Compare commits

...

16 Commits
main ... main

10 changed files with 112 additions and 16 deletions

View File

@ -6,7 +6,7 @@ steps:
image: git.coopcloud.tech/coop-cloud/stack-ssh-deploy:latest image: git.coopcloud.tech/coop-cloud/stack-ssh-deploy:latest
settings: settings:
host: swarm-test.autonomic.zone host: swarm-test.autonomic.zone
stack: {{ .Name }} stack: rallly
generate_secrets: true generate_secrets: true
purge: true purge: true
deploy_key: deploy_key:
@ -14,9 +14,14 @@ steps:
networks: networks:
- proxy - proxy
environment: environment:
DOMAIN: {{ .Name }}.swarm-test.autonomic.zone DOMAIN: rallly.swarm-test.autonomic.zone
STACK_NAME: {{ .Name }} STACK_NAME: rallly
LETS_ENCRYPT_ENV: production LETS_ENCRYPT_ENV: production
SECRET_SECRET_KEY_VERSION: v1
SECRET_DB_PASSWORD_VERSION: v1
SECRET_SMTP_PWD_VERSION: v1
APP_ENTRYPOINT_VERSION: v1
PG_BACKUP_VERSION: v1
trigger: trigger:
branch: branch:
- main - main
@ -32,7 +37,7 @@ steps:
from_secret: drone_abra-bot_token from_secret: drone_abra-bot_token
fork: true fork: true
repositories: repositories:
- coop-cloud/auto-recipes-catalogue-json - toolshed/auto-recipes-catalogue-json
trigger: trigger:
event: tag event: tag

View File

@ -1,12 +1,15 @@
TYPE=rallly TYPE=rallly
TIMEOUT=300 TIMEOUT=300
ENABLE_AUTO_UPDATE=true ENABLE_AUTO_UPDATE=true
ENABLE_BACKUPS=true
DOMAIN=rallly.example.com DOMAIN=rallly.example.com
## Domain aliases ## Domain aliases
#EXTRA_DOMAINS=', `www.rallly.example.com`' #EXTRA_DOMAINS=', `www.rallly.example.com`'
COMPOSE_FILE="compose.yml"
LETS_ENCRYPT_ENV=production LETS_ENCRYPT_ENV=production
SECRET_SECRET_KEY_VERSION=v1 SECRET_SECRET_KEY_VERSION=v1
@ -18,3 +21,11 @@ SMTP_HOST=mail.example.com
SMTP_PORT=465 SMTP_PORT=465
SMTP_SECURE=true SMTP_SECURE=true
SMTP_USER=noreply@example.com SMTP_USER=noreply@example.com
#COMPOSE_FILE="$COMPOSE_FILE:compose.oidc.yml"
#OIDC_ENABLED=1
#OIDC_NAME= #The user-facing name of your provider as it will be shown on the login page
#OIDC_DISCOVERY_URL= #URL of the .well-known/openid-configuration endpoint for your OIDC provider
#OIDC_CLIENT_ID=
#OIDC_ISSUER_URL=
#SECRET_OIDC_CLIENT_SECRET_VERSION=v1

View File

@ -1 +1,2 @@
export APP_ENTRYPOINT_VERSION=v2 export APP_ENTRYPOINT_VERSION=v3
export PG_BACKUP_VERSION=v1

12
alaconnect.yml Normal file
View File

@ -0,0 +1,12 @@
authentik:
env:
OIDC_NAME: "Authentik"
OIDC_DISCOVERY_URL: "https://authentik.example.com/application/o/rallly/.well-known/openid-configuration"
OIDC_ISSUER_URL: "https://authentik.example.com/application/o/rallly/"
OIDC_CLIENT_ID: rallly
uncomment:
- compose.oidc.yml
- SECRET_OIDC_CLIENT_SECRET_VERSION
- OIDC_ENABLED
shared_secrets:
rallly_secret: oidc_client_secret

16
compose.oidc.yml Normal file
View File

@ -0,0 +1,16 @@
---
version: "3.8"
services:
app:
secrets:
- oidc_client_secret
environment:
- OIDC_ENABLED
- OIDC_NAME
- OIDC_DISCOVERY_URL
- OIDC_CLIENT_ID
secrets:
oidc_client_secret:
name: ${STACK_NAME}_oidc_client_secret_${SECRET_OIDC_CLIENT_SECRET_VERSION}
external: true

View File

@ -3,7 +3,8 @@ version: "3.8"
services: services:
app: app:
image: lukevella/rallly:2.11.1 image: lukevella/rallly:4.0.2
hostname: 0.0.0.0
networks: networks:
- proxy - proxy
- internal - internal
@ -16,7 +17,9 @@ services:
environment: environment:
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password - POSTGRES_PASSWORD_FILE=/run/secrets/db_password
- DATABASE=rallly_db:5432/db - DATABASE=rallly_db:5432/db
- NEXT_PUBLIC_BASE_URL=${DOMAIN} - NEXT_PUBLIC_BASE_URL=https://${DOMAIN}
- NEXT_PUBLIC_APP_BASE_URL=https://${DOMAIN}
- NEXTAUTH_URL=$NEXT_PUBLIC_BASE_URL
- SECRET_PASSWORD_FILE=/run/secrets/secret_key - SECRET_PASSWORD_FILE=/run/secrets/secret_key
- SUPPORT_EMAIL - SUPPORT_EMAIL
- SMTP_HOST - SMTP_HOST
@ -42,9 +45,10 @@ services:
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect" - "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true" - "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}" - "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
- "coop-cloud.${STACK_NAME}.version=0.4.1+2.11.1" - "coop-cloud.${STACK_NAME}.version=1.0.0+4.0.2"
- "coop-cloud.${STACK_NAME}.timeout=${TIMEOUT:-120}"
healthcheck: healthcheck:
test: ["CMD", "curl", "-f", "http://localhost:3000"] test: "bash -c 'printf \"GET / HTTP/1.1\n\n\" > /dev/tcp/127.0.0.1/3000; exit $$?;'"
interval: 30s interval: 30s
timeout: 10s timeout: 10s
retries: 10 retries: 10
@ -52,10 +56,11 @@ services:
rallly_db: rallly_db:
image: postgres:14.8 image: postgres:14.8
deploy: deploy:
labels: labels:
backupbot.backup: "true" backupbot.backup: "${ENABLE_BACKUPS:-true}"
backupbot.backup.pre-hook: "PGPASSWORD=$$(cat /run/secrets/db_password) pg_dump -U postgres $${POSTGRES_DB} > /var/lib/postgresql/data/backup.sql" backupbot.backup.pre-hook: "/pg_backup.sh backup"
backupbot.backup.post-hook: "rm -rf /var/lib/postgresql/data/backup.sql" backupbot.backup.volumes.db-data.path: "backup.sql"
backupbot.restore.post-hook: '/pg_backup.sh restore'
volumes: volumes:
- db-data:/var/lib/postgresql/data - db-data:/var/lib/postgresql/data
secrets: secrets:
@ -63,6 +68,7 @@ services:
environment: environment:
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password - POSTGRES_PASSWORD_FILE=/run/secrets/db_password
- POSTGRES_DB=db - POSTGRES_DB=db
- POSTGRES_USER=postgres
healthcheck: healthcheck:
test: ["CMD-SHELL", "pg_isready -U postgres"] test: ["CMD-SHELL", "pg_isready -U postgres"]
interval: 5s interval: 5s
@ -70,6 +76,10 @@ services:
retries: 5 retries: 5
networks: networks:
- internal - internal
configs:
- source: pg_backup
target: /pg_backup.sh
mode: 0555
secrets: secrets:
db_password: db_password:
@ -88,9 +98,6 @@ networks:
internal: internal:
volumes: volumes:
mongodb_log:
mongodb_lib:
mongodb:
db-data: db-data:
configs: configs:
@ -98,3 +105,6 @@ configs:
name: ${STACK_NAME}_app_entrypoint_${APP_ENTRYPOINT_VERSION} name: ${STACK_NAME}_app_entrypoint_${APP_ENTRYPOINT_VERSION}
file: entrypoint.sh.tmpl file: entrypoint.sh.tmpl
template_driver: golang template_driver: golang
pg_backup:
name: ${STACK_NAME}_pg_backup_${PG_BACKUP_VERSION}
file: pg_backup.sh

View File

@ -1,5 +1,9 @@
#!/bin/bash #!/bin/bash
{{ if eq (env "OIDC_ENABLED") "1" }}
export OIDC_CLIENT_SECRET=$(cat /run/secrets/oidc_client_secret)
{{ end }}
set -eu set -eu
file_env() { file_env() {
@ -26,6 +30,7 @@ file_env() {
file_env "SECRET_PASSWORD" file_env "SECRET_PASSWORD"
file_env "SMTP_PWD" file_env "SMTP_PWD"
file_env "POSTGRES_PASSWORD" file_env "POSTGRES_PASSWORD"
file_env "OIDC_CLIENT_SECRET"
export DATABASE_URL=postgres://postgres:$POSTGRES_PASSWORD@$DATABASE export DATABASE_URL=postgres://postgres:$POSTGRES_PASSWORD@$DATABASE

34
pg_backup.sh Normal file
View File

@ -0,0 +1,34 @@
#!/bin/bash
set -e
BACKUP_FILE='/var/lib/postgresql/data/backup.sql'
function backup {
export PGPASSWORD=$(cat /run/secrets/db_password)
pg_dump -U ${POSTGRES_USER} ${POSTGRES_DB} > $BACKUP_FILE
}
function restore {
cd /var/lib/postgresql/data/
restore_config(){
# Restore allowed connections
cat pg_hba.conf.bak > pg_hba.conf
su postgres -c 'pg_ctl reload'
}
# Don't allow any other connections than local
cp pg_hba.conf pg_hba.conf.bak
echo "local all all trust" > pg_hba.conf
su postgres -c 'pg_ctl reload'
trap restore_config EXIT INT TERM
# Recreate Database
psql -U ${POSTGRES_USER} -d postgres -c "DROP DATABASE ${POSTGRES_DB} WITH (FORCE);"
createdb -U ${POSTGRES_USER} ${POSTGRES_DB}
psql -U ${POSTGRES_USER} -d ${POSTGRES_DB} -1 -f $BACKUP_FILE
trap - EXIT INT TERM
restore_config
}
$@

1
release/0.5.0+3.5.1 Normal file
View File

@ -0,0 +1 @@
Rallly and recipe now support oidc. But you need to be registered to create polls now.

1
release/1.0.0+4.0.2 Normal file
View File

@ -0,0 +1 @@
BREAKING CHANGE: SSO requires OIDC_ISSUER_URL env.