.zone
|
||||||
stack: {{ .Name }}
|
stack: rallly
|
||||||
generate_secrets: true
|
generate_secrets: true
|
||||||
purge: true
|
purge: true
|
||||||
deploy_key:
|
deploy_key:
|
||||||
@ -14,9 +14,14 @@ steps:
|
|||||||
networks:
|
networks:
|
||||||
- proxy
|
- proxy
|
||||||
environment:
|
environment:
|
||||||
DOMAIN: {{ .Name }}.swarm-test.autonomic.zone
|
DOMAIN: rallly.swarm-test.autonomic.zone
|
||||||
STACK_NAME: {{ .Name }}
|
STACK_NAME: rallly
|
||||||
LETS_ENCRYPT_ENV: production
|
LETS_ENCRYPT_ENV: production
|
||||||
|
SECRET_SECRET_KEY_VERSION: v1
|
||||||
|
SECRET_DB_PASSWORD_VERSION: v1
|
||||||
|
SECRET_SMTP_PWD_VERSION: v1
|
||||||
|
APP_ENTRYPOINT_VERSION: v1
|
||||||
|
PG_BACKUP_VERSION: v1
|
||||||
trigger:
|
trigger:
|
||||||
branch:
|
branch:
|
||||||
- main
|
- main
|
||||||
@ -32,7 +37,7 @@ steps:
|
|||||||
from_secret: drone_abra-bot_token
|
from_secret: drone_abra-bot_token
|
||||||
fork: true
|
fork: true
|
||||||
repositories:
|
repositories:
|
||||||
- coop-cloud/auto-recipes-catalogue-json
|
- toolshed/auto-recipes-catalogue-json
|
||||||
|
|
||||||
trigger:
|
trigger:
|
||||||
event: tag
|
event: tag
|
||||||
|
11
.env.sample
11
.env.sample
@ -1,12 +1,15 @@
|
|||||||
TYPE=rallly
|
TYPE=rallly
|
||||||
TIMEOUT=300
|
TIMEOUT=300
|
||||||
ENABLE_AUTO_UPDATE=true
|
ENABLE_AUTO_UPDATE=true
|
||||||
|
ENABLE_BACKUPS=true
|
||||||
|
|
||||||
DOMAIN=rallly.example.com
|
DOMAIN=rallly.example.com
|
||||||
|
|
||||||
## Domain aliases
|
## Domain aliases
|
||||||
#EXTRA_DOMAINS=', `www.rallly.example.com`'
|
#EXTRA_DOMAINS=', `www.rallly.example.com`'
|
||||||
|
|
||||||
|
COMPOSE_FILE="compose.yml"
|
||||||
|
|
||||||
LETS_ENCRYPT_ENV=production
|
LETS_ENCRYPT_ENV=production
|
||||||
|
|
||||||
SECRET_SECRET_KEY_VERSION=v1
|
SECRET_SECRET_KEY_VERSION=v1
|
||||||
@ -18,3 +21,11 @@ SMTP_HOST=mail.example.com
|
|||||||
SMTP_PORT=465
|
SMTP_PORT=465
|
||||||
SMTP_SECURE=true
|
SMTP_SECURE=true
|
||||||
SMTP_USER=noreply@example.com
|
SMTP_USER=noreply@example.com
|
||||||
|
|
||||||
|
#COMPOSE_FILE="$COMPOSE_FILE:compose.oidc.yml"
|
||||||
|
#OIDC_ENABLED=1
|
||||||
|
#OIDC_NAME= #The user-facing name of your provider as it will be shown on the login page
|
||||||
|
#OIDC_DISCOVERY_URL= #URL of the .well-known/openid-configuration endpoint for your OIDC provider
|
||||||
|
#OIDC_CLIENT_ID=
|
||||||
|
#OIDC_ISSUER_URL=
|
||||||
|
#SECRET_OIDC_CLIENT_SECRET_VERSION=v1
|
||||||
|
3
abra.sh
3
abra.sh
@ -1 +1,2 @@
|
|||||||
export APP_ENTRYPOINT_VERSION=v2
|
export APP_ENTRYPOINT_VERSION=v3
|
||||||
|
export PG_BACKUP_VERSION=v1
|
||||||
|
12
alaconnect.yml
Normal file
12
alaconnect.yml
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
authentik:
|
||||||
|
env:
|
||||||
|
OIDC_NAME: "Authentik"
|
||||||
|
OIDC_DISCOVERY_URL: "https://authentik.example.com/application/o/rallly/.well-known/openid-configuration"
|
||||||
|
OIDC_ISSUER_URL: "https://authentik.example.com/application/o/rallly/"
|
||||||
|
OIDC_CLIENT_ID: rallly
|
||||||
|
uncomment:
|
||||||
|
- compose.oidc.yml
|
||||||
|
- SECRET_OIDC_CLIENT_SECRET_VERSION
|
||||||
|
- OIDC_ENABLED
|
||||||
|
shared_secrets:
|
||||||
|
rallly_secret: oidc_client_secret
|
16
compose.oidc.yml
Normal file
16
compose.oidc.yml
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
---
|
||||||
|
version: "3.8"
|
||||||
|
|
||||||
|
services:
|
||||||
|
app:
|
||||||
|
secrets:
|
||||||
|
- oidc_client_secret
|
||||||
|
environment:
|
||||||
|
- OIDC_ENABLED
|
||||||
|
- OIDC_NAME
|
||||||
|
- OIDC_DISCOVERY_URL
|
||||||
|
- OIDC_CLIENT_ID
|
||||||
|
secrets:
|
||||||
|
oidc_client_secret:
|
||||||
|
name: ${STACK_NAME}_oidc_client_secret_${SECRET_OIDC_CLIENT_SECRET_VERSION}
|
||||||
|
external: true
|
30
compose.yml
30
compose.yml
@ -3,7 +3,8 @@ version: "3.8"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
app:
|
app:
|
||||||
image: lukevella/rallly:2.11.1
|
image: lukevella/rallly:4.0.2
|
||||||
|
hostname: 0.0.0.0
|
||||||
networks:
|
networks:
|
||||||
- proxy
|
- proxy
|
||||||
- internal
|
- internal
|
||||||
@ -16,7 +17,9 @@ services:
|
|||||||
environment:
|
environment:
|
||||||
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password
|
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password
|
||||||
- DATABASE=rallly_db:5432/db
|
- DATABASE=rallly_db:5432/db
|
||||||
- NEXT_PUBLIC_BASE_URL=${DOMAIN}
|
- NEXT_PUBLIC_BASE_URL=https://${DOMAIN}
|
||||||
|
- NEXT_PUBLIC_APP_BASE_URL=https://${DOMAIN}
|
||||||
|
- NEXTAUTH_URL=$NEXT_PUBLIC_BASE_URL
|
||||||
- SECRET_PASSWORD_FILE=/run/secrets/secret_key
|
- SECRET_PASSWORD_FILE=/run/secrets/secret_key
|
||||||
- SUPPORT_EMAIL
|
- SUPPORT_EMAIL
|
||||||
- SMTP_HOST
|
- SMTP_HOST
|
||||||
@ -42,9 +45,10 @@ services:
|
|||||||
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
- "coop-cloud.${STACK_NAME}.version=0.4.1+2.11.1"
|
- "coop-cloud.${STACK_NAME}.version=1.0.0+4.0.2"
|
||||||
|
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: ["CMD", "curl", "-f", "http://localhost:3000"]
|
test: "bash -c 'printf \"GET / HTTP/1.1\n\n\" > /dev/tcp/127.0.0.1/3000; exit $$?;'"
|
||||||
interval: 30s
|
interval: 30s
|
||||||
timeout: 10s
|
timeout: 10s
|
||||||
retries: 10
|
retries: 10
|
||||||
@ -53,9 +57,10 @@ services:
|
|||||||
image: postgres:14.8
|
image: postgres:14.8
|
||||||
deploy:
|
deploy:
|
||||||
labels:
|
labels:
|
||||||
backupbot.backup: "true"
|
backupbot.backup: "${ENABLE_BACKUPS:-true}"
|
||||||
backupbot.backup.pre-hook: "PGPASSWORD=$$(cat /run/secrets/db_password) pg_dump -U postgres $${POSTGRES_DB} > /var/lib/postgresql/data/backup.sql"
|
backupbot.backup.pre-hook: "/pg_backup.sh backup"
|
||||||
backupbot.backup.post-hook: "rm -rf /var/lib/postgresql/data/backup.sql"
|
backupbot.backup.volumes.db-data.path: "backup.sql"
|
||||||
|
backupbot.restore.post-hook: '/pg_backup.sh restore'
|
||||||
volumes:
|
volumes:
|
||||||
- db-data:/var/lib/postgresql/data
|
- db-data:/var/lib/postgresql/data
|
||||||
secrets:
|
secrets:
|
||||||
@ -63,6 +68,7 @@ services:
|
|||||||
environment:
|
environment:
|
||||||
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password
|
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password
|
||||||
- POSTGRES_DB=db
|
- POSTGRES_DB=db
|
||||||
|
- POSTGRES_USER=postgres
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: ["CMD-SHELL", "pg_isready -U postgres"]
|
test: ["CMD-SHELL", "pg_isready -U postgres"]
|
||||||
interval: 5s
|
interval: 5s
|
||||||
@ -70,6 +76,10 @@ services:
|
|||||||
retries: 5
|
retries: 5
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
|
configs:
|
||||||
|
- source: pg_backup
|
||||||
|
target: /pg_backup.sh
|
||||||
|
mode: 0555
|
||||||
|
|
||||||
secrets:
|
secrets:
|
||||||
db_password:
|
db_password:
|
||||||
@ -88,9 +98,6 @@ networks:
|
|||||||
internal:
|
internal:
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
mongodb_log:
|
|
||||||
mongodb_lib:
|
|
||||||
mongodb:
|
|
||||||
db-data:
|
db-data:
|
||||||
|
|
||||||
configs:
|
configs:
|
||||||
@ -98,3 +105,6 @@ configs:
|
|||||||
name: ${STACK_NAME}_app_entrypoint_${APP_ENTRYPOINT_VERSION}
|
name: ${STACK_NAME}_app_entrypoint_${APP_ENTRYPOINT_VERSION}
|
||||||
file: entrypoint.sh.tmpl
|
file: entrypoint.sh.tmpl
|
||||||
template_driver: golang
|
template_driver: golang
|
||||||
|
pg_backup:
|
||||||
|
name: ${STACK_NAME}_pg_backup_${PG_BACKUP_VERSION}
|
||||||
|
file: pg_backup.sh
|
||||||
|
@ -1,5 +1,9 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
|
{{ if eq (env "OIDC_ENABLED") "1" }}
|
||||||
|
export OIDC_CLIENT_SECRET=$(cat /run/secrets/oidc_client_secret)
|
||||||
|
{{ end }}
|
||||||
|
|
||||||
set -eu
|
set -eu
|
||||||
|
|
||||||
file_env() {
|
file_env() {
|
||||||
@ -26,6 +30,7 @@ file_env() {
|
|||||||
file_env "SECRET_PASSWORD"
|
file_env "SECRET_PASSWORD"
|
||||||
file_env "SMTP_PWD"
|
file_env "SMTP_PWD"
|
||||||
file_env "POSTGRES_PASSWORD"
|
file_env "POSTGRES_PASSWORD"
|
||||||
|
file_env "OIDC_CLIENT_SECRET"
|
||||||
|
|
||||||
export DATABASE_URL=postgres://postgres:$POSTGRES_PASSWORD@$DATABASE
|
export DATABASE_URL=postgres://postgres:$POSTGRES_PASSWORD@$DATABASE
|
||||||
|
|
||||||
|
34
pg_backup.sh
Normal file
34
pg_backup.sh
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
BACKUP_FILE='/var/lib/postgresql/data/backup.sql'
|
||||||
|
|
||||||
|
function backup {
|
||||||
|
export PGPASSWORD=$(cat /run/secrets/db_password)
|
||||||
|
pg_dump -U ${POSTGRES_USER} ${POSTGRES_DB} > $BACKUP_FILE
|
||||||
|
}
|
||||||
|
|
||||||
|
function restore {
|
||||||
|
cd /var/lib/postgresql/data/
|
||||||
|
restore_config(){
|
||||||
|
# Restore allowed connections
|
||||||
|
cat pg_hba.conf.bak > pg_hba.conf
|
||||||
|
su postgres -c 'pg_ctl reload'
|
||||||
|
}
|
||||||
|
# Don't allow any other connections than local
|
||||||
|
cp pg_hba.conf pg_hba.conf.bak
|
||||||
|
echo "local all all trust" > pg_hba.conf
|
||||||
|
su postgres -c 'pg_ctl reload'
|
||||||
|
trap restore_config EXIT INT TERM
|
||||||
|
|
||||||
|
# Recreate Database
|
||||||
|
psql -U ${POSTGRES_USER} -d postgres -c "DROP DATABASE ${POSTGRES_DB} WITH (FORCE);"
|
||||||
|
createdb -U ${POSTGRES_USER} ${POSTGRES_DB}
|
||||||
|
psql -U ${POSTGRES_USER} -d ${POSTGRES_DB} -1 -f $BACKUP_FILE
|
||||||
|
|
||||||
|
trap - EXIT INT TERM
|
||||||
|
restore_config
|
||||||
|
}
|
||||||
|
|
||||||
|
$@
|
1
release/0.5.0+3.5.1
Normal file
1
release/0.5.0+3.5.1
Normal file
@ -0,0 +1 @@
|
|||||||
|
Rallly and recipe now support oidc. But you need to be registered to create polls now.
|
1
release/1.0.0+4.0.2
Normal file
1
release/1.0.0+4.0.2
Normal file
@ -0,0 +1 @@
|
|||||||
|
BREAKING CHANGE: SSO requires OIDC_ISSUER_URL env.
|
Loading…
x
Reference in New Issue
Block a user