ConfigLMM 0.3.0 → 0.4.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +36 -0
- data/Plugins/Apps/Authentik/Authentik-ProxyOutpost.container +14 -0
- data/Plugins/Apps/Authentik/Authentik-Server.container +1 -0
- data/Plugins/Apps/Authentik/Authentik-Worker.container +1 -0
- data/Plugins/Apps/Authentik/Authentik.conf.erb +7 -0
- data/Plugins/Apps/Authentik/Authentik.lmm.rb +24 -2
- data/Plugins/Apps/BookStack/BookStack.conf.erb +41 -0
- data/Plugins/Apps/BookStack/BookStack.container +15 -0
- data/Plugins/Apps/BookStack/BookStack.lmm.rb +80 -0
- data/Plugins/Apps/Discourse/Discourse-Sidekiq.container +17 -0
- data/Plugins/Apps/Discourse/Discourse.conf.erb +41 -0
- data/Plugins/Apps/Discourse/Discourse.container +17 -0
- data/Plugins/Apps/Discourse/Discourse.lmm.rb +95 -0
- data/Plugins/Apps/Dovecot/Dovecot.lmm.rb +25 -2
- data/Plugins/Apps/ERPNext/ERPNext-Frontend.container +19 -0
- data/Plugins/Apps/ERPNext/ERPNext-Queue.container +17 -0
- data/Plugins/Apps/ERPNext/ERPNext-Scheduler.container +17 -0
- data/Plugins/Apps/ERPNext/ERPNext-Websocket.container +19 -0
- data/Plugins/Apps/ERPNext/ERPNext.container +18 -0
- data/Plugins/Apps/ERPNext/ERPNext.lmm.rb +193 -0
- data/Plugins/Apps/ERPNext/ERPNext.network +12 -0
- data/Plugins/Apps/ERPNext/sites/apps.json +10 -0
- data/Plugins/Apps/ERPNext/sites/apps.txt +3 -0
- data/Plugins/Apps/ERPNext/sites/common_site_config.json +11 -0
- data/Plugins/Apps/GitLab/GitLab.container +3 -2
- data/Plugins/Apps/GitLab/GitLab.lmm.rb +37 -12
- data/Plugins/Apps/LetsEncrypt/LetsEncrypt.lmm.rb +57 -0
- data/Plugins/Apps/LetsEncrypt/hooks/dovecot.sh +2 -0
- data/Plugins/Apps/LetsEncrypt/hooks/nginx.sh +2 -0
- data/Plugins/Apps/LetsEncrypt/hooks/postfix.sh +2 -0
- data/Plugins/Apps/LetsEncrypt/renew-certificates.service +7 -0
- data/Plugins/Apps/LetsEncrypt/renew-certificates.timer +12 -0
- data/Plugins/Apps/LetsEncrypt/rfc2136.ini +11 -0
- data/Plugins/Apps/MariaDB/MariaDB.lmm.rb +115 -0
- data/Plugins/Apps/Matrix/Element.container +14 -0
- data/Plugins/Apps/Matrix/Matrix.conf.erb +49 -5
- data/Plugins/Apps/Matrix/Matrix.lmm.rb +86 -1
- data/Plugins/Apps/Matrix/Synapse.container +17 -0
- data/Plugins/Apps/Matrix/config.json +50 -0
- data/Plugins/Apps/Matrix/homeserver.yaml +70 -0
- data/Plugins/Apps/Matrix/log.config +30 -0
- data/Plugins/Apps/Nextcloud/Nextcloud.lmm.rb +70 -45
- data/Plugins/Apps/Nginx/conf.d/configlmm.conf +9 -0
- data/Plugins/Apps/Nginx/config-lmm/errors.conf +10 -4
- data/Plugins/Apps/Nginx/config-lmm/proxy.conf +5 -1
- data/Plugins/Apps/Nginx/nginx.lmm.rb +15 -11
- data/Plugins/Apps/Nginx/proxy.conf.erb +13 -3
- data/Plugins/Apps/Odoo/Odoo.container +2 -1
- data/Plugins/Apps/Odoo/Odoo.lmm.rb +1 -1
- data/Plugins/Apps/OpenVidu/Ingress.container +18 -0
- data/Plugins/Apps/OpenVidu/OpenVidu.conf.erb +34 -0
- data/Plugins/Apps/OpenVidu/OpenVidu.container +16 -0
- data/Plugins/Apps/OpenVidu/OpenVidu.lmm.rb +90 -0
- data/Plugins/Apps/OpenVidu/OpenViduCall.conf.erb +35 -0
- data/Plugins/Apps/OpenVidu/OpenViduCall.container +15 -0
- data/Plugins/Apps/OpenVidu/ingress.yaml +10 -0
- data/Plugins/Apps/OpenVidu/livekit.yaml +13 -0
- data/Plugins/Apps/Peppermint/Peppermint.conf.erb +0 -4
- data/Plugins/Apps/Peppermint/Peppermint.container +2 -1
- data/Plugins/Apps/Postfix/Postfix.lmm.rb +32 -6
- data/Plugins/Apps/PostgreSQL/PostgreSQL.lmm.rb +80 -11
- data/Plugins/Apps/Roundcube/Roundcube.conf.erb +75 -0
- data/Plugins/Apps/Roundcube/Roundcube.lmm.rb +145 -0
- data/Plugins/Apps/Tunnel/tunnel.lmm.rb +63 -0
- data/Plugins/Apps/Tunnel/tunnelTCP.service +9 -0
- data/Plugins/Apps/Tunnel/tunnelTCP.socket +9 -0
- data/Plugins/Apps/Tunnel/tunnelUDP.service +9 -0
- data/Plugins/Apps/Tunnel/tunnelUDP.socket +9 -0
- data/Plugins/Apps/Valkey/Valkey.lmm.rb +32 -0
- data/Plugins/Apps/Vaultwarden/Vaultwarden.lmm.rb +4 -0
- data/Plugins/Apps/Wiki.js/Wiki.js.conf.erb +42 -0
- data/Plugins/Apps/Wiki.js/Wiki.js.container +15 -0
- data/Plugins/Apps/Wiki.js/Wiki.js.lmm.rb +61 -0
- data/Plugins/Apps/gollum/gollum.conf.erb +39 -1
- data/Plugins/Apps/gollum/gollum.container +4 -1
- data/Plugins/Apps/gollum/gollum.lmm.rb +11 -3
- data/Plugins/OS/Linux/Debian/preseed.cfg.erb +62 -0
- data/Plugins/OS/Linux/Distributions.yaml +32 -0
- data/Plugins/OS/Linux/Flavours.yaml +11 -0
- data/Plugins/OS/Linux/Linux.lmm.rb +255 -67
- data/Plugins/OS/Linux/Packages.yaml +47 -2
- data/Plugins/OS/Linux/Proxmox/answer.toml.erb +30 -0
- data/Plugins/OS/Linux/WireGuard/WireGuard.lmm.rb +33 -4
- data/Plugins/Platforms/GoDaddy/GoDaddy.lmm.rb +1 -1
- data/Plugins/Platforms/libvirt/libvirt.lmm.rb +3 -2
- data/Plugins/Services/DNS/PowerDNS.lmm.rb +95 -8
- data/bootstrap.sh +41 -3
- data/lib/ConfigLMM/Framework/plugins/linuxApp.rb +146 -64
- data/lib/ConfigLMM/Framework/plugins/nginxApp.rb +34 -3
- data/lib/ConfigLMM/Framework/plugins/plugin.rb +62 -6
- data/lib/ConfigLMM/cli.rb +3 -1
- data/lib/ConfigLMM/commands/cleanup.rb +1 -0
- data/lib/ConfigLMM/commands/configsCommand.rb +3 -1
- data/lib/ConfigLMM/io/configList.rb +3 -1
- data/lib/ConfigLMM/state.rb +10 -2
- data/lib/ConfigLMM/version.rb +1 -1
- metadata +54 -3
- data/Plugins/Apps/GitLab/GitLab.conf.erb +0 -26
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e75cd300255c00348e10301216861bbc10e1fd1473e35a19c0b879f6c90f433c
|
4
|
+
data.tar.gz: b75628e73fa064c403e4dc51cb69997c1e5d8215536df9f961ce8861bf405757
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: f357dba4ec543ed5b7d1ac66e678df83bb5bcf0c22793b80f70a30e6c22648837ca259d429ccff099fb77fb640c87ecafcf679b052d34ff45f1764ca650eedd5
|
7
|
+
data.tar.gz: 954e1f8b9720c7ffaa4f6173fe28ead5e1dd706d488b950172651273016422df300a2fd81a70652aaeb506f84bfa755902c6c198849821d72decf551779337e2
|
data/CHANGELOG.md
CHANGED
@@ -1,3 +1,39 @@
|
|
1
|
+
## [0.4.0] - 2024-10-04
|
2
|
+
|
3
|
+
Implement:
|
4
|
+
- Authentik: Outpost deployment
|
5
|
+
- gollum: Authentik authentication
|
6
|
+
- MariaDB - https://mariadb.org/
|
7
|
+
- BookStack - https://www.bookstackapp.com/
|
8
|
+
- Discourse - https://www.discourse.org/
|
9
|
+
- OpenVidu - https://openvidu.io/
|
10
|
+
- Matrix server - https://matrix.org/
|
11
|
+
- Wiki.js - https://js.wiki/
|
12
|
+
- ERPNext - https://erpnext.com/
|
13
|
+
- Let's Encrypt - https://letsencrypt.org/
|
14
|
+
- Roundcube - https://roundcube.net/
|
15
|
+
- Tunnel support
|
16
|
+
- Support Proxmox VE distro - https://www.proxmox.com/en/proxmox-virtual-environment/overview
|
17
|
+
- Support Debian distro - https://www.debian.org/
|
18
|
+
|
19
|
+
Other improvements:
|
20
|
+
- bootstrap.sh script
|
21
|
+
- Peppermint
|
22
|
+
- Vaultwarden
|
23
|
+
- Nginx
|
24
|
+
- Valkey
|
25
|
+
- PostgreSQL
|
26
|
+
- Dovecot
|
27
|
+
- GitLab
|
28
|
+
- Linux
|
29
|
+
- PowerDNS
|
30
|
+
- GoDaddy
|
31
|
+
- NginxProxy
|
32
|
+
- Nextcloud
|
33
|
+
- Cassandra
|
34
|
+
- Postfix: Implement cleanup/uninstall functionality
|
35
|
+
- WireGuard: Implement cleanup/uninstall functionality
|
36
|
+
- Various other improvements
|
1
37
|
|
2
38
|
## [0.3.0] - 2024-08-13
|
3
39
|
|
@@ -0,0 +1,14 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=Authentik Proxy Outpost container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
Image=ghcr.io/goauthentik/proxy:latest
|
8
|
+
EnvironmentFile=/var/lib/authentik/.config/containers/systemd/ProxyOutpost.env
|
9
|
+
PublishPort=127.0.0.1:19010:9000
|
10
|
+
UserNS=keep-id:uid=1000,gid=1000
|
11
|
+
AutoUpdate=registry
|
12
|
+
|
13
|
+
[Install]
|
14
|
+
WantedBy=multi-user.target default.target
|
@@ -32,4 +32,11 @@ server {
|
|
32
32
|
proxy_pass http://authentik;
|
33
33
|
include config-lmm/proxy.conf;
|
34
34
|
}
|
35
|
+
|
36
|
+
<% if config['Outposts'].to_a.include?('Proxy') %>
|
37
|
+
location /outpost.goauthentik.io {
|
38
|
+
proxy_pass http://localhost:19010/outpost.goauthentik.io;
|
39
|
+
include config-lmm/proxy.conf;
|
40
|
+
}
|
41
|
+
<% end %>
|
35
42
|
}
|
@@ -37,13 +37,15 @@ module ConfigLMM
|
|
37
37
|
ssh.scp.upload!(__dir__ + '/Authentik-Server.container', path)
|
38
38
|
ssh.scp.upload!(__dir__ + '/Authentik-Worker.container', path)
|
39
39
|
self.class.sshExec!(ssh, "systemctl --user --machine=#{USER}@ daemon-reload")
|
40
|
-
self.class.sshExec!(ssh, "systemctl --user --machine=#{USER}@
|
41
|
-
self.class.sshExec!(ssh, "systemctl --user --machine=#{USER}@
|
40
|
+
self.class.sshExec!(ssh, "systemctl --user --machine=#{USER}@ restart Authentik-Server")
|
41
|
+
self.class.sshExec!(ssh, "systemctl --user --machine=#{USER}@ restart Authentik-Worker")
|
42
42
|
|
43
43
|
Framework::LinuxApp.ensureServiceAutoStartOverSSH(NGINX_PACKAGE, ssh)
|
44
44
|
self.writeNginxConfig(__dir__, 'Authentik', id, target, state, context, options)
|
45
45
|
self.deployNginxConfig(id, target, activeState, context, options)
|
46
46
|
Framework::LinuxApp.startServiceOverSSH(NGINX_PACKAGE, ssh)
|
47
|
+
|
48
|
+
self.deployProxyOutpost(target, ssh)
|
47
49
|
end
|
48
50
|
else
|
49
51
|
raise Framework::PluginProcessError.new("#{id}: Unknown protocol: #{uri.scheme}!")
|
@@ -53,6 +55,26 @@ module ConfigLMM
|
|
53
55
|
end
|
54
56
|
end
|
55
57
|
|
58
|
+
def deployProxyOutpost(target, ssh = nil)
|
59
|
+
return unless target['Outposts'].to_a.include?('Proxy')
|
60
|
+
|
61
|
+
path = Framework::LinuxApp::SYSTEMD_CONTAINERS_PATH.gsub('~', HOME_DIR)
|
62
|
+
self.class.exec("echo 'AUTHENTIK_HOST=https://#{target['Domain'].downcase}' > #{path}/ProxyOutpost.env", ssh)
|
63
|
+
self.class.exec("echo 'AUTHENTIK_INSECURE=false' >> #{path}/ProxyOutpost.env", ssh)
|
64
|
+
self.class.exec(" echo 'AUTHENTIK_TOKEN=#{ENV['AUTHENTIK_TOKEN']}' >> #{path}/ProxyOutpost.env", ssh)
|
65
|
+
self.class.exec("chown #{USER}:#{USER} #{path}/ProxyOutpost.env", ssh)
|
66
|
+
self.class.exec("chmod 600 #{path}/ProxyOutpost.env", ssh)
|
67
|
+
|
68
|
+
if ssh.nil?
|
69
|
+
self.class.exec("cp #{__dir__ + '/Authentik-ProxyOutpost.container'} #{path}/")
|
70
|
+
else
|
71
|
+
ssh.scp.upload!(__dir__ + '/Authentik-ProxyOutpost.container', path)
|
72
|
+
end
|
73
|
+
|
74
|
+
self.class.exec("systemctl --user --machine=#{USER}@ daemon-reload", ssh)
|
75
|
+
self.class.exec("systemctl --user --machine=#{USER}@ restart Authentik-ProxyOutpost", ssh)
|
76
|
+
end
|
77
|
+
|
56
78
|
def prepareConfig(target, ssh)
|
57
79
|
target['Database'] ||= {}
|
58
80
|
|
@@ -0,0 +1,41 @@
|
|
1
|
+
|
2
|
+
server {
|
3
|
+
|
4
|
+
<% if !config['TLS'] %>
|
5
|
+
listen <%= config['Port'] %>;
|
6
|
+
listen [::]:<%= config['Port'] %>;
|
7
|
+
<% else %>
|
8
|
+
<% if config['NginxVersion'] >= 1.25 %>
|
9
|
+
listen <%= config['Port'] %> ssl;
|
10
|
+
listen [::]:<%= config['Port'] %> ssl;
|
11
|
+
http2 on;
|
12
|
+
http3 on;
|
13
|
+
quic_retry on;
|
14
|
+
add_header Alt-Svc 'h3=":<%= config['Port'] %>"; ma=86400';
|
15
|
+
<% else %>
|
16
|
+
listen <%= config['Port'] %> ssl http2;
|
17
|
+
listen [::]:<%= config['Port'] %> ssl http2;
|
18
|
+
<% end %>
|
19
|
+
|
20
|
+
include config-lmm/ssl.conf;
|
21
|
+
<% end %>
|
22
|
+
|
23
|
+
server_name <%= config['Domain'] %>;
|
24
|
+
|
25
|
+
access_log /var/log/nginx/bookstack.access.log;
|
26
|
+
error_log /var/log/nginx/bookstack.error.log;
|
27
|
+
|
28
|
+
include config-lmm/errors.conf;
|
29
|
+
include config-lmm/security.conf;
|
30
|
+
|
31
|
+
location / {
|
32
|
+
<% if config['Server'] %>
|
33
|
+
proxy_pass <%= config['Server'] %>;
|
34
|
+
<% else %>
|
35
|
+
proxy_pass http://127.0.0.1:18200;
|
36
|
+
<% end %>
|
37
|
+
|
38
|
+
include config-lmm/proxy.conf;
|
39
|
+
}
|
40
|
+
|
41
|
+
}
|
@@ -0,0 +1,15 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=BookStack container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
Image=ghcr.io/linuxserver/bookstack:latest
|
8
|
+
EnvironmentFile=/var/lib/bookstack/.config/containers/systemd/BookStack.env
|
9
|
+
Network=slirp4netns:allow_host_loopback=true
|
10
|
+
PublishPort=127.0.0.1:18200:80
|
11
|
+
Volume=/var/lib/bookstack/config:/config
|
12
|
+
AutoUpdate=registry
|
13
|
+
|
14
|
+
[Install]
|
15
|
+
WantedBy=multi-user.target default.target
|
@@ -0,0 +1,80 @@
|
|
1
|
+
|
2
|
+
module ConfigLMM
|
3
|
+
module LMM
|
4
|
+
class BookStack < Framework::NginxApp
|
5
|
+
|
6
|
+
USER = 'bookstack'
|
7
|
+
HOME_DIR = '/var/lib/bookstack'
|
8
|
+
HOST_IP = '10.0.2.2'
|
9
|
+
|
10
|
+
def actionBookStackDeploy(id, target, activeState, context, options)
|
11
|
+
raise Framework::PluginProcessError.new('Domain field must be set!') unless target['Domain']
|
12
|
+
|
13
|
+
target['Database'] ||= {}
|
14
|
+
if target['Location'] && target['Location'] != '@me'
|
15
|
+
uri = Addressable::URI.parse(target['Location'])
|
16
|
+
raise Framework::PluginProcessError.new("#{id}: Unknown Protocol: #{uri.scheme}!") if uri.scheme != 'ssh'
|
17
|
+
|
18
|
+
self.class.sshStart(uri) do |ssh|
|
19
|
+
|
20
|
+
dbPassword = self.configureMariaDB(target['Database'], activeState, ssh)
|
21
|
+
distroInfo = Framework::LinuxApp.currentDistroInfo(ssh)
|
22
|
+
Framework::LinuxApp.configurePodmanServiceOverSSH(USER, HOME_DIR, 'BookStack', distroInfo, ssh)
|
23
|
+
self.class.sshExec!(ssh, "su --login #{USER} --shell /bin/sh --command 'mkdir -p ~/config'")
|
24
|
+
|
25
|
+
path = Framework::LinuxApp::SYSTEMD_CONTAINERS_PATH.gsub('~', HOME_DIR)
|
26
|
+
self.class.exec(" echo 'DB_HOST=#{HOST_IP}' > #{path}/BookStack.env", ssh)
|
27
|
+
self.class.exec(" echo 'DB_DATABASE=#{USER}' >> #{path}/BookStack.env", ssh)
|
28
|
+
self.class.exec(" echo 'DB_USERNAME=#{USER}' >> #{path}/BookStack.env", ssh)
|
29
|
+
self.class.exec(" echo 'DB_PASSWORD=#{dbPassword}' >> #{path}/BookStack.env", ssh)
|
30
|
+
self.class.exec(" echo 'APP_URL=https://#{target['Domain']}' >> #{path}/BookStack.env", ssh)
|
31
|
+
|
32
|
+
if target['OIDC'] && target['OIDC']['Issuer']
|
33
|
+
self.class.exec(" echo 'AUTH_METHOD=oidc' >> #{path}/BookStack.env", ssh)
|
34
|
+
self.class.exec(" echo 'AUTH_AUTO_INITIATE=true' >> #{path}/BookStack.env", ssh)
|
35
|
+
self.class.exec(" echo 'OIDC_CLIENT_ID=#{ENV['BOOKSTACK_OIDC_CLIENT_ID']}' >> #{path}/BookStack.env", ssh)
|
36
|
+
self.class.exec(" echo 'OIDC_CLIENT_SECRET=#{ENV['BOOKSTACK_OIDC_CLIENT_SECRET']}' >> #{path}/BookStack.env", ssh)
|
37
|
+
self.class.exec(" echo 'OIDC_ISSUER=#{target['OIDC']['Issuer']}' >> #{path}/BookStack.env", ssh)
|
38
|
+
self.class.exec(" echo 'OIDC_ISSUER_DISCOVER=true' >> #{path}/BookStack.env", ssh)
|
39
|
+
self.class.exec(" echo 'OIDC_USER_TO_GROUPS=true' >> #{path}/BookStack.env", ssh)
|
40
|
+
end
|
41
|
+
|
42
|
+
if target['SMTP']
|
43
|
+
host = target['SMTP']['Host']
|
44
|
+
host = HOST_IP if ['localhost', '127.0.0.1'].include?(host)
|
45
|
+
self.class.exec(" echo 'MAIL_HOST=#{host}' >> #{path}/BookStack.env", ssh)
|
46
|
+
self.class.exec(" echo 'MAIL_PORT=#{target['SMTP']['Port']}' >> #{path}/BookStack.env", ssh)
|
47
|
+
self.class.exec(" echo 'MAIL_USERNAME=#{target['SMTP']['Username']}' >> #{path}/BookStack.env", ssh)
|
48
|
+
self.class.exec(" echo 'MAIL_PASSWORD=#{ENV['BOOKSTACK_SMTP_PASSWORD']}' >> #{path}/BookStack.env", ssh)
|
49
|
+
self.class.exec(" echo 'MAIL_FROM=#{target['SMTP']['From']}' >> #{path}/BookStack.env", ssh)
|
50
|
+
end
|
51
|
+
|
52
|
+
self.class.exec("chown #{USER}:#{USER} #{path}/BookStack.env", ssh)
|
53
|
+
self.class.exec("chmod 600 #{path}/BookStack.env", ssh)
|
54
|
+
|
55
|
+
ssh.scp.upload!(__dir__ + '/BookStack.container', path)
|
56
|
+
self.class.exec("systemctl --user --machine=#{USER}@ daemon-reload", ssh)
|
57
|
+
self.class.exec("systemctl --user --machine=#{USER}@ restart BookStack", ssh)
|
58
|
+
|
59
|
+
Framework::LinuxApp.ensurePackages([NGINX_PACKAGE], ssh)
|
60
|
+
Framework::LinuxApp.ensureServiceAutoStartOverSSH(NGINX_PACKAGE, ssh)
|
61
|
+
self.class.prepareNginxConfig(target, ssh)
|
62
|
+
self.writeNginxConfig(__dir__, 'BookStack', id, target, state, context, options)
|
63
|
+
self.deployNginxConfig(id, target, activeState, context, options)
|
64
|
+
Framework::LinuxApp.startServiceOverSSH(NGINX_PACKAGE, ssh)
|
65
|
+
end
|
66
|
+
else
|
67
|
+
# TODO
|
68
|
+
end
|
69
|
+
end
|
70
|
+
|
71
|
+
def configureMariaDB(settings, activeState, ssh)
|
72
|
+
password = SecureRandom.alphanumeric(20)
|
73
|
+
MariaDB.createRemoteUserAndDB(settings, USER, password, ssh)
|
74
|
+
password
|
75
|
+
end
|
76
|
+
|
77
|
+
end
|
78
|
+
end
|
79
|
+
end
|
80
|
+
|
@@ -0,0 +1,17 @@
|
|
1
|
+
|
2
|
+
|
3
|
+
[Unit]
|
4
|
+
Description=Discourse Sidekiq container
|
5
|
+
After=local-fs.target
|
6
|
+
|
7
|
+
[Container]
|
8
|
+
Image=docker.io/bitnami/discourse:latest
|
9
|
+
Exec=/opt/bitnami/scripts/discourse-sidekiq/run.sh
|
10
|
+
EnvironmentFile=/var/lib/discourse/.config/containers/systemd/Discourse.env
|
11
|
+
Network=slirp4netns:allow_host_loopback=true
|
12
|
+
UserNS=keep-id:uid=999,gid=999
|
13
|
+
Volume=/var/lib/discourse/sidekiq:/bitnami/discourse
|
14
|
+
AutoUpdate=registry
|
15
|
+
|
16
|
+
[Install]
|
17
|
+
WantedBy=multi-user.target default.target
|
@@ -0,0 +1,41 @@
|
|
1
|
+
|
2
|
+
server {
|
3
|
+
|
4
|
+
<% if !config['TLS'] %>
|
5
|
+
listen <%= config['Port'] %>;
|
6
|
+
listen [::]:<%= config['Port'] %>;
|
7
|
+
<% else %>
|
8
|
+
<% if config['NginxVersion'] >= 1.25 %>
|
9
|
+
listen <%= config['Port'] %> ssl;
|
10
|
+
listen [::]:<%= config['Port'] %> ssl;
|
11
|
+
http2 on;
|
12
|
+
http3 on;
|
13
|
+
quic_retry on;
|
14
|
+
add_header Alt-Svc 'h3=":<%= config['Port'] %>"; ma=86400';
|
15
|
+
<% else %>
|
16
|
+
listen <%= config['Port'] %> ssl http2;
|
17
|
+
listen [::]:<%= config['Port'] %> ssl http2;
|
18
|
+
<% end %>
|
19
|
+
|
20
|
+
include config-lmm/ssl.conf;
|
21
|
+
<% end %>
|
22
|
+
|
23
|
+
server_name <%= config['Domain'] %>;
|
24
|
+
|
25
|
+
access_log /var/log/nginx/discourse.access.log;
|
26
|
+
error_log /var/log/nginx/discourse.error.log;
|
27
|
+
|
28
|
+
include config-lmm/errors.conf;
|
29
|
+
include config-lmm/security.conf;
|
30
|
+
|
31
|
+
location / {
|
32
|
+
<% if config['Server'] %>
|
33
|
+
proxy_pass <%= config['Server'] %>;
|
34
|
+
<% else %>
|
35
|
+
proxy_pass http://127.0.0.1:13100;
|
36
|
+
<% end %>
|
37
|
+
|
38
|
+
include config-lmm/proxy.conf;
|
39
|
+
}
|
40
|
+
|
41
|
+
}
|
@@ -0,0 +1,17 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=Discourse container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
ContainerName=Discourse
|
8
|
+
Image=docker.io/bitnami/discourse:latest
|
9
|
+
EnvironmentFile=/var/lib/discourse/.config/containers/systemd/Discourse.env
|
10
|
+
Network=slirp4netns:allow_host_loopback=true
|
11
|
+
PublishPort=127.0.0.1:13100:3000
|
12
|
+
UserNS=keep-id:uid=999,gid=999
|
13
|
+
Volume=/var/lib/discourse/data:/bitnami/discourse
|
14
|
+
AutoUpdate=registry
|
15
|
+
|
16
|
+
[Install]
|
17
|
+
WantedBy=multi-user.target default.target
|
@@ -0,0 +1,95 @@
|
|
1
|
+
|
2
|
+
module ConfigLMM
|
3
|
+
module LMM
|
4
|
+
class Discourse < Framework::NginxApp
|
5
|
+
|
6
|
+
USER = 'discourse'
|
7
|
+
HOME_DIR = '/var/lib/discourse'
|
8
|
+
HOST_IP = '10.0.2.2'
|
9
|
+
|
10
|
+
def actionDiscourseDeploy(id, target, activeState, context, options)
|
11
|
+
raise Framework::PluginProcessError.new('Domain field must be set!') unless target['Domain']
|
12
|
+
|
13
|
+
target['Database'] ||= {}
|
14
|
+
if target['Location'] && target['Location'] != '@me'
|
15
|
+
uri = Addressable::URI.parse(target['Location'])
|
16
|
+
raise Framework::PluginProcessError.new("#{id}: Unknown Protocol: #{uri.scheme}!") if uri.scheme != 'ssh'
|
17
|
+
|
18
|
+
self.class.sshStart(uri) do |ssh|
|
19
|
+
|
20
|
+
dbPassword = self.configurePostgreSQL(target['Database'], ssh)
|
21
|
+
distroInfo = Framework::LinuxApp.currentDistroInfo(ssh)
|
22
|
+
Framework::LinuxApp.configurePodmanServiceOverSSH(USER, HOME_DIR, 'Discourse', distroInfo, ssh)
|
23
|
+
self.class.sshExec!(ssh, "su --login #{USER} --shell /bin/sh --command 'mkdir -p ~/data ~/sidekiq'")
|
24
|
+
|
25
|
+
path = Framework::LinuxApp::SYSTEMD_CONTAINERS_PATH.gsub('~', HOME_DIR)
|
26
|
+
self.class.exec("echo 'DISCOURSE_DATABASE_HOST=#{HOST_IP}' > #{path}/Discourse.env", ssh)
|
27
|
+
self.class.exec("echo 'DISCOURSE_DATABASE_NAME=#{USER}' >> #{path}/Discourse.env", ssh)
|
28
|
+
self.class.exec(" echo 'DISCOURSE_DATABASE_USER=#{USER}' >> #{path}/Discourse.env", ssh)
|
29
|
+
self.class.exec(" echo 'DISCOURSE_DATABASE_PASSWORD=#{dbPassword}' >> #{path}/Discourse.env", ssh)
|
30
|
+
self.class.exec("echo 'DISCOURSE_HOST=#{target['Domain']}' >> #{path}/Discourse.env", ssh)
|
31
|
+
|
32
|
+
self.class.exec("echo 'DISCOURSE_REDIS_HOST=#{HOST_IP}' >> #{path}/Discourse.env", ssh)
|
33
|
+
self.class.exec(" echo 'DISCOURSE_REDIS_PASSWORD=#{ENV['REDIS_PASSWORD']}' >> #{path}/Discourse.env", ssh)
|
34
|
+
|
35
|
+
if target['SMTP']
|
36
|
+
host = target['SMTP']['Host']
|
37
|
+
host = HOST_IP if ['localhost', '127.0.0.1'].include?(host)
|
38
|
+
self.class.exec("echo 'DISCOURSE_SMTP_HOST=#{host}' >> #{path}/Discourse.env", ssh)
|
39
|
+
self.class.exec("echo 'DISCOURSE_SMTP_PORT_NUMBER=#{target['SMTP']['Port']}' >> #{path}/Discourse.env", ssh)
|
40
|
+
self.class.exec(" echo 'DISCOURSE_SMTP_USER=#{target['SMTP']['Username']}' >> #{path}/Discourse.env", ssh)
|
41
|
+
self.class.exec(" echo 'DISCOURSE_SMTP_PASSWORD=#{ENV['DISCOURSE_SMTP_PASSWORD']}' >> #{path}/Discourse.env", ssh)
|
42
|
+
auth = target['SMTP']['Auth'].to_s.downcase
|
43
|
+
auth = 'plain' if auth.empty?
|
44
|
+
self.class.exec("echo 'DISCOURSE_SMTP_AUTH=#{auth}' >> #{path}/Discourse.env", ssh)
|
45
|
+
if target['SMTP']['Port'] == 465
|
46
|
+
self.class.exec("echo 'DISCOURSE_EXTRA_CONF_CONTENT=smtp_force_tls = true' >> #{path}/Discourse.env", ssh)
|
47
|
+
end
|
48
|
+
end
|
49
|
+
|
50
|
+
self.class.exec(" echo 'DISCOURSE_PRECOMPILE_ASSETS=no' >> #{path}/Discourse.env", ssh)
|
51
|
+
self.class.exec("echo 'CHEAP_SOURCE_MAPS=1' >> #{path}/Discourse.env", ssh)
|
52
|
+
self.class.exec("echo 'JOBS=1' >> #{path}/Discourse.env", ssh)
|
53
|
+
|
54
|
+
self.class.exec("chown #{USER}:#{USER} #{path}/Discourse.env", ssh)
|
55
|
+
self.class.exec("chmod 600 #{path}/Discourse.env", ssh)
|
56
|
+
|
57
|
+
ssh.scp.upload!(__dir__ + '/Discourse.container', path)
|
58
|
+
ssh.scp.upload!(__dir__ + '/Discourse-Sidekiq.container', path)
|
59
|
+
self.class.exec("systemctl --user --machine=#{USER}@ daemon-reload", ssh)
|
60
|
+
self.class.exec("systemctl --user --machine=#{USER}@ restart Discourse", ssh)
|
61
|
+
self.class.exec("systemctl --user --machine=#{USER}@ restart Discourse-Sidekiq", ssh)
|
62
|
+
|
63
|
+
Framework::LinuxApp.ensurePackages([NGINX_PACKAGE], ssh)
|
64
|
+
Framework::LinuxApp.ensureServiceAutoStartOverSSH(NGINX_PACKAGE, ssh)
|
65
|
+
self.class.prepareNginxConfig(target, ssh)
|
66
|
+
self.writeNginxConfig(__dir__, 'Discourse', id, target, state, context, options)
|
67
|
+
self.deployNginxConfig(id, target, activeState, context, options)
|
68
|
+
Framework::LinuxApp.startServiceOverSSH(NGINX_PACKAGE, ssh)
|
69
|
+
|
70
|
+
containers = JSON.parse(self.class.exec("su --login #{USER} --shell /usr/bin/sh --command 'podman ps --format json --filter name=^Discourse$'", ssh).strip)
|
71
|
+
raise 'Failed to find container!' if containers.empty?
|
72
|
+
if !target['Plugins'].to_a.empty?
|
73
|
+
target['Plugins'].each do |plugin|
|
74
|
+
self.class.exec("su --login #{USER} --shell /usr/bin/sh --command \"podman exec --workdir /opt/bitnami/discourse #{containers.first['Id']} sh -c 'RAILS_ENV=production bundle exec rake plugin:install repo=#{plugin}'\"", ssh, true)
|
75
|
+
end
|
76
|
+
end
|
77
|
+
|
78
|
+
self.class.exec("su --login #{USER} --shell /usr/bin/sh --command \"podman exec --workdir /opt/bitnami/discourse #{containers.first['Id']} sh -c 'RAILS_ENV=production CHEAP_SOURCE_MAPS=1 JOBS=1 bundle exec rake assets:precompile'\"", ssh)
|
79
|
+
end
|
80
|
+
else
|
81
|
+
# TODO
|
82
|
+
end
|
83
|
+
end
|
84
|
+
|
85
|
+
def configurePostgreSQL(settings, ssh)
|
86
|
+
password = SecureRandom.alphanumeric(20)
|
87
|
+
PostgreSQL.createRemoteUserAndDBOverSSH(settings, USER, password, ssh)
|
88
|
+
PostgreSQL.createExtensions(settings, USER, ['hstore', 'pg_trgm'], ssh)
|
89
|
+
password
|
90
|
+
end
|
91
|
+
|
92
|
+
end
|
93
|
+
end
|
94
|
+
end
|
95
|
+
|
@@ -29,6 +29,12 @@ module ConfigLMM
|
|
29
29
|
cmd = "sed -i 's|^#mail_location =.*|mail_location = maildir:~/Mail|' #{DOVECOT_DIR}conf.d/10-mail.conf"
|
30
30
|
self.class.sshExec!(ssh, cmd)
|
31
31
|
|
32
|
+
if !target['Protocols'].to_a.empty?
|
33
|
+
updateRemoteFile(ssh, DOVECOT_DIR + 'dovecot.conf', options) do |configLines|
|
34
|
+
configLines << "protocols = #{target['Protocols'].join(' ')}\n"
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
32
38
|
updateRemoteFile(ssh, DOVECOT_DIR + 'conf.d/10-mail.conf', options) do |configLines|
|
33
39
|
configLines << "mail_home = #{EMAIL_HOME}/emails/%u\n"
|
34
40
|
configLines << "first_valid_uid = #{uid}\n"
|
@@ -68,8 +74,7 @@ module ConfigLMM
|
|
68
74
|
configLines << "}\n"
|
69
75
|
end
|
70
76
|
|
71
|
-
|
72
|
-
self.class.sshExec!(ssh, "firewall-cmd -q --permanent --add-service='imaps'")
|
77
|
+
Framework::LinuxApp.firewallAddService('imaps', ssh)
|
73
78
|
|
74
79
|
cmd = "sed -i 's|^!include auth-system.conf.ext|#!include auth-system.conf.ext|' #{DOVECOT_DIR}conf.d/10-auth.conf"
|
75
80
|
self.class.sshExec!(ssh, cmd)
|
@@ -137,6 +142,24 @@ module ConfigLMM
|
|
137
142
|
end
|
138
143
|
|
139
144
|
plugins[:Linux].startService(SERVICE_NAME, target['Location'])
|
145
|
+
|
146
|
+
activeState['Status'] = State::STATUS_DEPLOYED
|
147
|
+
end
|
148
|
+
|
149
|
+
def cleanup(configs, state, context, options)
|
150
|
+
cleanupType(:Dovecot, configs, state, context, options) do |item, id, state, context, options, ssh|
|
151
|
+
Framework::LinuxApp.stopService(SERVICE_NAME, ssh, options[:dry])
|
152
|
+
Framework::LinuxApp.firewallRemoveService('imaps', ssh, options[:dry])
|
153
|
+
Framework::LinuxApp.removePackage(PACKAGE_NAME, ssh, options[:dry])
|
154
|
+
|
155
|
+
state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
|
156
|
+
|
157
|
+
if options[:destroy]
|
158
|
+
Framework::LinuxApp.deleteUserAndGroup(EMAIL_USER, ssh, options[:dry])
|
159
|
+
|
160
|
+
state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
|
161
|
+
end
|
162
|
+
end
|
140
163
|
end
|
141
164
|
|
142
165
|
def self.cutConfigSection(file, sectionStart, options, ssh)
|
@@ -0,0 +1,19 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=ERPNext Frontend container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
ContainerName=ERPNext-Frontend
|
8
|
+
Image=ConfigLM.moe/erpnext:v$VERSION
|
9
|
+
Exec=nginx-entrypoint.sh
|
10
|
+
EnvironmentFile=/var/lib/erpnext/.config/containers/systemd/ERPNext.env
|
11
|
+
PublishPort=127.0.0.1:18400:8080
|
12
|
+
Network=ERPNext
|
13
|
+
HostName=ERPNext-Frontend
|
14
|
+
UserNS=keep-id:uid=1000,gid=1000
|
15
|
+
Volume=/var/lib/erpnext/sites:/home/frappe/frappe-bench/sites
|
16
|
+
Volume=/var/lib/erpnext/logs:/home/frappe/frappe-bench/logs
|
17
|
+
|
18
|
+
[Install]
|
19
|
+
WantedBy=multi-user.target default.target
|
@@ -0,0 +1,17 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=ERPNext Queue container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
ContainerName=ERPNext-Queue
|
8
|
+
Image=ConfigLM.moe/erpnext:v$VERSION
|
9
|
+
Exec=bench worker --queue long,default,short
|
10
|
+
EnvironmentFile=/var/lib/erpnext/.config/containers/systemd/ERPNext.env
|
11
|
+
Network=slirp4netns:allow_host_loopback=true
|
12
|
+
UserNS=keep-id:uid=1000,gid=1000
|
13
|
+
Volume=/var/lib/erpnext/sites:/home/frappe/frappe-bench/sites
|
14
|
+
Volume=/var/lib/erpnext/logs:/home/frappe/frappe-bench/logs
|
15
|
+
|
16
|
+
[Install]
|
17
|
+
WantedBy=multi-user.target default.target
|
@@ -0,0 +1,17 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=ERPNext Scheduler container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
ContainerName=ERPNext-Scheduler
|
8
|
+
Image=ConfigLM.moe/erpnext:v$VERSION
|
9
|
+
Exec=bench schedule
|
10
|
+
EnvironmentFile=/var/lib/erpnext/.config/containers/systemd/ERPNext.env
|
11
|
+
UserNS=keep-id:uid=1000,gid=1000
|
12
|
+
Volume=/var/lib/erpnext/sites:/home/frappe/frappe-bench/sites
|
13
|
+
Volume=/var/lib/erpnext/logs:/home/frappe/frappe-bench/logs
|
14
|
+
|
15
|
+
[Install]
|
16
|
+
WantedBy=multi-user.target default.target
|
17
|
+
|
@@ -0,0 +1,19 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=ERPNext Websocket container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
ContainerName=ERPNext-Websocket
|
8
|
+
Image=ConfigLM.moe/erpnext:v$VERSION
|
9
|
+
Exec=node /home/frappe/frappe-bench/apps/frappe/socketio.js
|
10
|
+
EnvironmentFile=/var/lib/erpnext/.config/containers/systemd/ERPNext.env
|
11
|
+
Network=ERPNext
|
12
|
+
IP=10.90.50.11
|
13
|
+
HostName=ERPNext-Websocket
|
14
|
+
UserNS=keep-id:uid=1000,gid=1000
|
15
|
+
Volume=/var/lib/erpnext/sites:/home/frappe/frappe-bench/sites
|
16
|
+
Volume=/var/lib/erpnext/logs:/home/frappe/frappe-bench/logs
|
17
|
+
|
18
|
+
[Install]
|
19
|
+
WantedBy=multi-user.target default.target
|
@@ -0,0 +1,18 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=ERPNext container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
ContainerName=ERPNext
|
8
|
+
Image=ConfigLM.moe/erpnext:v$VERSION
|
9
|
+
EnvironmentFile=/var/lib/erpnext/.config/containers/systemd/ERPNext.env
|
10
|
+
Network=ERPNext
|
11
|
+
IP=10.90.50.10
|
12
|
+
HostName=ERPNext
|
13
|
+
UserNS=keep-id:uid=1000,gid=1000
|
14
|
+
Volume=/var/lib/erpnext/sites:/home/frappe/frappe-bench/sites
|
15
|
+
Volume=/var/lib/erpnext/logs:/home/frappe/frappe-bench/logs
|
16
|
+
|
17
|
+
[Install]
|
18
|
+
WantedBy=multi-user.target default.target
|