ConfigLMM 0.4.0 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (227) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +34 -0
  3. data/CNAME +1 -0
  4. data/Examples/.lmm.state.yaml +159 -0
  5. data/Examples/ConfigLMM.mm.yaml +32 -0
  6. data/Examples/Implemented.mm.yaml +252 -4
  7. data/Examples/SmallBusiness.mm.yaml +492 -0
  8. data/Plugins/Apps/Answer/answer.lmm.rb +165 -0
  9. data/Plugins/Apps/Answer/answer@.service +40 -0
  10. data/Plugins/Apps/ArchiSteamFarm/ArchiSteamFarm.conf.erb +0 -3
  11. data/Plugins/Apps/ArchiSteamFarm/ArchiSteamFarm.lmm.rb +0 -1
  12. data/Plugins/Apps/Authentik/Authentik-ProxyOutpost.container +7 -1
  13. data/Plugins/Apps/Authentik/Authentik-Server.container +6 -1
  14. data/Plugins/Apps/Authentik/Authentik-Worker.container +6 -1
  15. data/Plugins/Apps/Authentik/Authentik.conf.erb +12 -7
  16. data/Plugins/Apps/Authentik/Authentik.lmm.rb +226 -61
  17. data/Plugins/Apps/BookStack/BookStack.conf.erb +0 -3
  18. data/Plugins/Apps/BookStack/BookStack.container +5 -0
  19. data/Plugins/Apps/BookStack/BookStack.lmm.rb +14 -3
  20. data/Plugins/Apps/Cassandra/Cassandra.lmm.rb +9 -19
  21. data/Plugins/Apps/ClickHouse/ClickHouse.container +28 -0
  22. data/Plugins/Apps/ClickHouse/ClickHouse.lmm.rb +113 -0
  23. data/Plugins/Apps/ClickHouse/Config/listen.yaml +2 -0
  24. data/Plugins/Apps/ClickHouse/Config/logger.yaml +8 -0
  25. data/Plugins/Apps/ClickHouse/Config/zookeepers.yaml +5 -0
  26. data/Plugins/Apps/ClickHouse/Connection.rb +96 -0
  27. data/Plugins/Apps/Discourse/Discourse-Sidekiq.container +5 -0
  28. data/Plugins/Apps/Discourse/Discourse.conf.erb +1 -4
  29. data/Plugins/Apps/Discourse/Discourse.container +4 -0
  30. data/Plugins/Apps/Discourse/Discourse.lmm.rb +116 -55
  31. data/Plugins/Apps/Dovecot/Dovecot.lmm.rb +74 -62
  32. data/Plugins/Apps/ERPNext/ERPNext-Frontend.container +6 -1
  33. data/Plugins/Apps/ERPNext/ERPNext-Queue.container +5 -0
  34. data/Plugins/Apps/ERPNext/ERPNext-Scheduler.container +5 -0
  35. data/Plugins/Apps/ERPNext/ERPNext-Websocket.container +6 -1
  36. data/Plugins/Apps/ERPNext/ERPNext.container +6 -1
  37. data/Plugins/Apps/ERPNext/ERPNext.lmm.rb +138 -127
  38. data/Plugins/Apps/GitLab/GitLab.container +6 -0
  39. data/Plugins/Apps/GitLab/GitLab.lmm.rb +43 -49
  40. data/Plugins/Apps/Homepage/Homepage.conf.erb +86 -0
  41. data/Plugins/Apps/Homepage/Homepage.container +19 -0
  42. data/Plugins/Apps/Homepage/Homepage.lmm.rb +54 -0
  43. data/Plugins/Apps/IPFS/IPFS.conf.erb +0 -3
  44. data/Plugins/Apps/IPFS/IPFS.lmm.rb +0 -1
  45. data/Plugins/Apps/InfluxDB/InfluxDB.conf.erb +0 -3
  46. data/Plugins/Apps/InfluxDB/InfluxDB.lmm.rb +0 -1
  47. data/Plugins/Apps/Jackett/Jackett.conf.erb +0 -3
  48. data/Plugins/Apps/Jackett/Jackett.lmm.rb +0 -1
  49. data/Plugins/Apps/Jellyfin/Jellyfin.conf.erb +0 -3
  50. data/Plugins/Apps/Jellyfin/Jellyfin.lmm.rb +0 -1
  51. data/Plugins/Apps/LetsEncrypt/LetsEncrypt.lmm.rb +49 -28
  52. data/Plugins/Apps/LibreTranslate/LibreTranslate.container +21 -0
  53. data/Plugins/Apps/LibreTranslate/LibreTranslate.lmm.rb +34 -0
  54. data/Plugins/Apps/Lobsters/Containerfile +81 -0
  55. data/Plugins/Apps/Lobsters/Lobsters-Tasks.container +26 -0
  56. data/Plugins/Apps/Lobsters/Lobsters.conf.erb +99 -0
  57. data/Plugins/Apps/Lobsters/Lobsters.container +27 -0
  58. data/Plugins/Apps/Lobsters/Lobsters.lmm.rb +196 -0
  59. data/Plugins/Apps/Lobsters/crontab +3 -0
  60. data/Plugins/Apps/Lobsters/database.yml +26 -0
  61. data/Plugins/Apps/Lobsters/entrypoint.sh +30 -0
  62. data/Plugins/Apps/Lobsters/generateCredentials.rb +19 -0
  63. data/Plugins/Apps/Lobsters/lobsters-cron.sh +25 -0
  64. data/Plugins/Apps/Lobsters/lobsters-daily.sh +23 -0
  65. data/Plugins/Apps/Lobsters/puma.rb +49 -0
  66. data/Plugins/Apps/MariaDB/Connection.rb +55 -0
  67. data/Plugins/Apps/MariaDB/MariaDB.lmm.rb +60 -53
  68. data/Plugins/Apps/Mastodon/Mastodon-Sidekiq.container +22 -0
  69. data/Plugins/Apps/Mastodon/Mastodon-Streaming.container +20 -0
  70. data/Plugins/Apps/Mastodon/Mastodon.conf.erb +34 -45
  71. data/Plugins/Apps/Mastodon/Mastodon.container +28 -0
  72. data/Plugins/Apps/Mastodon/Mastodon.lmm.rb +240 -5
  73. data/Plugins/Apps/Mastodon/configlmm.rake +30 -0
  74. data/Plugins/Apps/Mastodon/entrypoint.sh +16 -0
  75. data/Plugins/Apps/Matrix/Element.container +5 -0
  76. data/Plugins/Apps/Matrix/Matrix.conf.erb +2 -8
  77. data/Plugins/Apps/Matrix/Matrix.lmm.rb +100 -71
  78. data/Plugins/Apps/Matrix/Synapse.container +5 -0
  79. data/Plugins/Apps/Netdata/Netdata.conf.erb +0 -3
  80. data/Plugins/Apps/Netdata/Netdata.lmm.rb +0 -1
  81. data/Plugins/Apps/Nextcloud/Nextcloud.conf.erb +3 -4
  82. data/Plugins/Apps/Nextcloud/Nextcloud.lmm.rb +150 -68
  83. data/Plugins/Apps/Nextcloud/autoconfig.php +13 -0
  84. data/Plugins/Apps/Nextcloud/config.php +10 -1
  85. data/Plugins/Apps/Nextcloud/nextcloudcron.service +8 -0
  86. data/Plugins/Apps/Nextcloud/nextcloudcron.timer +10 -0
  87. data/Plugins/Apps/Nginx/Connection.rb +93 -0
  88. data/Plugins/Apps/Nginx/conf.d/configlmm.conf +50 -9
  89. data/Plugins/Apps/Nginx/conf.d/languages.conf +21 -0
  90. data/Plugins/Apps/Nginx/config-lmm/errors.conf +25 -20
  91. data/Plugins/Apps/Nginx/config-lmm/gateway-errors.conf +20 -0
  92. data/Plugins/Apps/Nginx/config-lmm/proxy.conf +1 -1
  93. data/Plugins/Apps/Nginx/main.conf.erb +7 -3
  94. data/Plugins/Apps/Nginx/nginx.conf +2 -2
  95. data/Plugins/Apps/Nginx/nginx.lmm.rb +99 -81
  96. data/Plugins/Apps/Nginx/proxy.conf.erb +11 -3
  97. data/Plugins/Apps/Odoo/Odoo.conf.erb +0 -3
  98. data/Plugins/Apps/Odoo/Odoo.container +5 -0
  99. data/Plugins/Apps/Odoo/Odoo.lmm.rb +4 -5
  100. data/Plugins/Apps/Ollama/Ollama.container +26 -0
  101. data/Plugins/Apps/Ollama/Ollama.lmm.rb +73 -0
  102. data/Plugins/Apps/OpenTelemetry/Config/config.yaml +704 -0
  103. data/Plugins/Apps/OpenTelemetry/OpenTelemetry.lmm.rb +154 -0
  104. data/Plugins/Apps/OpenVidu/Ingress.container +5 -0
  105. data/Plugins/Apps/OpenVidu/OpenVidu.conf.erb +0 -3
  106. data/Plugins/Apps/OpenVidu/OpenVidu.container +5 -0
  107. data/Plugins/Apps/OpenVidu/OpenVidu.lmm.rb +7 -3
  108. data/Plugins/Apps/OpenVidu/OpenViduCall.conf.erb +0 -3
  109. data/Plugins/Apps/OpenVidu/OpenViduCall.container +5 -0
  110. data/Plugins/Apps/PHP-FPM/Connection.rb +91 -0
  111. data/Plugins/Apps/PHP-FPM/PHP-FPM.lmm.rb +31 -4
  112. data/Plugins/Apps/Peppermint/Peppermint.conf.erb +2 -5
  113. data/Plugins/Apps/Peppermint/Peppermint.container +5 -0
  114. data/Plugins/Apps/Peppermint/Peppermint.lmm.rb +29 -33
  115. data/Plugins/Apps/Perplexica/Perplexica.container +25 -0
  116. data/Plugins/Apps/Perplexica/Perplexica.lmm.rb +92 -0
  117. data/Plugins/Apps/Perplexica/config.toml +26 -0
  118. data/Plugins/Apps/Podman/Connection.rb +24 -0
  119. data/Plugins/Apps/Podman/Podman.lmm.rb +80 -0
  120. data/Plugins/Apps/Podman/storage.conf +6 -0
  121. data/Plugins/Apps/Postfix/Postfix.lmm.rb +242 -164
  122. data/Plugins/Apps/PostgreSQL/Connection.rb +97 -0
  123. data/Plugins/Apps/PostgreSQL/PostgreSQL.lmm.rb +184 -148
  124. data/Plugins/Apps/Pterodactyl/Pterodactyl.conf.erb +0 -3
  125. data/Plugins/Apps/Pterodactyl/Pterodactyl.lmm.rb +0 -2
  126. data/Plugins/Apps/Pterodactyl/Wings.conf.erb +0 -3
  127. data/Plugins/Apps/RVM/RVM.lmm.rb +57 -0
  128. data/Plugins/Apps/Roundcube/Roundcube.conf.erb +0 -3
  129. data/Plugins/Apps/Roundcube/Roundcube.lmm.rb +15 -19
  130. data/Plugins/Apps/SSH/SSH.lmm.rb +9 -15
  131. data/Plugins/Apps/SearXNG/SearXNG.container +22 -0
  132. data/Plugins/Apps/SearXNG/SearXNG.lmm.rb +79 -0
  133. data/Plugins/Apps/SearXNG/limiter.toml +40 -0
  134. data/Plugins/Apps/SearXNG/settings.yml +2 -0
  135. data/Plugins/Apps/SigNoz/Config/alerts.yml +11 -0
  136. data/Plugins/Apps/SigNoz/Config/otel-collector-config.yaml +110 -0
  137. data/Plugins/Apps/SigNoz/Config/otel-collector-opamp-config.yaml +1 -0
  138. data/Plugins/Apps/SigNoz/Config/prometheus.yml +18 -0
  139. data/Plugins/Apps/SigNoz/SigNoz-Collector.container +23 -0
  140. data/Plugins/Apps/SigNoz/SigNoz-Migrator.container +17 -0
  141. data/Plugins/Apps/SigNoz/SigNoz.conf.erb +61 -0
  142. data/Plugins/Apps/SigNoz/SigNoz.container +26 -0
  143. data/Plugins/Apps/SigNoz/SigNoz.lmm.rb +319 -0
  144. data/Plugins/Apps/Solr/log4j2.xml +89 -0
  145. data/Plugins/Apps/Solr/solr.lmm.rb +82 -0
  146. data/Plugins/Apps/Sunshine/Sunshine.conf.erb +0 -3
  147. data/Plugins/Apps/Sunshine/Sunshine.lmm.rb +0 -1
  148. data/Plugins/Apps/Tunnel/tunnel.lmm.rb +33 -37
  149. data/Plugins/Apps/UVdesk/UVdesk.conf.erb +0 -3
  150. data/Plugins/Apps/Umami/Umami.container +19 -0
  151. data/Plugins/Apps/Umami/Umami.lmm.rb +108 -0
  152. data/Plugins/Apps/Valkey/Valkey.lmm.rb +54 -42
  153. data/Plugins/Apps/Vaultwarden/Vaultwarden.conf.erb +9 -6
  154. data/Plugins/Apps/Vaultwarden/Vaultwarden.container +7 -1
  155. data/Plugins/Apps/Vaultwarden/Vaultwarden.lmm.rb +64 -29
  156. data/Plugins/Apps/Wiki.js/Wiki.js.conf.erb +1 -4
  157. data/Plugins/Apps/Wiki.js/Wiki.js.container +5 -0
  158. data/Plugins/Apps/Wiki.js/Wiki.js.lmm.rb +31 -37
  159. data/Plugins/Apps/YaCy/YaCy.conf.erb +93 -0
  160. data/Plugins/Apps/YaCy/YaCy.container +21 -0
  161. data/Plugins/Apps/YaCy/YaCy.lmm.rb +160 -0
  162. data/Plugins/Apps/ZooKeeper/ZooKeeper.container +24 -0
  163. data/Plugins/Apps/ZooKeeper/ZooKeeper.lmm.rb +68 -0
  164. data/Plugins/Apps/bitmagnet/bitmagnet.conf.erb +0 -3
  165. data/Plugins/Apps/bitmagnet/bitmagnet.lmm.rb +0 -1
  166. data/Plugins/Apps/gollum/gollum.conf.erb +2 -4
  167. data/Plugins/Apps/gollum/gollum.container +6 -0
  168. data/Plugins/Apps/gollum/gollum.lmm.rb +51 -50
  169. data/Plugins/Apps/llama.cpp/llama.cpp.container +28 -0
  170. data/Plugins/Apps/llama.cpp/llama.cpp.lmm.rb +90 -0
  171. data/Plugins/Apps/vLLM/vLLM.container +32 -0
  172. data/Plugins/Apps/vLLM/vLLM.lmm.rb +89 -0
  173. data/Plugins/OS/General/Utils.lmm.rb +26 -0
  174. data/Plugins/OS/Linux/Connection.rb +472 -0
  175. data/Plugins/OS/Linux/Debian/preseed.cfg.erb +25 -6
  176. data/Plugins/OS/Linux/Flavours.yaml +13 -0
  177. data/Plugins/OS/Linux/Grub/grub.cfg +10 -0
  178. data/Plugins/OS/Linux/HTTP.rb +32 -0
  179. data/Plugins/OS/Linux/Linux.lmm.rb +533 -187
  180. data/Plugins/OS/Linux/Packages.yaml +20 -1
  181. data/Plugins/OS/Linux/Services.yaml +8 -0
  182. data/Plugins/OS/Linux/Shell.rb +70 -0
  183. data/Plugins/OS/Linux/Syslinux/default +8 -0
  184. data/Plugins/OS/Linux/WireGuard/WireGuard.lmm.rb +83 -59
  185. data/Plugins/OS/Linux/WireGuard/wg0.conf.erb +3 -0
  186. data/Plugins/OS/Linux/openSUSE/autoinst.xml.erb +29 -3
  187. data/Plugins/OS/Linux/systemd/systemd.lmm.rb +13 -11
  188. data/Plugins/OS/Routers/Aruba/ArubaInstant.lmm.rb +6 -5
  189. data/Plugins/Platforms/GitHub.lmm.rb +73 -28
  190. data/Plugins/Platforms/GoDaddy/GoDaddy.lmm.rb +9 -6
  191. data/Plugins/Platforms/Proxmox/Proxmox.lmm.rb +402 -0
  192. data/Plugins/Platforms/Proxmox/XTerm.rb +321 -0
  193. data/Plugins/Platforms/libvirt/libvirt.lmm.rb +38 -13
  194. data/Plugins/Platforms/porkbun.lmm.rb +12 -2
  195. data/Plugins/Platforms/porkbun_spec.rb +2 -2
  196. data/Plugins/Services/DNS/AmberBit.lmm.rb +1 -1
  197. data/Plugins/Services/DNS/ArubaItDNS.lmm.rb +1 -1
  198. data/Plugins/Services/DNS/NICLV.lmm.rb +1 -1
  199. data/Plugins/Services/DNS/PowerDNS.lmm.rb +70 -68
  200. data/Plugins/Services/DNS/tonic.lmm.rb +22 -12
  201. data/lib/ConfigLMM/Framework/plugins/dns.rb +4 -3
  202. data/lib/ConfigLMM/Framework/plugins/linuxApp.rb +145 -184
  203. data/lib/ConfigLMM/Framework/plugins/nginxApp.rb +34 -17
  204. data/lib/ConfigLMM/Framework/plugins/plugin.rb +53 -181
  205. data/lib/ConfigLMM/Framework/plugins/store.rb +4 -4
  206. data/lib/ConfigLMM/Framework/variables.rb +75 -0
  207. data/lib/ConfigLMM/Framework.rb +1 -0
  208. data/lib/ConfigLMM/cli.rb +12 -6
  209. data/lib/ConfigLMM/commands/configsCommand.rb +37 -6
  210. data/lib/ConfigLMM/commands/diff.rb +33 -9
  211. data/lib/ConfigLMM/context.rb +22 -3
  212. data/lib/ConfigLMM/io/configList.rb +82 -6
  213. data/lib/ConfigLMM/io/connection.rb +143 -0
  214. data/lib/ConfigLMM/io/dhcp.rb +330 -0
  215. data/lib/ConfigLMM/io/http.rb +78 -0
  216. data/lib/ConfigLMM/io/local.rb +207 -0
  217. data/lib/ConfigLMM/io/pxe.rb +92 -0
  218. data/lib/ConfigLMM/io/ssh.rb +156 -0
  219. data/lib/ConfigLMM/io/tftp.rb +105 -0
  220. data/lib/ConfigLMM/io.rb +2 -0
  221. data/lib/ConfigLMM/secrets/envStore.rb +39 -0
  222. data/lib/ConfigLMM/secrets/fileStore.rb +43 -0
  223. data/lib/ConfigLMM/state.rb +2 -1
  224. data/lib/ConfigLMM/version.rb +2 -1
  225. data/lib/ConfigLMM.rb +1 -0
  226. data/{Examples → scripts}/configlmmAuth.sh +7 -5
  227. metadata +205 -8
@@ -0,0 +1,113 @@
1
+
2
+ require_relative 'Connection'
3
+
4
+ module ConfigLMM
5
+ module LMM
6
+ class ClickHouse < Framework::Plugin
7
+
8
+ USER = 'clickhouse'
9
+ HOME_DIR = '/var/lib/clickhouse'
10
+ SERVICE_NAME = 'ClickHouse'
11
+ CONTAINER_NAME = 'ClickHouse'
12
+ PORT = '19100'
13
+ DEFAULT_CLUSTER = 'default'
14
+
15
+ def actionClickHouseDeploy(id, target, activeState, context, options)
16
+ self.withConnection(target['Location'], target) do |connection|
17
+ Linux.withConnection(connection) do |linuxConnection|
18
+ Podman.ensurePresent(linuxConnection, options)
19
+ Podman.createUser(USER, HOME_DIR, 'ClickHouse', linuxConnection, options)
20
+ linuxConnection.withUserShell(USER) do |shell|
21
+ shell.createDirs(options, '~/data', '~/logs', '~/server/config.d' ,'~/server/users.d')
22
+ end
23
+
24
+ user = target['AdminUsername'] || context.secrets.load(target['SecretId'], 'USERNAME') || 'admin'
25
+ context.secrets.store(target['SecretId'], 'USERNAME', user)
26
+ password = context.secrets.load(target['SecretId'], 'PASSWORD')
27
+ if password.nil?
28
+ password = SecureRandom.alphanumeric(20)
29
+ context.secrets.store(target['SecretId'], 'PASSWORD', password)
30
+ context.secrets.print("#{user} password", password)
31
+ end
32
+
33
+ path = Podman.containersPath(HOME_DIR)
34
+ linuxConnection.fileWrite("#{path}/ClickHouse.env", "CLICKHOUSE_USER=#{user}", options)
35
+ linuxConnection.fileAppend("#{path}/ClickHouse.env", "CLICKHOUSE_PASSWORD=#{password}", { **options, hide: true })
36
+ linuxConnection.fileAppend("#{path}/ClickHouse.env", "CLICKHOUSE_DEFAULT_ACCESS_MANAGEMENT=1", options)
37
+
38
+ linuxConnection.setUserGroup("#{path}/ClickHouse.env", USER, USER, options)
39
+ linuxConnection.setPrivate("#{path}/ClickHouse.env", options)
40
+
41
+ loggerConfigFile = __dir__ + '/Config/logger.yaml'
42
+ if target['LogLevel']
43
+ loggerConfig = YAML.load_file(loggerConfigFile)
44
+ loggerConfig['logger']['level'] = target['LogLevel']
45
+ loggerConfigFile = options['output'] + '/logger.yaml'
46
+ File.write(loggerConfigFile, loggerConfig.to_yaml)
47
+ end
48
+
49
+ linuxConnection.upload(__dir__ + '/ClickHouse.container', path, options)
50
+ linuxConnection.upload(__dir__ + '/Config/listen.yaml', HOME_DIR + '/server/config.d/', options)
51
+ linuxConnection.upload(loggerConfigFile, HOME_DIR + '/server/config.d/', options)
52
+ linuxConnection.upload(__dir__ + '/Config/zookeepers.yaml', HOME_DIR + '/server/config.d/', options)
53
+ linuxConnection.reloadUserServices(USER, options)
54
+ linuxConnection.restartUserService(USER, SERVICE_NAME, options)
55
+ end
56
+ end
57
+ end
58
+
59
+ def self.defaults(settings)
60
+ settings['HostName'] = 'localhost' unless settings['HostName']
61
+ settings['Port'] = PORT unless settings['Port']
62
+ end
63
+
64
+ def self.withConnection(settings, linuxConnection, secrets, options)
65
+ if settings['HostName'].nil? || settings['HostName'] == 'localhost'
66
+ settings = settings.dup
67
+ settings.delete('HostName')
68
+ settings.delete('Port')
69
+ linuxConnection.withUserShell(USER) do |shellConnection|
70
+ Podman.withConnection(shellConnection, Podman.container(CONTAINER_NAME, shellConnection, options)) do |connection|
71
+ yield(ClickHouseConnection.new(connection, settings))
72
+ end
73
+ end
74
+ else
75
+ if settings['ClickHouseSecretId'].nil?
76
+ raise Framework::PluginError.new('You need to set ClickHouseSecretId!')
77
+ end
78
+
79
+ self.defaults(settings)
80
+ adminUsername = secrets.load(settings['ClickHouseSecretId'], 'USERNAME')
81
+ adminPassword = secrets.load(settings['ClickHouseSecretId'], 'PASSWORD')
82
+
83
+ if adminUsername.nil? || adminPassword.nil?
84
+ raise Framework::PluginError.new('Invalid ClickHouseSecretId!')
85
+ end
86
+
87
+ raise 'Not Implemented!'
88
+ yield(nil)
89
+ end
90
+ end
91
+
92
+ def cleanup(configs, state, context, options)
93
+ cleanupType(:ClickHouse, configs, state, context, options) do |item, id, state, context, options, connection|
94
+ Linux.withConnection(connection) do |linuxConnection|
95
+ linuxConnection.stopUserService(USER, SERVICE_NAME, options)
96
+
97
+ path = Podman.containersPath(HOME_DIR)
98
+ linuxConnection.rm("#{path}/ClickHouse.container", options[:dry])
99
+
100
+ state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
101
+
102
+ if options[:destroy]
103
+ linuxConnection.deleteUserAndGroup(USER, options)
104
+ state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
105
+ end
106
+ end
107
+ end
108
+ end
109
+
110
+ end
111
+ end
112
+ end
113
+
@@ -0,0 +1,2 @@
1
+
2
+ listen_host: 0.0.0.0
@@ -0,0 +1,8 @@
1
+
2
+ logger:
3
+ log:
4
+ errorlog:
5
+ console: true
6
+ level: information
7
+ formatting:
8
+ type: json
@@ -0,0 +1,5 @@
1
+
2
+ zookeeper:
3
+ - node:
4
+ host: 10.0.2.2
5
+ port: 2181
@@ -0,0 +1,96 @@
1
+
2
+ module ConfigLMM
3
+ module LMM
4
+ class ClickHouseConnection
5
+
6
+ attr_reader :connection
7
+ attr_reader :settings
8
+
9
+ def initialize(connection, settings)
10
+ @connection = connection
11
+ @settings = settings
12
+ end
13
+
14
+ def exec(query, allowFailure = false, options = {})
15
+ cmd = "clickhouse-client --query '#{LinuxShell.escapeSingleQuotes(query)}'"
16
+ begin
17
+ connection.exec(cmd, allowFailure, options)
18
+ rescue IO::ExecError => error
19
+ # Retry
20
+ # Code: 210. DB::NetException: Connection refused (localhost:9000). (NETWORK_ERROR)
21
+ if error.stderr.include?('NETWORK_ERROR')
22
+ sleep(5)
23
+ connection.exec(cmd, allowFailure, options)
24
+ else
25
+ raise
26
+ end
27
+ end
28
+ end
29
+
30
+ def createUser(user, password, cluster, options)
31
+ clusterSQL = ''
32
+ if cluster
33
+ clusterSQL = " ON CLUSTER #{cluster}"
34
+ end
35
+ exec("CREATE USER IF NOT EXISTS #{user}#{clusterSQL}", false, options)
36
+ if password
37
+ sql = "ALTER USER #{user} IDENTIFIED WITH bcrypt_password by '#{password}'"
38
+ exec(sql, false, { **options, hide: true })
39
+ end
40
+ end
41
+
42
+ def dropUser(user, cluster, options = {})
43
+ clusterSQL = ''
44
+ if cluster
45
+ clusterSQL = " ON CLUSTER #{cluster}"
46
+ end
47
+ exec("DROP USER IF EXISTS #{user}#{clusterSQL}", false, options)
48
+ end
49
+
50
+ def createDB(database, cluster, options = {})
51
+ clusterSQL = ''
52
+ if cluster
53
+ clusterSQL = " ON CLUSTER #{cluster}"
54
+ end
55
+ exec("CREATE DATABASE IF NOT EXISTS #{database}#{clusterSQL}", false, options)
56
+ end
57
+
58
+ def dropDB(database, cluster, options = {})
59
+ clusterSQL = ''
60
+ if cluster
61
+ clusterSQL = " ON CLUSTER #{cluster}"
62
+ end
63
+ exec("DROP DATABASE IF EXISTS #{database}#{clusterSQL}", false, options)
64
+ end
65
+
66
+ def grant(privilege, user, target, cluster, options = {})
67
+ clusterSQL = ''
68
+ if cluster
69
+ clusterSQL = "ON CLUSTER #{cluster}"
70
+ end
71
+ exec("GRANT #{clusterSQL} #{privilege} ON #{target} TO #{user}", false, options)
72
+ end
73
+
74
+ def grantDB(privilege, user, database, cluster, options = {})
75
+ grant(privilege, user, database + '.*', cluster, options)
76
+ end
77
+
78
+ def grantCluster(user, cluster, options = {})
79
+ clusterSQL = ''
80
+ if cluster
81
+ clusterSQL = "ON CLUSTER #{cluster}"
82
+ end
83
+ exec("GRANT #{clusterSQL} CLUSTER ON *.* TO #{user}", false, options)
84
+ end
85
+
86
+ def grantRemote(user, cluster, options = {})
87
+ clusterSQL = ''
88
+ if cluster
89
+ clusterSQL = "ON CLUSTER #{cluster}"
90
+ end
91
+ exec("GRANT #{clusterSQL} REMOTE ON *.* TO #{user}", false, options)
92
+ end
93
+
94
+ end
95
+ end
96
+ end
@@ -5,13 +5,18 @@ Description=Discourse Sidekiq container
5
5
  After=local-fs.target
6
6
 
7
7
  [Container]
8
+ ContainerName=Discourse-Sidekiq
8
9
  Image=docker.io/bitnami/discourse:latest
9
10
  Exec=/opt/bitnami/scripts/discourse-sidekiq/run.sh
10
11
  EnvironmentFile=/var/lib/discourse/.config/containers/systemd/Discourse.env
11
12
  Network=slirp4netns:allow_host_loopback=true
12
13
  UserNS=keep-id:uid=999,gid=999
13
14
  Volume=/var/lib/discourse/sidekiq:/bitnami/discourse
15
+ LogDriver=journald
14
16
  AutoUpdate=registry
15
17
 
18
+ [Service]
19
+ Restart=on-failure
20
+
16
21
  [Install]
17
22
  WantedBy=multi-user.target default.target
@@ -22,10 +22,7 @@ server {
22
22
 
23
23
  server_name <%= config['Domain'] %>;
24
24
 
25
- access_log /var/log/nginx/discourse.access.log;
26
- error_log /var/log/nginx/discourse.error.log;
27
-
28
- include config-lmm/errors.conf;
25
+ include config-lmm/gateway-errors.conf;
29
26
  include config-lmm/security.conf;
30
27
 
31
28
  location / {
@@ -11,7 +11,11 @@ Network=slirp4netns:allow_host_loopback=true
11
11
  PublishPort=127.0.0.1:13100:3000
12
12
  UserNS=keep-id:uid=999,gid=999
13
13
  Volume=/var/lib/discourse/data:/bitnami/discourse
14
+ LogDriver=journald
14
15
  AutoUpdate=registry
15
16
 
17
+ [Service]
18
+ Restart=on-failure
19
+
16
20
  [Install]
17
21
  WantedBy=multi-user.target default.target
@@ -1,91 +1,152 @@
1
1
 
2
2
  module ConfigLMM
3
3
  module LMM
4
- class Discourse < Framework::NginxApp
4
+ class Discourse < Framework::Plugin
5
5
 
6
6
  USER = 'discourse'
7
7
  HOME_DIR = '/var/lib/discourse'
8
8
  HOST_IP = '10.0.2.2'
9
+ CONTAINER_NAME = 'Discourse'
9
10
 
10
11
  def actionDiscourseDeploy(id, target, activeState, context, options)
11
12
  raise Framework::PluginProcessError.new('Domain field must be set!') unless target['Domain']
12
13
 
13
14
  target['Database'] ||= {}
14
- if target['Location'] && target['Location'] != '@me'
15
- uri = Addressable::URI.parse(target['Location'])
16
- raise Framework::PluginProcessError.new("#{id}: Unknown Protocol: #{uri.scheme}!") if uri.scheme != 'ssh'
15
+ self.withConnection(target['Location'], target) do |connection|
16
+ Linux.withConnection(connection) do |linuxConnection|
17
+ target['Database'] ||= {}
17
18
 
18
- self.class.sshStart(uri) do |ssh|
19
+ dbPassword = self.configurePostgreSQL(target['Database'], linuxConnection, options)
19
20
 
20
- dbPassword = self.configurePostgreSQL(target['Database'], ssh)
21
- distroInfo = Framework::LinuxApp.currentDistroInfo(ssh)
22
- Framework::LinuxApp.configurePodmanServiceOverSSH(USER, HOME_DIR, 'Discourse', distroInfo, ssh)
23
- self.class.sshExec!(ssh, "su --login #{USER} --shell /bin/sh --command 'mkdir -p ~/data ~/sidekiq'")
21
+ Podman.ensurePresent(linuxConnection, options)
22
+ Podman.createUser(USER, HOME_DIR, 'Discourse', linuxConnection, options)
23
+ linuxConnection.withUserShell(USER) do |shell|
24
+ shell.createDirs(options, '~/data', '~/sidekiq')
25
+ end
26
+
27
+ path = Podman.containersPath(HOME_DIR)
28
+ linuxConnection.fileWrite("#{path}/Discourse.env", "DISCOURSE_DATABASE_HOST=#{HOST_IP}", options)
29
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_DATABASE_NAME=#{USER}", options)
30
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_DATABASE_USER=#{USER}", options)
31
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_DATABASE_PASSWORD=#{dbPassword}", { **options, hide: true })
32
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_HOST=#{target['Domain']}", options)
33
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_REDIS_HOST=#{HOST_IP}", options)
34
+
35
+ if target['ValkeySecretId']
36
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_REDIS_PASSWORD=#{context.secrets.load(target['ValkeySecretId'], 'VALKEY_PASSWORD')}", { **options, hide: true })
37
+ end
38
+
39
+ username = 'user'
40
+ if target['Admin']
41
+ if target['Admin']['Username']
42
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_USERNAME=#{target['Admin']['Username']}", options)
43
+ end
44
+
45
+ if target['Admin']['EMail']
46
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_EMAIL=#{target['Admin']['EMail']}", options)
47
+ end
24
48
 
25
- path = Framework::LinuxApp::SYSTEMD_CONTAINERS_PATH.gsub('~', HOME_DIR)
26
- self.class.exec("echo 'DISCOURSE_DATABASE_HOST=#{HOST_IP}' > #{path}/Discourse.env", ssh)
27
- self.class.exec("echo 'DISCOURSE_DATABASE_NAME=#{USER}' >> #{path}/Discourse.env", ssh)
28
- self.class.exec(" echo 'DISCOURSE_DATABASE_USER=#{USER}' >> #{path}/Discourse.env", ssh)
29
- self.class.exec(" echo 'DISCOURSE_DATABASE_PASSWORD=#{dbPassword}' >> #{path}/Discourse.env", ssh)
30
- self.class.exec("echo 'DISCOURSE_HOST=#{target['Domain']}' >> #{path}/Discourse.env", ssh)
49
+ if target['Admin'].key?('FirstName')
50
+ firstName = target['Admin']['FirstName'].to_s
51
+ firstName = '""' if firstName.empty?
52
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_FIRST_NAME=#{firstName}", options)
53
+ end
31
54
 
32
- self.class.exec("echo 'DISCOURSE_REDIS_HOST=#{HOST_IP}' >> #{path}/Discourse.env", ssh)
33
- self.class.exec(" echo 'DISCOURSE_REDIS_PASSWORD=#{ENV['REDIS_PASSWORD']}' >> #{path}/Discourse.env", ssh)
55
+ if target['Admin'].key?('LastName')
56
+ lastName = target['Admin']['LastName'].to_s
57
+ lastName = '""' if lastName.empty?
58
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_LAST_NAME=#{lastName}", options)
59
+ end
60
+ end
61
+
62
+ adminPassword = context.secrets.load(target['SecretId'], 'ADMIN_PASSWORD')
63
+ if adminPassword.nil?
64
+ adminPassword = SecureRandom.alphanumeric(20)
65
+ context.secrets.store(target['SecretId'], 'ADMIN_PASSWORD', adminPassword)
66
+ context.secrets.print("Discourse Admin '#{username}' password", adminPassword)
67
+ end
68
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_PASSWORD=#{adminPassword}", { **options, hide: true })
34
69
 
35
70
  if target['SMTP']
36
71
  host = target['SMTP']['Host']
37
- host = HOST_IP if ['localhost', '127.0.0.1'].include?(host)
38
- self.class.exec("echo 'DISCOURSE_SMTP_HOST=#{host}' >> #{path}/Discourse.env", ssh)
39
- self.class.exec("echo 'DISCOURSE_SMTP_PORT_NUMBER=#{target['SMTP']['Port']}' >> #{path}/Discourse.env", ssh)
40
- self.class.exec(" echo 'DISCOURSE_SMTP_USER=#{target['SMTP']['Username']}' >> #{path}/Discourse.env", ssh)
41
- self.class.exec(" echo 'DISCOURSE_SMTP_PASSWORD=#{ENV['DISCOURSE_SMTP_PASSWORD']}' >> #{path}/Discourse.env", ssh)
72
+ host = HOST_IP if host.to_s.empty? || ['localhost', '127.0.0.1'].include?(host)
73
+
74
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_SMTP_HOST=#{host}", options)
75
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_SMTP_PORT_NUMBER=#{target['SMTP']['Port']}", options)
76
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_SMTP_USER=#{target['SMTP']['Username']}", options)
77
+
78
+ smtpPassword = ''
79
+ if target['SMTP']['SecretId']
80
+ smtpPassword = context.secrets.load(target['SMTP']['SecretId'], target['SMTP']['Username'].upcase + '_PASSWORD')
81
+ end
82
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_SMTP_PASSWORD=#{smtpPassword}", { **options, hide: true })
83
+
42
84
  auth = target['SMTP']['Auth'].to_s.downcase
43
85
  auth = 'plain' if auth.empty?
44
- self.class.exec("echo 'DISCOURSE_SMTP_AUTH=#{auth}' >> #{path}/Discourse.env", ssh)
86
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_SMTP_AUTH=#{auth}", options)
45
87
  if target['SMTP']['Port'] == 465
46
- self.class.exec("echo 'DISCOURSE_EXTRA_CONF_CONTENT=smtp_force_tls = true' >> #{path}/Discourse.env", ssh)
88
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_EXTRA_CONF_CONTENT=smtp_force_tls = true", options)
47
89
  end
90
+ else
91
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_SMTP_HOST=#{HOST_IP}", options)
92
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_SMTP_PORT_NUMBER=25", options)
93
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_SMTP_USER=\"\"", options)
94
+ linuxConnection.fileAppend("#{path}/Discourse.env", "DISCOURSE_SMTP_PASSWORD=\"\"", options)
95
+ end
96
+
97
+ linuxConnection.fileAppend("#{path}/Discourse.env", 'DISCOURSE_PRECOMPILE_ASSETS=no', options)
98
+ linuxConnection.fileAppend("#{path}/Discourse.env", 'CHEAP_SOURCE_MAPS=1', options)
99
+ linuxConnection.fileAppend("#{path}/Discourse.env", 'JOBS=1', options)
100
+
101
+ linuxConnection.setUserGroup("#{path}/Discourse.env", USER, USER, options)
102
+ linuxConnection.setPrivate("#{path}/Discourse.env", options)
103
+
104
+ linuxConnection.upload(__dir__ + '/Discourse.container', path, options)
105
+ linuxConnection.upload(__dir__ + '/Discourse-Sidekiq.container', path, options)
106
+
107
+ linuxConnection.reloadUserServices(USER, options)
108
+ linuxConnection.restartUserService(USER, 'Discourse', options)
109
+ linuxConnection.restartUserService(USER, 'Discourse-Sidekiq', options)
110
+
111
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
112
+ nginxConnection.provision(__dir__, 'Discourse', target, activeState, context, options)
48
113
  end
49
114
 
50
- self.class.exec(" echo 'DISCOURSE_PRECOMPILE_ASSETS=no' >> #{path}/Discourse.env", ssh)
51
- self.class.exec("echo 'CHEAP_SOURCE_MAPS=1' >> #{path}/Discourse.env", ssh)
52
- self.class.exec("echo 'JOBS=1' >> #{path}/Discourse.env", ssh)
53
-
54
- self.class.exec("chown #{USER}:#{USER} #{path}/Discourse.env", ssh)
55
- self.class.exec("chmod 600 #{path}/Discourse.env", ssh)
56
-
57
- ssh.scp.upload!(__dir__ + '/Discourse.container', path)
58
- ssh.scp.upload!(__dir__ + '/Discourse-Sidekiq.container', path)
59
- self.class.exec("systemctl --user --machine=#{USER}@ daemon-reload", ssh)
60
- self.class.exec("systemctl --user --machine=#{USER}@ restart Discourse", ssh)
61
- self.class.exec("systemctl --user --machine=#{USER}@ restart Discourse-Sidekiq", ssh)
62
-
63
- Framework::LinuxApp.ensurePackages([NGINX_PACKAGE], ssh)
64
- Framework::LinuxApp.ensureServiceAutoStartOverSSH(NGINX_PACKAGE, ssh)
65
- self.class.prepareNginxConfig(target, ssh)
66
- self.writeNginxConfig(__dir__, 'Discourse', id, target, state, context, options)
67
- self.deployNginxConfig(id, target, activeState, context, options)
68
- Framework::LinuxApp.startServiceOverSSH(NGINX_PACKAGE, ssh)
69
-
70
- containers = JSON.parse(self.class.exec("su --login #{USER} --shell /usr/bin/sh --command 'podman ps --format json --filter name=^Discourse$'", ssh).strip)
71
- raise 'Failed to find container!' if containers.empty?
72
- if !target['Plugins'].to_a.empty?
73
- target['Plugins'].each do |plugin|
74
- self.class.exec("su --login #{USER} --shell /usr/bin/sh --command \"podman exec --workdir /opt/bitnami/discourse #{containers.first['Id']} sh -c 'RAILS_ENV=production bundle exec rake plugin:install repo=#{plugin}'\"", ssh, true)
115
+ linuxConnection.withUserShell(USER) do |shellConnection|
116
+ Podman.withConnection(shellConnection, Podman.container(CONTAINER_NAME, shellConnection, { **options, 'dry' => false })) do |podmanConnection|
117
+ if !target['Plugins'].to_a.empty?
118
+ target['Plugins'].each do |plugin|
119
+ podmanConnection.exec("RAILS_ENV=production bundle exec rake plugin:install repo=#{plugin}", true, { **options, workdir: '/opt/bitnami/discourse' })
120
+ end
121
+ end
122
+
123
+ waitForMigrations(podmanConnection, options)
124
+ podmanConnection.exec('RAILS_ENV=production CHEAP_SOURCE_MAPS=1 JOBS=1 bundle exec rake assets:precompile', false, { **options, workdir: '/opt/bitnami/discourse' })
75
125
  end
76
126
  end
127
+ end
128
+ end
129
+ end
77
130
 
78
- self.class.exec("su --login #{USER} --shell /usr/bin/sh --command \"podman exec --workdir /opt/bitnami/discourse #{containers.first['Id']} sh -c 'RAILS_ENV=production CHEAP_SOURCE_MAPS=1 JOBS=1 bundle exec rake assets:precompile'\"", ssh)
131
+ def waitForMigrations(podmanConnection, options)
132
+ if !options['dry']
133
+ timeout = 3600 # 1h
134
+ loop do
135
+ result = podmanConnection.exec('RAILS_ENV=production bundle exec rake db:migrate:status', false, { **options, workdir: '/opt/bitnami/discourse' })
136
+ break unless result.include?(' down ')
137
+ timeout -= 30
138
+ raise "Timeout while waiting for Discourse migrations to complete!" if timeout <= 0
139
+ sleep(30)
79
140
  end
80
- else
81
- # TODO
82
141
  end
83
142
  end
84
143
 
85
- def configurePostgreSQL(settings, ssh)
144
+ def configurePostgreSQL(dbSettings, linuxConnection, options)
86
145
  password = SecureRandom.alphanumeric(20)
87
- PostgreSQL.createRemoteUserAndDBOverSSH(settings, USER, password, ssh)
88
- PostgreSQL.createExtensions(settings, USER, ['hstore', 'pg_trgm'], ssh)
146
+ PostgreSQL.withConnection(dbSettings, linuxConnection) do |postgresConnection|
147
+ postgresConnection.createUserAndDB(USER, password, options)
148
+ postgresConnection.createExtensions(USER, ['hstore', 'pg_trgm'], options)
149
+ end
89
150
  password
90
151
  end
91
152