Add common module managing common services and scripts (act_runner, create/restore backups)
Fix script environment variables Add Fefan configuration Fix gateway services file provisionning through ssh
This commit is contained in:
@@ -100,6 +100,7 @@ module "vm" {
|
|||||||
|
|
||||||
ssh_public_key = var.ssh_public_key
|
ssh_public_key = var.ssh_public_key
|
||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
|
|
||||||
cloudinit_config = templatefile(
|
cloudinit_config = templatefile(
|
||||||
"${path.module}/cloud-init/service.yaml",
|
"${path.module}/cloud-init/service.yaml",
|
||||||
{
|
{
|
||||||
@@ -107,7 +108,7 @@ module "vm" {
|
|||||||
domain = var.domain
|
domain = var.domain
|
||||||
ssh_key = var.ssh_public_key
|
ssh_key = var.ssh_public_key
|
||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
environment-setup-script = indent(6, file("${path.module}/../common/scripts/env.sh"))
|
|
||||||
env-file-content = indent(6, file("${path.module}/.env"))
|
env-file-content = indent(6, file("${path.module}/.env"))
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
@@ -193,6 +194,8 @@ variable "vm_ip_address" {
|
|||||||
description = "Virtual machine ip"
|
description = "Virtual machine ip"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
#### `modules/apps/<service-name>/output.tf`
|
#### `modules/apps/<service-name>/output.tf`
|
||||||
@@ -237,10 +240,6 @@ package_upgrade: false
|
|||||||
##### Environment variables for scripts
|
##### Environment variables for scripts
|
||||||
```hcl
|
```hcl
|
||||||
write_files:
|
write_files:
|
||||||
- path: /opt/<service-name>/env.sh
|
|
||||||
permissions: "0644"
|
|
||||||
content: |
|
|
||||||
${environment-setup-script}
|
|
||||||
- path: /opt/<service-name>/<service-name>.env
|
- path: /opt/<service-name>/<service-name>.env
|
||||||
permissions: "0644"
|
permissions: "0644"
|
||||||
content: |
|
content: |
|
||||||
|
|||||||
39
main.tf
39
main.tf
@@ -27,38 +27,40 @@ locals {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource "local_file" "traefik_config" {
|
resource "local_file" "traefik_config" {
|
||||||
filename = "${path.module}/${var.gateway_repository}/services.yml"
|
filename = "${path.module}/services.yml"
|
||||||
|
|
||||||
content = templatefile("${path.module}/templates/traefik.services.tpl", {
|
content = templatefile("${path.module}/templates/traefik.services.tpl", {
|
||||||
services = local.traefik_services
|
services = local.traefik_services
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "null_resource" "commit_traefik" {
|
resource "null_resource" "deploy_traefik_config" {
|
||||||
depends_on = [local_file.traefik_config]
|
depends_on = [
|
||||||
|
local_file.traefik_config,
|
||||||
|
module.gateway
|
||||||
|
]
|
||||||
triggers = {
|
triggers = {
|
||||||
config_sha = sha256(local_file.traefik_config.content)
|
config_sha = sha256(local_file.traefik_config.content)
|
||||||
}
|
}
|
||||||
|
|
||||||
provisioner "local-exec" {
|
provisioner "file" {
|
||||||
working_dir = "${path.module}/${var.gateway_repository}"
|
source = "${path.module}/services.yml"
|
||||||
command = "git add services.yml && git commit -m 'Update Traefik services' && git push"
|
destination = "/home/gateway/services.yaml"
|
||||||
|
|
||||||
|
connection {
|
||||||
|
type = "ssh"
|
||||||
|
host = module.gateway.vm_ip_address
|
||||||
|
user = "gateway"
|
||||||
|
agent = true
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "null_resource" "notify_gateway" {
|
|
||||||
depends_on = [null_resource.commit_traefik]
|
|
||||||
triggers = {
|
|
||||||
config_sha = sha256(local_file.traefik_config.content)
|
|
||||||
}
|
|
||||||
provisioner "local-exec" {
|
|
||||||
command = "curl -X POST -H 'X-Webhook-Token: ${var.gateway_token}' http://192.168.1.89:5555/reload"
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
module "gateway" {
|
module "gateway" {
|
||||||
source = "./modules/apps/gateway"
|
source = "./modules/apps/gateway"
|
||||||
providers = {}
|
providers = {}
|
||||||
|
|
||||||
vm_ip_address = "192.168.1.89"
|
vm_ip_address = "192.168.1.89"
|
||||||
name = "gateway"
|
name = "gateway"
|
||||||
hostname = "gateway"
|
hostname = "gateway"
|
||||||
@@ -80,6 +82,7 @@ module "gateway" {
|
|||||||
module "gitea" {
|
module "gitea" {
|
||||||
source = "./modules/apps/gitea"
|
source = "./modules/apps/gitea"
|
||||||
providers = {}
|
providers = {}
|
||||||
|
|
||||||
vm_ip_address = "192.168.1.90"
|
vm_ip_address = "192.168.1.90"
|
||||||
name = "gitea"
|
name = "gitea"
|
||||||
hostname = "gitea"
|
hostname = "gitea"
|
||||||
@@ -98,10 +101,14 @@ module "gitea" {
|
|||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Needs gitea
|
||||||
module "bookshelf" {
|
module "bookshelf" {
|
||||||
source = "./modules/apps/bookshelf"
|
source = "./modules/apps/bookshelf"
|
||||||
providers = {}
|
providers = {}
|
||||||
vm_ip_address = "192.168.1.91"
|
vm_ip_address = "192.168.1.91"
|
||||||
|
depends_on = [
|
||||||
|
module.gitea
|
||||||
|
]
|
||||||
|
|
||||||
name = "bookshelf"
|
name = "bookshelf"
|
||||||
hostname = "bookshelf"
|
hostname = "bookshelf"
|
||||||
@@ -120,10 +127,14 @@ module "bookshelf" {
|
|||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Needs gitea
|
||||||
module "fefan" {
|
module "fefan" {
|
||||||
source = "./modules/apps/fefan"
|
source = "./modules/apps/fefan"
|
||||||
providers = {}
|
providers = {}
|
||||||
vm_ip_address = "192.168.1.92"
|
vm_ip_address = "192.168.1.92"
|
||||||
|
depends_on = [
|
||||||
|
module.gitea
|
||||||
|
]
|
||||||
|
|
||||||
name = "fefan"
|
name = "fefan"
|
||||||
hostname = "fefan"
|
hostname = "fefan"
|
||||||
|
|||||||
@@ -1,16 +1,19 @@
|
|||||||
|
# Environment files
|
||||||
|
ENV_FILE_LOCATION=/opt/environment/.env
|
||||||
|
|
||||||
|
# gitea act_runner
|
||||||
ACT_RUNNER_VERSION=0.2.13
|
ACT_RUNNER_VERSION=0.2.13
|
||||||
ACT_RUNNER_LOCATION=/usr/local/bin
|
ACT_RUNNER_LOCATION=/usr/local/bin
|
||||||
ACT_RUNNER_USER=act_runner
|
ACT_RUNNER_USER=act_runner
|
||||||
ENV_FILE_LOCATION=/opt/bookshelf/bookshelf.env
|
|
||||||
GITEA_INSTANCE_URL=https://gitea.aldon.fr
|
|
||||||
GITEA_RUNNER_REGISTRATION_TOKEN=<gitea-repository-runner-token>
|
GITEA_RUNNER_REGISTRATION_TOKEN=<gitea-repository-runner-token>
|
||||||
GITEA_BOOKSHELF_APPLICATION_TOKEN=<gitea-auth-token>
|
|
||||||
GITEA_BOOKSHELF_REPOSITORY=mop/bookshelf
|
|
||||||
|
|
||||||
USERNAME=bookshelf
|
# gitea instance
|
||||||
BOOKSHELF_BACKUPS_DIR=/backups/bookshelf
|
GITEA_INSTANCE_URL=https://gitea.aldon.fr
|
||||||
BOOKSHELF_BACKUP_PREFIX=bookshelf-dump
|
GITEA_SERVICE_APPLICATION_TOKEN=<gitea-auth-token>
|
||||||
|
GITEA_SERVICE_REPOSITORY=mop/bookshelf
|
||||||
|
GITEA_WORKFLOW_NAME=deploy.yaml
|
||||||
|
|
||||||
|
# Applicaiton specifics
|
||||||
MARIADB_USER=bookshelf
|
MARIADB_USER=bookshelf
|
||||||
MARIADB_PASSWORD=<mariadb-password>
|
MARIADB_PASSWORD=<mariadb-password>
|
||||||
MARIADB_DATABASE=Biblio
|
MARIADB_DATABASE=Biblio
|
||||||
@@ -18,3 +21,12 @@ MARIADB_ROOT_PASSWORD=<mariadb-root-password>
|
|||||||
SERVICE_SECRET_KEY=<bookshelf-secret-key>
|
SERVICE_SECRET_KEY=<bookshelf-secret-key>
|
||||||
SERVICE_ORIGIN=https://bookshelf.aldon.fr
|
SERVICE_ORIGIN=https://bookshelf.aldon.fr
|
||||||
SERVICE_ROOT_FQDN=https://bookshelf.aldon.fr/api
|
SERVICE_ROOT_FQDN=https://bookshelf.aldon.fr/api
|
||||||
|
SERVICE_DATABASE_CONTAINER_NAME=bookshelf-database-1
|
||||||
|
|
||||||
|
# VM
|
||||||
|
USERNAME=bookshelf
|
||||||
|
|
||||||
|
# Backup specifics
|
||||||
|
SERVICE_BACKUPS_DIR=/backups/bookshelf
|
||||||
|
SERVICE_BACKUPS_PREFIX=bookshelf-dump
|
||||||
|
SERVICE_BACKUPS_EXTENSION=sql
|
||||||
@@ -30,11 +30,7 @@ mounts:
|
|||||||
- [ "192.168.1.12:/main/backups", "/backups", "nfs", "defaults,_netdev,x-systemd.requires=network-online.target", "0", "0" ]
|
- [ "192.168.1.12:/main/backups", "/backups", "nfs", "defaults,_netdev,x-systemd.requires=network-online.target", "0", "0" ]
|
||||||
|
|
||||||
write_files:
|
write_files:
|
||||||
- path: /opt/bookshelf/env.sh
|
- path: /opt/environment/.env
|
||||||
permissions: "0644"
|
|
||||||
content: |
|
|
||||||
${environment-setup-script}
|
|
||||||
- path: /opt/bookshelf/bookshelf.env
|
|
||||||
permissions: "0644"
|
permissions: "0644"
|
||||||
content: |
|
content: |
|
||||||
${env-file-content}
|
${env-file-content}
|
||||||
@@ -66,10 +62,10 @@ write_files:
|
|||||||
permissions: "0755"
|
permissions: "0755"
|
||||||
content: |
|
content: |
|
||||||
${act_runner-install-script}
|
${act_runner-install-script}
|
||||||
- path: /opt/bookshelf/install-bookshelf.sh
|
- path: /opt/bookshelf/install-service.sh
|
||||||
permissions: "0755"
|
permissions: "0755"
|
||||||
content: |
|
content: |
|
||||||
${bookshelf-install-script}
|
${service-install-script}
|
||||||
|
|
||||||
runcmd:
|
runcmd:
|
||||||
# Backup setup
|
# Backup setup
|
||||||
@@ -86,7 +82,7 @@ runcmd:
|
|||||||
- systemctl enable act_runner.service
|
- systemctl enable act_runner.service
|
||||||
- systemctl start act_runner.service
|
- systemctl start act_runner.service
|
||||||
# Bookshelf install
|
# Bookshelf install
|
||||||
- /opt/bookshelf/install-bookshelf.sh
|
- /opt/bookshelf/install-service.sh
|
||||||
|
|
||||||
|
|
||||||
final_message: |
|
final_message: |
|
||||||
|
|||||||
@@ -1,8 +1,8 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
source /opt/bookshelf/env.sh
|
source /opt/environment/.env
|
||||||
|
|
||||||
TIMESTAMP=$(date +'%Y-%m-%d_%H%M%S')
|
TIMESTAMP=$(date +'%Y-%m-%d_%H%M%S')
|
||||||
docker exec bookshelf-database-1 mariadb-dump --all-databases -u root -p"$MARIADB_ROOT_PASSWORD" > $BOOKSHELF_BACKUPS_DIR/bookshelf-dump-$TIMESTAMP.sql
|
docker exec bookshelf-database-1 mariadb-dump --all-databases -u root -p"$MARIADB_ROOT_PASSWORD" > $SERVICE_BACKUPS_DIR/$SERVICE_BACKUPS_PREFIX-$TIMESTAMP.$SERVICE_BACKUPS_EXTENSION
|
||||||
|
|
||||||
ls -1dt $BOOKSHELF_BACKUPS_DIR/$BOOKSHELF_BACKUP_PREFIX-*.sql | tail -n +5 | xargs -r rm -f
|
ls -1dt $SERVICE_BACKUPS_DIR/$SERVICE_BACKUPS_PREFIX-*.$SERVICE_BACKUPS_EXTENSION | tail -n +5 | xargs -r rm -f
|
||||||
|
|||||||
@@ -1,4 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
set -a
|
|
||||||
[ -f /opt/bookshelf/bookshelf.env ] && source /opt/bookshelf/bookshelf.env
|
|
||||||
set +a
|
|
||||||
@@ -1,49 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
source /opt/bookshelf/env.sh
|
|
||||||
|
|
||||||
# trigger manually a CI/CD pipeline
|
|
||||||
curl -X POST -H "Authorization: token $GITEA_BOOKSHELF_APPLICATION_TOKEN" \
|
|
||||||
-H "Content-Type: application/json" \
|
|
||||||
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_BOOKSHELF_REPOSITORY/actions/workflows/deploy.yaml/dispatches \
|
|
||||||
-d '{"ref": "main", "inputs": {"ref": "main"}}'
|
|
||||||
|
|
||||||
RUN_ID=$(curl -s -H "Authorization: token $GITEA_BOOKSHELF_APPLICATION_TOKEN" \
|
|
||||||
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_BOOKSHELF_REPOSITORY/actions/runs \
|
|
||||||
| jq -r '.workflow_runs | sort_by(.created_at) | .[0].id')
|
|
||||||
|
|
||||||
while true; do
|
|
||||||
STATUS=$(curl -s -H "Authorization: token $GITEA_BOOKSHELF_APPLICATION_TOKEN" \
|
|
||||||
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_BOOKSHELF_REPOSITORY/actions/runs/$RUN_ID \
|
|
||||||
| jq -r '.status')
|
|
||||||
|
|
||||||
if [ "$STATUS" = "completed" ]; then
|
|
||||||
CONCLUSION=$(curl -s -H "Authorization: token $GITEA_BOOKSHELF_APPLICATION_TOKEN" \
|
|
||||||
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_BOOKSHELF_REPOSITORY/actions/runs/$RUN_ID \
|
|
||||||
| jq -r '.conclusion')
|
|
||||||
echo "Workflow finished with status: $CONCLUSION"
|
|
||||||
break
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "Waiting 10 seconds..."
|
|
||||||
sleep 10
|
|
||||||
done
|
|
||||||
|
|
||||||
if [ "$CONCLUSION" = "success" ]; then
|
|
||||||
echo "Launching command..."
|
|
||||||
|
|
||||||
while [ "$(docker inspect -f '{{.State.Running}}' bookshelf-database-1 2>/dev/null)" != "true" ]; do
|
|
||||||
echo "Waiting database container status"
|
|
||||||
sleep 5
|
|
||||||
done
|
|
||||||
|
|
||||||
until docker exec bookshelf-database-1 sh -c "mariadb -u root -p$MARIADB_ROOT_PASSWORD -e 'SELECT 1;' >/dev/null 2>&1"; do
|
|
||||||
echo "Waitin mariadb to accept connections"
|
|
||||||
sleep 5
|
|
||||||
done
|
|
||||||
echo "Restoring backup"
|
|
||||||
systemctl start restore-backup.service
|
|
||||||
else
|
|
||||||
echo "Workflow failed or was cancelled, aborting."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
@@ -1,8 +1,8 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
source /opt/bookshelf/env.sh
|
source /opt/environment/.env
|
||||||
|
|
||||||
LATEST_BACKUP=$(ls -1 $BOOKSHELF_BACKUPS_DIR/$BOOKSHELF_BACKUP_PREFIX-*.sql 2>/dev/null | sort | tail -n1)
|
LATEST_BACKUP=$(ls -1 $SERVICE_BACKUPS_DIR/$SERVICE_BACKUPS_PREFIX-*.$SERVICE_BACKUPS_EXTENSION 2>/dev/null | sort | tail -n1)
|
||||||
|
|
||||||
if [ -n "$LATEST_BACKUP" ] && [ -f "$LATEST_BACKUP" ]; then
|
if [ -n "$LATEST_BACKUP" ] && [ -f "$LATEST_BACKUP" ]; then
|
||||||
cat $LATEST_BACKUP | docker exec -i bookshelf-database-1 mariadb -u root -p"$MARIADB_ROOT_PASSWORD" -D $MARIADB_DATABASE
|
cat $LATEST_BACKUP | docker exec -i bookshelf-database-1 mariadb -u root -p"$MARIADB_ROOT_PASSWORD" -D $MARIADB_DATABASE
|
||||||
|
|||||||
0
modules/apps/bookshelf/lib/services/.gitkeep
Normal file
0
modules/apps/bookshelf/lib/services/.gitkeep
Normal file
@@ -1,9 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Run backup weekly
|
|
||||||
|
|
||||||
[Timer]
|
|
||||||
OnCalendar=Sun *-*-* 01:00:00
|
|
||||||
Persistent=true
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=timers.target
|
|
||||||
@@ -15,6 +15,7 @@ module "vm" {
|
|||||||
|
|
||||||
ssh_public_key = var.ssh_public_key
|
ssh_public_key = var.ssh_public_key
|
||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
|
|
||||||
cloudinit_config = templatefile(
|
cloudinit_config = templatefile(
|
||||||
"${path.module}/cloud-init/service.yaml",
|
"${path.module}/cloud-init/service.yaml",
|
||||||
{
|
{
|
||||||
@@ -22,15 +23,16 @@ module "vm" {
|
|||||||
domain = var.domain
|
domain = var.domain
|
||||||
ssh_key = var.ssh_public_key
|
ssh_key = var.ssh_public_key
|
||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
environment-setup-script = indent(6, file("${path.module}/lib/scripts/env.sh"))
|
|
||||||
restore-backup-script = indent(6, file("${path.module}/lib/scripts/restore-backup.sh"))
|
restore-backup-script = indent(6, file("${path.module}/lib/scripts/restore-backup.sh"))
|
||||||
restore-backup-service = indent(6, file("${path.module}/lib/services/restore-backup.service"))
|
restore-backup-service = indent(6, file("${path.module}/../common/services/docker/restore-backup.service"))
|
||||||
create-backup-script = indent(6, file("${path.module}/lib/scripts/create-backup.sh"))
|
create-backup-script = indent(6, file("${path.module}/lib/scripts/create-backup.sh"))
|
||||||
create-backup-service = indent(6, file("${path.module}/lib/services/create-backup.service"))
|
create-backup-service = indent(6, file("${path.module}}/../common/services/docker/create-backup.service"))
|
||||||
create-backup-timer = indent(6, file("${path.module}/lib/services/create-backup.timer"))
|
create-backup-timer = indent(6, file("${path.module}/../common/services/create-backup.timer"))
|
||||||
act_runner-service = indent(6, file("${path.module}/lib/services/act_runner.service"))
|
|
||||||
act_runner-install-script = indent(6, file("${path.module}/lib/scripts/install-runner.sh"))
|
act_runner-service = indent(6, file("${path.module}/../common/services/act_runner.service"))
|
||||||
bookshelf-install-script = indent(6, file("${path.module}/lib/scripts/install-bookshelf.sh"))
|
act_runner-install-script = indent(6, file("${path.module}/../common/scripts/install-runner.sh"))
|
||||||
|
|
||||||
|
service-install-script = indent(6, file("${path.module}/../common/scripts/install-service-ci.sh"))
|
||||||
|
|
||||||
env-file-content = indent(6, file("${path.module}/.env"))
|
env-file-content = indent(6, file("${path.module}/.env"))
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,22 +1,27 @@
|
|||||||
variable "name" {
|
variable "name" {
|
||||||
|
description = "Virtual Machine name"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "vm_id" {
|
variable "vm_id" {
|
||||||
|
description = "Virtual Machine id"
|
||||||
type = number
|
type = number
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "node_name" {
|
variable "node_name" {
|
||||||
|
description = "Proxmox node name"
|
||||||
type = string
|
type = string
|
||||||
default = "mop"
|
default = "mop"
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "cores" {
|
variable "cores" {
|
||||||
|
description = "Number of CPU cores for this virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 2
|
default = 2
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "memory" {
|
variable "memory" {
|
||||||
|
description = "Memory RAM for this virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 2048
|
default = 2048
|
||||||
}
|
}
|
||||||
@@ -28,35 +33,39 @@ variable "balloon" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
variable "template_id" {
|
variable "template_id" {
|
||||||
|
description = "Virtual machine template ID"
|
||||||
type = number
|
type = number
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "ssh_public_key" {
|
variable "ssh_public_key" {
|
||||||
type = string
|
|
||||||
description = "Public SSH key for cloud-init user"
|
description = "Public SSH key for cloud-init user"
|
||||||
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "hostname" {
|
variable "hostname" {
|
||||||
description = "VM hostname"
|
description = "Virtual Machine hostname (<service-name>)"
|
||||||
type = string
|
type = string
|
||||||
default = "test"
|
default = "test"
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "domain" {
|
variable "domain" {
|
||||||
description = "VM domain"
|
description = "Virtual Machine domain (example.fr)"
|
||||||
type = string
|
type = string
|
||||||
default = ""
|
default = ""
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "disk_size" {
|
variable "disk_size" {
|
||||||
|
description = "Disk size for the virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 10
|
default = 10
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "proxmox_host_ip" {
|
variable "proxmox_host_ip" {
|
||||||
|
description = "Proxmox host base ip"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "vm_ip_address" {
|
variable "vm_ip_address" {
|
||||||
|
description = "Virtual machine ip"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
@@ -1,16 +1,17 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
source /opt/bookshelf/env.sh
|
source /opt/environment/.env
|
||||||
|
|
||||||
## .env should define
|
## This script installs `act_runner` onto the machine.
|
||||||
|
|
||||||
|
## Environment variables
|
||||||
# ACT_RUNNER_USER: act_runner username (act_runner)
|
# ACT_RUNNER_USER: act_runner username (act_runner)
|
||||||
# ACT_RUNNER_LOCATION: act_runner binary location (/usr/local/bin)
|
# ACT_RUNNER_LOCATION: act_runner binary location (/usr/local/bin)
|
||||||
# ACT_RUNNER_VERSION: act_runner version (0.2.13)
|
# ACT_RUNNER_VERSION: act_runner version (0.2.13)
|
||||||
# ENV_FILE_LOCATION: .env file location on vm (/opt/bookshelf/bookshelf.env)
|
# ENV_FILE_LOCATION: .env file location on vm (/opt/bookshelf/bookshelf.env)
|
||||||
# GITEA_INSTANCE_URL: url of the gitea instance (https://gitea.aldon.fr)
|
# GITEA_INSTANCE_URL: url of the gitea instance (https://gitea.aldon.fr)
|
||||||
# GITEA_RUNNER_REGISTRATION_TOKEN: registration token for gitea runner (repository scope)
|
# GITEA_RUNNER_REGISTRATION_TOKEN: registration token for gitea runner (repository scope)
|
||||||
# USERNAME: username of the vm (bookshelf)
|
# USERNAME: username of the vm (ex: bookshelf)
|
||||||
# REPOSITORY: repository on which service code is hosted (mop/bookshelf)
|
|
||||||
|
|
||||||
if ! id -u $ACT_RUNNER_USER >/dev/null 2>&1; then
|
if ! id -u $ACT_RUNNER_USER >/dev/null 2>&1; then
|
||||||
adduser \
|
adduser \
|
||||||
58
modules/apps/common/scripts/install-service-ci.sh
Normal file
58
modules/apps/common/scripts/install-service-ci.sh
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
source /opt/environment/.env
|
||||||
|
## This script triggers a CI/CD pipeline.
|
||||||
|
# It then restores a backup using `restore-backup.service` systemd service
|
||||||
|
|
||||||
|
## This script requires `restore-backup.service` in `/etc/systemd/system`
|
||||||
|
|
||||||
|
## Dependencies (in service.yaml `packages` section)
|
||||||
|
# - jq
|
||||||
|
# - curl
|
||||||
|
|
||||||
|
## Environment variables
|
||||||
|
# GITEA_SERVICE_APPLICATION_TOKEN: Gitea API token.
|
||||||
|
# GITEA_SERVICE_REPOSITORY: repository where the project resides.
|
||||||
|
# GITEA_INSTANCE_URL: Gitea url.
|
||||||
|
# SERVICE_DATABASE_CONTAINER_NAME: Container name for database.
|
||||||
|
# GITEA_WORKFLOW_NAME: deploy.yaml
|
||||||
|
|
||||||
|
curl -X POST -H "Authorization: token $GITEA_SERVICE_APPLICATION_TOKEN" \
|
||||||
|
-H "Content-Type: application/json" \
|
||||||
|
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_SERVICE_REPOSITORY/actions/workflows/$GITEA_WORKFLOW_NAME/dispatches \
|
||||||
|
-d '{"ref": "main", "inputs": {"ref": "main"}}'
|
||||||
|
|
||||||
|
RUN_ID=$(curl -s -H "Authorization: token $GITEA_SERVICE_APPLICATION_TOKEN" \
|
||||||
|
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_SERVICE_REPOSITORY/actions/runs \
|
||||||
|
| jq -r '.workflow_runs | sort_by(.created_at) | .[0].id')
|
||||||
|
|
||||||
|
while true; do
|
||||||
|
STATUS=$(curl -s -H "Authorization: token $GITEA_SERVICE_APPLICATION_TOKEN" \
|
||||||
|
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_SERVICE_REPOSITORY/actions/runs/$RUN_ID \
|
||||||
|
| jq -r '.status')
|
||||||
|
|
||||||
|
if [ "$STATUS" = "completed" ]; then
|
||||||
|
CONCLUSION=$(curl -s -H "Authorization: token $GITEA_SERVICE_APPLICATION_TOKEN" \
|
||||||
|
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_SERVICE_REPOSITORY/actions/runs/$RUN_ID \
|
||||||
|
| jq -r '.conclusion')
|
||||||
|
echo "Workflow finished with status: $CONCLUSION"
|
||||||
|
break
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "Waiting 10 seconds..."
|
||||||
|
sleep 10
|
||||||
|
done
|
||||||
|
|
||||||
|
if [ "$CONCLUSION" = "success" ]; then
|
||||||
|
echo "Launching command..."
|
||||||
|
|
||||||
|
while [ "$(docker inspect -f '{{.State.Running}}' $SERVICE_DATABASE_CONTAINER_NAME-1 2>/dev/null)" != "true" ]; do
|
||||||
|
echo "Waiting database container status"
|
||||||
|
sleep 5
|
||||||
|
done
|
||||||
|
|
||||||
|
systemctl start restore-backup.service
|
||||||
|
else
|
||||||
|
echo "Workflow failed or was cancelled, aborting."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
9
modules/apps/common/services/create-backup.timer
Normal file
9
modules/apps/common/services/create-backup.timer
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Run backup
|
||||||
|
|
||||||
|
[Timer]
|
||||||
|
OnCalendar=*-*-* 01:00:00
|
||||||
|
Persistent=true
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=timers.target
|
||||||
@@ -1,24 +1,35 @@
|
|||||||
|
# Environment files
|
||||||
|
ENV_FILE_LOCATION=/opt/environment/.env
|
||||||
|
|
||||||
|
# Gitea act_runner
|
||||||
ACT_RUNNER_VERSION=0.2.13
|
ACT_RUNNER_VERSION=0.2.13
|
||||||
ACT_RUNNER_LOCATION=/usr/local/bin
|
ACT_RUNNER_LOCATION=/usr/local/bin
|
||||||
ACT_RUNNER_USER=act_runner
|
ACT_RUNNER_USER=act_runner
|
||||||
ENV_FILE_LOCATION=/opt/fefan/fefan.env
|
|
||||||
GITEA_INSTANCE_URL=https://gitea.aldon.fr
|
|
||||||
GITEA_RUNNER_REGISTRATION_TOKEN=<gitea-repository-runner-token>
|
GITEA_RUNNER_REGISTRATION_TOKEN=<gitea-repository-runner-token>
|
||||||
GITEA_FEFAN_APPLICATION_TOKEN=<gitea-auth-token>
|
|
||||||
GITEA_FEFAN_REPOSITORY=Mop/fefan
|
|
||||||
|
|
||||||
|
# Gitea instance
|
||||||
|
GITEA_INSTANCE_URL=https://gitea.aldon.fr
|
||||||
|
GITEA_SERVICE_APPLICATION_TOKEN=<gitea-auth-token>
|
||||||
|
GITEA_SERVICE_REPOSITORY=mop/fefan
|
||||||
|
GITEA_WORKFLOW_NAME=deploy.yaml
|
||||||
|
|
||||||
|
# Application specifics
|
||||||
NEXT_PUBLIC_CONTENT_URI=https://content.fefan.fr/api
|
NEXT_PUBLIC_CONTENT_URI=https://content.fefan.fr/api
|
||||||
NEXT_PUBLIC_IMG_URI=https://content.fefan.fr
|
NEXT_PUBLIC_IMG_URI=https://content.fefan.fr
|
||||||
NEXT_PUBLIC_ORIGIN=https://fefan.fr
|
NEXT_PUBLIC_ORIGIN=https://fefan.fr
|
||||||
POSTGRES_USER=strapi
|
POSTGRES_USER=strapi
|
||||||
POSTGRES_PASSWORD=password
|
POSTGRES_PASSWORD=
|
||||||
STRAPI_APP_KEYS=
|
STRAPI_APP_KEYS=
|
||||||
STRAPI_TOKEN_SALT=
|
STRAPI_TOKEN_SALT=
|
||||||
STRAPI_ADMIN_JWT_SECRET=
|
STRAPI_ADMIN_JWT_SECRET=
|
||||||
STRAPI_TRANSFER_TOKEN_SALT=
|
STRAPI_TRANSFER_TOKEN_SALT=
|
||||||
STRAPI_JWT_SECRET=
|
STRAPI_JWT_SECRET=
|
||||||
|
SERVICE_DATABASE_CONTAINER_NAME=fefan-db
|
||||||
|
|
||||||
|
# VM
|
||||||
USERNAME=fefan
|
USERNAME=fefan
|
||||||
FEFAN_BACKUPS_DIR=/backups/fefan
|
|
||||||
FEFAN_BACKUP_PREFIX=fefan-dump
|
# Backup specifics
|
||||||
|
SERVICE_BACKUPS_DIR=/backups/fefan
|
||||||
|
SERVICE_BACKUPS_PREFIX=fefan-dump
|
||||||
|
SERVICE_BACKUPS_EXTENSION=tar.gz
|
||||||
@@ -30,11 +30,7 @@ mounts:
|
|||||||
- [ "192.168.1.12:/main/backups", "/backups", "nfs", "defaults,_netdev,x-systemd.requires=network-online.target", "0", "0" ]
|
- [ "192.168.1.12:/main/backups", "/backups", "nfs", "defaults,_netdev,x-systemd.requires=network-online.target", "0", "0" ]
|
||||||
|
|
||||||
write_files:
|
write_files:
|
||||||
- path: /opt/fefan/env.sh
|
- path: /opt/environment/.env
|
||||||
permissions: "0644"
|
|
||||||
content: |
|
|
||||||
${environment-setup-script}
|
|
||||||
- path: /opt/fefan/fefan.env
|
|
||||||
permissions: "0644"
|
permissions: "0644"
|
||||||
content: |
|
content: |
|
||||||
${env-file-content}
|
${env-file-content}
|
||||||
@@ -69,7 +65,7 @@ write_files:
|
|||||||
- path: /opt/fefan/install-fefan.sh
|
- path: /opt/fefan/install-fefan.sh
|
||||||
permissions: "0755"
|
permissions: "0755"
|
||||||
content: |
|
content: |
|
||||||
${fefan-install-script}
|
${service-install-script}
|
||||||
|
|
||||||
runcmd:
|
runcmd:
|
||||||
# Backup setup
|
# Backup setup
|
||||||
|
|||||||
@@ -1,14 +1,15 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
source /opt/fefan/env.sh
|
source /opt/environment/.env
|
||||||
|
|
||||||
# FEFAN_BACKUPS_DIR=/backups/fefan
|
# SERVICE_BACKUPS_DIR=/backups/fefan
|
||||||
# FEFAN_BACKUP_PREFIX=fefan-dump
|
# SERVICE_BACKUPS_PREFIX=fefan-dump
|
||||||
|
# SERVICE_BACKUPS_EXTENSION=tar.gz
|
||||||
|
|
||||||
TIMESTAMP=$(date +'%Y-%m-%d_%H%M%S')
|
TIMESTAMP=$(date +'%Y-%m-%d_%H%M%S')
|
||||||
|
|
||||||
docker exec fefan-strapi-1 yarn strapi export -f export --no-encrypt
|
docker exec fefan-strapi-1 yarn strapi export -f export --no-encrypt
|
||||||
docker cp fefan-strapi-1:/app/export.tar.gz $FEFAN_BACKUPS_DIR/$FEFAN_BACKUP_PREFIX-$TIMESTAMP.tar.gz
|
docker cp fefan-strapi-1:/app/export.$SERVICE_BACKUPS_EXTENSION $SERVICE_BACKUPS_DIR/$SERVICE_BACKUPS_PREFIX-$TIMESTAMP.$SERVICE_BACKUPS_EXTENSION
|
||||||
docker exec fefan-strapi-1 rm /app/export.tar.gz
|
docker exec fefan-strapi-1 rm /app/export.$SERVICE_BACKUPS_EXTENSION
|
||||||
|
|
||||||
ls -1dt $FEFAN_BACKUPS_DIR/$FEFAN_BACKUP_PREFIX-*.tar.gz | tail -n +5 | xargs -r rm -f
|
ls -1dt $SERVICE_BACKUPS_DIR/$SERVICE_BACKUPS_PREFIX-*.$SERVICE_BACKUPS_EXTENSION | tail -n +5 | xargs -r rm -f
|
||||||
@@ -1,4 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
set -a
|
|
||||||
[ -f /opt/fefan/fefan.env ] && source /opt/fefan/fefan.env
|
|
||||||
set +a
|
|
||||||
@@ -1,44 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
source /opt/fefan/env.sh
|
|
||||||
|
|
||||||
# trigger manually a CI/CD pipeline
|
|
||||||
curl -X POST -H "Authorization: token $GITEA_FEFAN_APPLICATION_TOKEN" \
|
|
||||||
-H "Content-Type: application/json" \
|
|
||||||
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_FEFAN_REPOSITORY/actions/workflows/deploy.yaml/dispatches \
|
|
||||||
-d '{"ref": "main", "inputs": {"ref": "main"}}'
|
|
||||||
|
|
||||||
RUN_ID=$(curl -s -H "Authorization: token $GITEA_FEFAN_APPLICATION_TOKEN" \
|
|
||||||
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_FEFAN_REPOSITORY/actions/runs \
|
|
||||||
| jq -r '.workflow_runs | sort_by(.created_at) | .[0].id')
|
|
||||||
|
|
||||||
while true; do
|
|
||||||
STATUS=$(curl -s -H "Authorization: token $GITEA_FEFAN_APPLICATION_TOKEN" \
|
|
||||||
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_FEFAN_REPOSITORY/actions/runs/$RUN_ID \
|
|
||||||
| jq -r '.status')
|
|
||||||
|
|
||||||
if [ "$STATUS" = "completed" ]; then
|
|
||||||
CONCLUSION=$(curl -s -H "Authorization: token $GITEA_FEFAN_APPLICATION_TOKEN" \
|
|
||||||
$GITEA_INSTANCE_URL/api/v1/repos/$GITEA_FEFAN_REPOSITORY/actions/runs/$RUN_ID \
|
|
||||||
| jq -r '.conclusion')
|
|
||||||
echo "Workflow finished with status: $CONCLUSION"
|
|
||||||
break
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "Waiting 10 seconds..."
|
|
||||||
sleep 10
|
|
||||||
done
|
|
||||||
|
|
||||||
if [ "$CONCLUSION" = "success" ]; then
|
|
||||||
echo "Launching command..."
|
|
||||||
|
|
||||||
while [ "$(docker inspect -f '{{.State.Running}}' fefan-db-1 2>/dev/null)" != "true" ]; do
|
|
||||||
echo "Waiting database container status"
|
|
||||||
sleep 5
|
|
||||||
done
|
|
||||||
|
|
||||||
systemctl start restore-backup.service
|
|
||||||
else
|
|
||||||
echo "Workflow failed or was cancelled, aborting."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
@@ -1,69 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
source /opt/fefan/env.sh
|
|
||||||
|
|
||||||
## .env should define
|
|
||||||
# ACT_RUNNER_USER: act_runner username (act_runner)
|
|
||||||
# ACT_RUNNER_LOCATION: act_runner binary location (/usr/local/bin)
|
|
||||||
# ACT_RUNNER_VERSION: act_runner version (0.2.13)
|
|
||||||
# ENV_FILE_LOCATION: .env file location on vm (/opt/fefan/fefan.env)
|
|
||||||
# GITEA_INSTANCE_URL: url of the gitea instance (https://gitea.aldon.fr)
|
|
||||||
# GITEA_RUNNER_REGISTRATION_TOKEN: registration token for gitea runner (repository scope)
|
|
||||||
# USERNAME: username of the vm (fefan)
|
|
||||||
# REPOSITORY: repository on which service code is hosted (mop/fefan)
|
|
||||||
|
|
||||||
if ! id -u $ACT_RUNNER_USER >/dev/null 2>&1; then
|
|
||||||
adduser \
|
|
||||||
--system \
|
|
||||||
--shell /bin/bash \
|
|
||||||
--gecos 'Action runner user' \
|
|
||||||
--ingroup docker\
|
|
||||||
--disabled-password \
|
|
||||||
--home /home/$ACT_RUNNER_USER \
|
|
||||||
$ACT_RUNNER_USER
|
|
||||||
fi
|
|
||||||
|
|
||||||
wget -O $ACT_RUNNER_LOCATION/act_runner https://dl.gitea.com/act_runner/$ACT_RUNNER_VERSION/act_runner-$ACT_RUNNER_VERSION-linux-amd64
|
|
||||||
chmod +x $ACT_RUNNER_LOCATION/act_runner
|
|
||||||
|
|
||||||
cat <<EOF > /home/$ACT_RUNNER_USER/config.yaml
|
|
||||||
log:
|
|
||||||
level: info
|
|
||||||
runner:
|
|
||||||
file: .runner
|
|
||||||
capacity: 1
|
|
||||||
timeout: 3h
|
|
||||||
shutdown_timeout: 0s
|
|
||||||
insecure: false
|
|
||||||
fetch_timeout: 5s
|
|
||||||
env_file: $ENV_FILE_LOCATION
|
|
||||||
fetch_interval: 2s
|
|
||||||
github_mirror: ''
|
|
||||||
labels:
|
|
||||||
- 'ubuntu-latest:docker://docker.gitea.com/runner-images:ubuntu-latest'
|
|
||||||
- 'ubuntu-22.04:docker://docker.gitea.com/runner-images:ubuntu-22.04'
|
|
||||||
- 'ubuntu-20.04:docker://docker.gitea.com/runner-images:ubuntu-20.04'
|
|
||||||
cache:
|
|
||||||
enabled: true
|
|
||||||
dir: ""
|
|
||||||
host: ""
|
|
||||||
port: 0
|
|
||||||
external_server: ""
|
|
||||||
container:
|
|
||||||
network: ""
|
|
||||||
privileged: false
|
|
||||||
options:
|
|
||||||
workdir_parent:
|
|
||||||
valid_volumes: []
|
|
||||||
docker_host: ""
|
|
||||||
force_pull: true
|
|
||||||
force_rebuild: false
|
|
||||||
require_docker: false
|
|
||||||
docker_timeout: 0s
|
|
||||||
host:
|
|
||||||
workdir_parent:
|
|
||||||
EOF
|
|
||||||
|
|
||||||
cd /home/act_runner
|
|
||||||
sudo -u $ACT_RUNNER_USER act_runner register --no-interactive --instance $GITEA_INSTANCE_URL --token $GITEA_RUNNER_REGISTRATION_TOKEN --name $USERNAME --labels $USERNAME
|
|
||||||
chown -R $ACT_RUNNER_USER:docker /home/$ACT_RUNNER_USER
|
|
||||||
@@ -1,14 +1,16 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
source /opt/fefan/env.sh
|
source /opt/environment/.env
|
||||||
|
|
||||||
# FEFAN_BACKUPS_DIR=/backups/fefan
|
## Environment variables
|
||||||
# FEFAN_BACKUP_PREFIX=fefan-dump
|
# SERVICE_BACKUPS_DIR=/backups/fefan
|
||||||
|
# SERVICE_BACKUPS_PREFIX=fefan-dump
|
||||||
|
# SERVICE_BACKUPS_EXTENSION=tar.gz
|
||||||
|
|
||||||
LATEST_BACKUP=$(ls -1 $FEFAN_BACKUPS_DIR/$FEFAN_BACKUP_PREFIX-*.tar.gz 2>/dev/null | sort | tail -n1)
|
LATEST_BACKUP=$(ls -1 $SERVICE_BACKUPS_DIR/$SERVICE_BACKUPS_PREFIX-*.$SERVICE_BACKUPS_EXTENSION 2>/dev/null | sort | tail -n1)
|
||||||
|
|
||||||
if [ -n "$LATEST_BACKUP" ] && [ -f "$LATEST_BACKUP" ]; then
|
if [ -n "$LATEST_BACKUP" ] && [ -f "$LATEST_BACKUP" ]; then
|
||||||
docker cp $LATEST_BACKUP fefan-strapi-1:/app/${LATEST_BACKUP#"$FEFAN_BACKUPS_DIR"/}
|
docker cp $LATEST_BACKUP fefan-strapi-1:/app/${LATEST_BACKUP#"$SERVICE_BACKUPS_DIR"/}
|
||||||
docker exec fefan-strapi-1 yarn strapi import -f /app/${LATEST_BACKUP#"$FEFAN_BACKUPS_DIR"/} --force
|
docker exec fefan-strapi-1 yarn strapi import -f /app/${LATEST_BACKUP#"$SERVICE_BACKUPS_DIR"/} --force
|
||||||
docker exec fefan-strapi-1 rm /app/${LATEST_BACKUP#"$FEFAN_BACKUPS_DIR"/}
|
docker exec fefan-strapi-1 rm /app/${LATEST_BACKUP#"$SERVICE_BACKUPS_DIR"/}
|
||||||
fi
|
fi
|
||||||
0
modules/apps/fefan/lib/services/.gitkeep
Normal file
0
modules/apps/fefan/lib/services/.gitkeep
Normal file
@@ -1,16 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Gitea Actions runner
|
|
||||||
Documentation=https://gitea.com/gitea/act_runner
|
|
||||||
After=docker.service
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
ExecStart=/usr/local/bin/act_runner daemon --config /home/act_runner/config.yaml
|
|
||||||
ExecReload=/bin/kill -s HUP $MAINPID
|
|
||||||
WorkingDirectory=/home/act_runner
|
|
||||||
TimeoutSec=0
|
|
||||||
RestartSec=10
|
|
||||||
Restart=always
|
|
||||||
User=act_runner
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Backup Service
|
|
||||||
Wants=network.target
|
|
||||||
After=network.target docker.service
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
Type=oneshot
|
|
||||||
User=root
|
|
||||||
ExecStart=/usr/local/bin/backup.sh
|
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Run backup weekly
|
|
||||||
|
|
||||||
[Timer]
|
|
||||||
OnCalendar=Sun *-*-* 01:00:00
|
|
||||||
Persistent=true
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=timers.target
|
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Restore latest backup
|
|
||||||
After=network.target
|
|
||||||
Requires=docker.service
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
Type=oneshot
|
|
||||||
User=root
|
|
||||||
ExecStart=/usr/local/bin/restore-backup.sh
|
|
||||||
@@ -15,6 +15,7 @@ module "vm" {
|
|||||||
|
|
||||||
ssh_public_key = var.ssh_public_key
|
ssh_public_key = var.ssh_public_key
|
||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
|
|
||||||
cloudinit_config = templatefile(
|
cloudinit_config = templatefile(
|
||||||
"${path.module}/cloud-init/service.yaml",
|
"${path.module}/cloud-init/service.yaml",
|
||||||
{
|
{
|
||||||
@@ -22,15 +23,17 @@ module "vm" {
|
|||||||
domain = var.domain
|
domain = var.domain
|
||||||
ssh_key = var.ssh_public_key
|
ssh_key = var.ssh_public_key
|
||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
environment-setup-script = indent(6, file("${path.module}/lib/scripts/env.sh"))
|
|
||||||
restore-backup-script = indent(6, file("${path.module}/lib/scripts/restore-backup.sh"))
|
restore-backup-script = indent(6, file("${path.module}/lib/scripts/restore-backup.sh"))
|
||||||
restore-backup-service = indent(6, file("${path.module}/lib/services/restore-backup.service"))
|
restore-backup-service = indent(6, file("${path.module}/../common/services/docker/restore-backup.service"))
|
||||||
create-backup-script = indent(6, file("${path.module}/lib/scripts/create-backup.sh"))
|
create-backup-script = indent(6, file("${path.module}/lib/scripts/create-backup.sh"))
|
||||||
create-backup-service = indent(6, file("${path.module}/lib/services/create-backup.service"))
|
create-backup-service = indent(6, file("${path.module}}/../common/services/docker/create-backup.service"))
|
||||||
create-backup-timer = indent(6, file("${path.module}/lib/services/create-backup.timer"))
|
create-backup-timer = indent(6, file("${path.module}/../common/services/create-backup.timer"))
|
||||||
act_runner-service = indent(6, file("${path.module}/lib/services/act_runner.service"))
|
|
||||||
act_runner-install-script = indent(6, file("${path.module}/lib/scripts/install-runner.sh"))
|
act_runner-service = indent(6, file("${path.module}/../common/services/act_runner.service"))
|
||||||
fefan-install-script = indent(6, file("${path.module}/lib/scripts/install-fefan.sh"))
|
act_runner-install-script = indent(6, file("${path.module}/../common/scripts/install-runner.sh"))
|
||||||
|
|
||||||
|
service-install-script = indent(6, file("${path.module}/../common/scripts/install-service-ci.sh"))
|
||||||
|
|
||||||
env-file-content = indent(6, file("${path.module}/.env"))
|
env-file-content = indent(6, file("${path.module}/.env"))
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|||||||
@@ -1,22 +1,27 @@
|
|||||||
variable "name" {
|
variable "name" {
|
||||||
|
description = "Virtual Machine name"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "vm_id" {
|
variable "vm_id" {
|
||||||
|
description = "Virtual Machine id"
|
||||||
type = number
|
type = number
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "node_name" {
|
variable "node_name" {
|
||||||
|
description = "Proxmox node name"
|
||||||
type = string
|
type = string
|
||||||
default = "mop"
|
default = "mop"
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "cores" {
|
variable "cores" {
|
||||||
|
description = "Number of CPU cores for this virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 2
|
default = 2
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "memory" {
|
variable "memory" {
|
||||||
|
description = "Memory RAM for this virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 2048
|
default = 2048
|
||||||
}
|
}
|
||||||
@@ -28,35 +33,39 @@ variable "balloon" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
variable "template_id" {
|
variable "template_id" {
|
||||||
|
description = "Virtual machine template ID"
|
||||||
type = number
|
type = number
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "ssh_public_key" {
|
variable "ssh_public_key" {
|
||||||
type = string
|
|
||||||
description = "Public SSH key for cloud-init user"
|
description = "Public SSH key for cloud-init user"
|
||||||
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "hostname" {
|
variable "hostname" {
|
||||||
description = "VM hostname"
|
description = "Virtual Machine hostname (<service-name>)"
|
||||||
type = string
|
type = string
|
||||||
default = "test"
|
default = "test"
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "domain" {
|
variable "domain" {
|
||||||
description = "VM domain"
|
description = "Virtual Machine domain (example.fr)"
|
||||||
type = string
|
type = string
|
||||||
default = ""
|
default = ""
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "disk_size" {
|
variable "disk_size" {
|
||||||
|
description = "Disk size for the virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 10
|
default = 10
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "proxmox_host_ip" {
|
variable "proxmox_host_ip" {
|
||||||
|
description = "Proxmox host base ip"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "vm_ip_address" {
|
variable "vm_ip_address" {
|
||||||
|
description = "Virtual machine ip"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
@@ -1,8 +1,11 @@
|
|||||||
|
# Environment files
|
||||||
|
ENV_FILE_LOCATION=/opt/environment/.env
|
||||||
|
|
||||||
|
# Application Specifics
|
||||||
#openssl rand -hex 20
|
#openssl rand -hex 20
|
||||||
WEBHOOK_SECRET=xxx
|
|
||||||
TRAEFIK_VERSION=v3.6.7
|
TRAEFIK_VERSION=v3.6.7
|
||||||
TRAEFIK_BINARY=/usr/local/bin/traefik
|
TRAEFIK_BINARY=/usr/local/bin/traefik
|
||||||
TRAEFIK_USER=traefik
|
TRAEFIK_USER=traefik
|
||||||
TRAEFIK_CONF=/home/traefik/traefik.yml
|
TRAEFIK_CONF=/home/traefik/traefik.yml
|
||||||
GATEWAY_REPOSITORY=/Mop/gateway
|
GATEWAY_REPOSITORY=/Mop/gateway
|
||||||
GATEWAY_REPOSITORY_LOCATION=/home/traefik/gateway
|
DYNAMIC_CONFIG_LOCATION=/home/gateway/services.yaml
|
||||||
@@ -26,11 +26,7 @@ packages:
|
|||||||
- gunicorn
|
- gunicorn
|
||||||
|
|
||||||
write_files:
|
write_files:
|
||||||
- path: /opt/gateway/env.sh
|
- path: /opt/environment/.env
|
||||||
permissions: "0644"
|
|
||||||
content: |
|
|
||||||
${environment-setup-script}
|
|
||||||
- path: /opt/gateway/gateway.env
|
|
||||||
permissions: "0644"
|
permissions: "0644"
|
||||||
content: |
|
content: |
|
||||||
${env-file-content}
|
${env-file-content}
|
||||||
@@ -38,14 +34,6 @@ write_files:
|
|||||||
permissions: "0755"
|
permissions: "0755"
|
||||||
content: |
|
content: |
|
||||||
${install-traefik-script}
|
${install-traefik-script}
|
||||||
- path: /usr/local/bin/pull-webhook.py
|
|
||||||
permissions: "0755"
|
|
||||||
content: |
|
|
||||||
${pull-webhook-script}
|
|
||||||
- path: /etc/systemd/system/pull-webhook.service
|
|
||||||
permissions: "0755"
|
|
||||||
content: |
|
|
||||||
${pull-webhook-service}
|
|
||||||
- path: /etc/systemd/system/traefik.service
|
- path: /etc/systemd/system/traefik.service
|
||||||
permissions: "0755"
|
permissions: "0755"
|
||||||
content: |
|
content: |
|
||||||
@@ -53,8 +41,6 @@ write_files:
|
|||||||
|
|
||||||
runcmd:
|
runcmd:
|
||||||
- /opt/gateway/install-traefik.sh
|
- /opt/gateway/install-traefik.sh
|
||||||
- systemctl enable pull-webhook.service
|
|
||||||
- systemctl start pull-webhook.service
|
|
||||||
|
|
||||||
final_message: |
|
final_message: |
|
||||||
Base system ready for ${hostname}
|
Base system ready for ${hostname}
|
||||||
@@ -1,4 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
set -a
|
|
||||||
[ -f /opt/gateway/gateway.env ] && source /opt/gateway/gateway.env
|
|
||||||
set +a
|
|
||||||
@@ -1,13 +1,13 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
# GATEWAY_REPOSITORY_LOCATION (path on vm)
|
# DYNAMIC_CONFIG_LOCATION (path on vm)
|
||||||
# GATEWAY_REPOSITORY (path on gitea)
|
# GATEWAY_REPOSITORY (path on gitea)
|
||||||
# TRAEFIK_USER
|
# TRAEFIK_USER
|
||||||
# TRAEFIK_BINARY
|
# TRAEFIK_BINARY
|
||||||
# TRAEFIK_VERSION
|
# TRAEFIK_VERSION
|
||||||
# TRAEFIK_CONF
|
# TRAEFIK_CONF
|
||||||
|
|
||||||
source /opt/gateway/env.sh
|
source /opt/environment/.env
|
||||||
|
|
||||||
if ! id -u $TRAEFIK_USER >/dev/null 2>&1; then
|
if ! id -u $TRAEFIK_USER >/dev/null 2>&1; then
|
||||||
adduser \
|
adduser \
|
||||||
@@ -32,8 +32,6 @@ chown $TRAEFIK_USER:$TRAEFIK_USER /etc/traefik/acme.json
|
|||||||
chmod 600 /etc/traefik/acme.json
|
chmod 600 /etc/traefik/acme.json
|
||||||
setcap 'cap_net_bind_service=+ep' /usr/local/bin/traefik
|
setcap 'cap_net_bind_service=+ep' /usr/local/bin/traefik
|
||||||
|
|
||||||
git clone https://gitea.aldon.fr/$GATEWAY_REPOSITORY.git $GATEWAY_REPOSITORY_LOCATION
|
|
||||||
|
|
||||||
cat > "$TRAEFIK_CONF" <<EOF
|
cat > "$TRAEFIK_CONF" <<EOF
|
||||||
entryPoints:
|
entryPoints:
|
||||||
web:
|
web:
|
||||||
@@ -42,7 +40,7 @@ entryPoints:
|
|||||||
address: ":443"
|
address: ":443"
|
||||||
providers:
|
providers:
|
||||||
file:
|
file:
|
||||||
directory: $GATEWAY_REPOSITORY_LOCATION
|
filename: $DYNAMIC_CONFIG_LOCATION
|
||||||
watch: true
|
watch: true
|
||||||
api:
|
api:
|
||||||
dashboard: false
|
dashboard: false
|
||||||
|
|||||||
@@ -1,23 +0,0 @@
|
|||||||
from flask import Flask, request, abort
|
|
||||||
import subprocess
|
|
||||||
import os
|
|
||||||
|
|
||||||
SECRET = os.environ.get("WEBHOOK_SECRET")
|
|
||||||
REPOSITORY = os.environ.get("GATEWAY_REPOSITORY_LOCATION")
|
|
||||||
|
|
||||||
app = Flask(__name__)
|
|
||||||
|
|
||||||
@app.route("/reload", methods=["POST"])
|
|
||||||
def reload():
|
|
||||||
token = request.headers.get("X-Webhook-Token")
|
|
||||||
if token != SECRET:
|
|
||||||
abort(403)
|
|
||||||
|
|
||||||
subprocess.run(
|
|
||||||
["git", "-C", REPOSITORY, "pull"],
|
|
||||||
check=True
|
|
||||||
)
|
|
||||||
return "ok\n"
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
|
||||||
app.run()
|
|
||||||
@@ -1,13 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Traefik config webhook
|
|
||||||
After=network.target
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
WorkingDirectory=/usr/local/bin
|
|
||||||
ExecStart=/usr/bin/gunicorn --bind 0.0.0.0:5555 pull-webhook:app
|
|
||||||
EnvironmentFile=/opt/gateway/gateway.env
|
|
||||||
Restart=always
|
|
||||||
User=root
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
||||||
@@ -15,6 +15,7 @@ module "vm" {
|
|||||||
|
|
||||||
ssh_public_key = var.ssh_public_key
|
ssh_public_key = var.ssh_public_key
|
||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
|
|
||||||
cloudinit_config = templatefile(
|
cloudinit_config = templatefile(
|
||||||
"${path.module}/cloud-init/service.yaml",
|
"${path.module}/cloud-init/service.yaml",
|
||||||
{
|
{
|
||||||
@@ -22,12 +23,10 @@ module "vm" {
|
|||||||
domain = var.domain
|
domain = var.domain
|
||||||
ssh_key = var.ssh_public_key
|
ssh_key = var.ssh_public_key
|
||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
environment-setup-script = indent(6, file("${path.module}/lib/scripts/env.sh"))
|
|
||||||
env-file-content = indent(6, file("${path.module}/.env"))
|
|
||||||
pull-webhook-service = indent(6, file("${path.module}/lib/services/pull-webhook.service"))
|
|
||||||
pull-webhook-script = indent(6, file("${path.module}/lib/scripts/pull-webhook.py"))
|
|
||||||
traefik-service = indent(6, file("${path.module}/lib/services/traefik.service"))
|
traefik-service = indent(6, file("${path.module}/lib/services/traefik.service"))
|
||||||
install-traefik-script = indent(6, file("${path.module}/lib/scripts/install-traefik.sh"))
|
install-traefik-script = indent(6, file("${path.module}/lib/scripts/install-traefik.sh"))
|
||||||
|
|
||||||
|
env-file-content = indent(6, file("${path.module}/.env"))
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
3
modules/apps/gateway/output.tf
Normal file
3
modules/apps/gateway/output.tf
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
output "vm_ip_address" {
|
||||||
|
value = var.vm_ip_address
|
||||||
|
}
|
||||||
@@ -1,22 +1,27 @@
|
|||||||
variable "name" {
|
variable "name" {
|
||||||
|
description = "Virtual Machine name"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "vm_id" {
|
variable "vm_id" {
|
||||||
|
description = "Virtual Machine id"
|
||||||
type = number
|
type = number
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "node_name" {
|
variable "node_name" {
|
||||||
|
description = "Proxmox node name"
|
||||||
type = string
|
type = string
|
||||||
default = "mop"
|
default = "mop"
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "cores" {
|
variable "cores" {
|
||||||
|
description = "Number of CPU cores for this virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 2
|
default = 2
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "memory" {
|
variable "memory" {
|
||||||
|
description = "Memory RAM for this virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 2048
|
default = 2048
|
||||||
}
|
}
|
||||||
@@ -28,35 +33,39 @@ variable "balloon" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
variable "template_id" {
|
variable "template_id" {
|
||||||
|
description = "Virtual machine template ID"
|
||||||
type = number
|
type = number
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "ssh_public_key" {
|
variable "ssh_public_key" {
|
||||||
type = string
|
|
||||||
description = "Public SSH key for cloud-init user"
|
description = "Public SSH key for cloud-init user"
|
||||||
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "hostname" {
|
variable "hostname" {
|
||||||
description = "VM hostname"
|
description = "Virtual Machine hostname (<service-name>)"
|
||||||
type = string
|
type = string
|
||||||
default = "test"
|
default = "test"
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "domain" {
|
variable "domain" {
|
||||||
description = "VM domain"
|
description = "Virtual Machine domain (example.fr)"
|
||||||
type = string
|
type = string
|
||||||
default = ""
|
default = ""
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "disk_size" {
|
variable "disk_size" {
|
||||||
|
description = "Disk size for the virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 10
|
default = 10
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "proxmox_host_ip" {
|
variable "proxmox_host_ip" {
|
||||||
|
description = "Proxmox host base ip"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "vm_ip_address" {
|
variable "vm_ip_address" {
|
||||||
|
description = "Virtual machine ip"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
@@ -1,9 +1,17 @@
|
|||||||
GITEA_HOME="/var/lib/gitea"
|
# Environment files
|
||||||
GITEA_CONF="/var/lib/gitea/app.ini"
|
ENV_FILE_LOCATION=/opt/environment/.env
|
||||||
GITEA_USER="git"
|
|
||||||
GITEA_VERSION="1.25.3"
|
# Application specifics
|
||||||
GITEA_BINARY="/usr/local/bin/gitea"
|
GITEA_HOME=/var/lib/gitea
|
||||||
GITEA_SERVICE="/etc/systemd/system/gitea.service"
|
GITEA_CONF=$GITEA_HOME/app.ini
|
||||||
DB_NAME="giteadb"
|
GITEA_USER=git
|
||||||
DB_USER="gitea"
|
GITEA_VERSION=1.25.3
|
||||||
GITEA_BACKUPS_DIR="/backups/gitea"
|
GITEA_BINARY=/usr/local/bin/gitea
|
||||||
|
GITEA_SERVICE=/etc/systemd/system/gitea.service
|
||||||
|
DB_NAME=giteadb
|
||||||
|
DB_USER=gitea
|
||||||
|
|
||||||
|
# Backup specifics
|
||||||
|
SERVICE_BACKUPS_DIR=/backups/gitea
|
||||||
|
SERVICE_BACKUPS_PREFIX=gitea-dump
|
||||||
|
SERVICE_BACKUPS_EXTENSION=zip
|
||||||
@@ -35,14 +35,10 @@ mounts:
|
|||||||
- [ "192.168.1.12:/main/backups", "/backups", "nfs", "defaults,_netdev,x-systemd.requires=network-online.target", "0", "0" ]
|
- [ "192.168.1.12:/main/backups", "/backups", "nfs", "defaults,_netdev,x-systemd.requires=network-online.target", "0", "0" ]
|
||||||
|
|
||||||
write_files:
|
write_files:
|
||||||
- path: /opt/gitea/gitea.env
|
- path: /opt/environment/.env
|
||||||
permissions: "0644"
|
permissions: "0644"
|
||||||
content: |
|
content: |
|
||||||
${env-file-content}
|
${env-file-content}
|
||||||
- path: /opt/gitea/env.sh
|
|
||||||
permissions: "0644"
|
|
||||||
content: |
|
|
||||||
${environment-setup-script}
|
|
||||||
- path: /usr/local/bin/restore-backup.sh
|
- path: /usr/local/bin/restore-backup.sh
|
||||||
permissions: "0755"
|
permissions: "0755"
|
||||||
content: |
|
content: |
|
||||||
|
|||||||
@@ -1,10 +1,10 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
|
|
||||||
source /opt/gitea/env.sh
|
source /opt/environment/.env
|
||||||
|
|
||||||
TIMESTAMP=$(date +'%Y-%m-%d_%H%M%S')
|
TIMESTAMP=$(date +'%Y-%m-%d_%H%M%S')
|
||||||
|
|
||||||
sudo -u "$GITEA_USER" gitea dump -c "$GITEA_HOME/app.ini" -f $GITEA_BACKUPS_DIR/gitea-dump-$TIMESTAMP.zip
|
sudo -u "$GITEA_USER" gitea dump -c "$GITEA_CONF" -f $SERVICE_BACKUPS_DIR/$SERVICE_BACKUPS_PREFIX-$TIMESTAMP.$SERVICE_BACKUPS_EXTENSION
|
||||||
|
|
||||||
ls -1dt $GITEA_BACKUPS_DIR/gitea-dump-*.zip | tail -n +5 | xargs -r rm -f
|
ls -1dt $SERVICE_BACKUPS_DIR/$SERVICE_BACKUPS_PREFIX-*.$SERVICE_BACKUPS_EXTENSION | tail -n +5 | xargs -r rm -f
|
||||||
|
|||||||
@@ -1,4 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
set -a
|
|
||||||
[ -f /opt/gitea/gitea.env ] && source /opt/gitea/gitea.env
|
|
||||||
set +a
|
|
||||||
@@ -1,7 +1,7 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
|
|
||||||
source /opt/gitea/env.sh
|
source /opt/environment/.env
|
||||||
|
|
||||||
# Gitea user
|
# Gitea user
|
||||||
if ! id -u $GITEA_USER >/dev/null 2>&1; then
|
if ! id -u $GITEA_USER >/dev/null 2>&1; then
|
||||||
@@ -41,15 +41,15 @@ CREATE ROLE $DB_USER WITH LOGIN PASSWORD '$DB_PASS';
|
|||||||
CREATE DATABASE $DB_NAME WITH OWNER $DB_USER TEMPLATE template0 ENCODING UTF8 LC_COLLATE 'en_US.UTF-8' LC_CTYPE 'en_US.UTF-8';
|
CREATE DATABASE $DB_NAME WITH OWNER $DB_USER TEMPLATE template0 ENCODING UTF8 LC_COLLATE 'en_US.UTF-8' LC_CTYPE 'en_US.UTF-8';
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
if ls -1 "$GITEA_BACKUPS_DIR"/gitea-dump-*.zip >/dev/null 2>&1; then
|
if ls -1 "$SERVICE_BACKUPS_DIR"/$SERVICE_BACKUPS_PREFIX-*.$SERVICE_BACKUPS_EXTENSION >/dev/null 2>&1; then
|
||||||
echo "---- Backup found, restoring Gitea ----"
|
echo "---- Backup found, restoring Gitea ----"
|
||||||
/usr/local/bin/restore-backup.sh
|
/usr/local/bin/restore-backup.sh
|
||||||
else
|
else
|
||||||
echo "---- No backup found in $GITEA_BACKUPS_DIR, skipping restore ----"
|
echo "---- No backup found in $SERVICE_BACKUPS_DIR, skipping restore ----"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
sudo chown -R $GITEA_USER:$GITEA_USER $GITEA_BACKUPS_DIR
|
sudo chown -R $GITEA_USER:$GITEA_USER $SERVICE_BACKUPS_DIR
|
||||||
sudo chmod -R 770 $GITEA_BACKUPS_DIR
|
sudo chmod -R 770 $SERVICE_BACKUPS_DIR
|
||||||
|
|
||||||
GITEA_SECRET_KEY=$("$GITEA_BINARY" generate secret SECRET_KEY)
|
GITEA_SECRET_KEY=$("$GITEA_BINARY" generate secret SECRET_KEY)
|
||||||
GITEA_JWT_SECRET=$("$GITEA_BINARY" generate secret JWT_SECRET)
|
GITEA_JWT_SECRET=$("$GITEA_BINARY" generate secret JWT_SECRET)
|
||||||
@@ -90,7 +90,7 @@ ENABLED=true
|
|||||||
EOF
|
EOF
|
||||||
echo "---- Generated Gitea app.ini with secrets ----"
|
echo "---- Generated Gitea app.ini with secrets ----"
|
||||||
|
|
||||||
chown git:git $GITEA_CONF
|
chown $GITEA_USER:$GITEA_USER $GITEA_CONF
|
||||||
chmod 640 $GITEA_CONF
|
chmod 640 $GITEA_CONF
|
||||||
|
|
||||||
systemctl daemon-reload
|
systemctl daemon-reload
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
|
|
||||||
source /opt/gitea/env.sh
|
source /opt/environment/.env
|
||||||
|
|
||||||
sudo -u postgres psql <<EOF
|
sudo -u postgres psql <<EOF
|
||||||
DO \$\$
|
DO \$\$
|
||||||
@@ -16,7 +16,7 @@ END
|
|||||||
\$\$;
|
\$\$;
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
LATEST_BACKUP=$(ls -1 $GITEA_BACKUPS_DIR/gitea-dump-*.zip 2>/dev/null | sort | tail -n1)
|
LATEST_BACKUP=$(ls -1 $SERVICE_BACKUPS_DIR/$SERVICE_BACKUPS_PREFIX-*.$SERVICE_BACKUPS_EXTENSION 2>/dev/null | sort | tail -n1)
|
||||||
|
|
||||||
if [ -n "$LATEST_BACKUP" ] && [ -f "$LATEST_BACKUP" ]; then
|
if [ -n "$LATEST_BACKUP" ] && [ -f "$LATEST_BACKUP" ]; then
|
||||||
TMP_DIR=$(mktemp -d)
|
TMP_DIR=$(mktemp -d)
|
||||||
|
|||||||
@@ -1,9 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Run backup weekly
|
|
||||||
|
|
||||||
[Timer]
|
|
||||||
OnCalendar=Sun *-*-* 01:00:00
|
|
||||||
Persistent=true
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=timers.target
|
|
||||||
@@ -15,6 +15,7 @@ module "vm" {
|
|||||||
|
|
||||||
ssh_public_key = var.ssh_public_key
|
ssh_public_key = var.ssh_public_key
|
||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
|
|
||||||
cloudinit_config = templatefile(
|
cloudinit_config = templatefile(
|
||||||
"${path.module}/cloud-init/service.yaml",
|
"${path.module}/cloud-init/service.yaml",
|
||||||
{
|
{
|
||||||
@@ -22,12 +23,12 @@ module "vm" {
|
|||||||
domain = var.domain
|
domain = var.domain
|
||||||
ssh_key = var.ssh_public_key
|
ssh_key = var.ssh_public_key
|
||||||
proxmox_host_ip = var.proxmox_host_ip
|
proxmox_host_ip = var.proxmox_host_ip
|
||||||
environment-setup-script = indent(6, file("${path.module}/lib/scripts/env.sh"))
|
|
||||||
restore-backup-script = indent(6, file("${path.module}/lib/scripts/restore-backup.sh"))
|
restore-backup-script = indent(6, file("${path.module}/lib/scripts/restore-backup.sh"))
|
||||||
restore-backup-service = indent(6, file("${path.module}/lib/services/restore-backup.service"))
|
restore-backup-service = indent(6, file("${path.module}/lib/services/restore-backup.service"))
|
||||||
create-backup-script = indent(6, file("${path.module}/lib/scripts/create-backup.sh"))
|
create-backup-script = indent(6, file("${path.module}/lib/scripts/create-backup.sh"))
|
||||||
create-backup-service = indent(6, file("${path.module}/lib/services/create-backup.service"))
|
create-backup-service = indent(6, file("${path.module}/lib/services/create-backup.service"))
|
||||||
create-backup-timer = indent(6, file("${path.module}/lib/services/create-backup.timer"))
|
create-backup-timer = indent(6, file("${path.module}/../common/services/create-backup.timer"))
|
||||||
|
|
||||||
install-gitea-script = indent(6, file("${path.module}/lib/scripts/install-gitea.sh"))
|
install-gitea-script = indent(6, file("${path.module}/lib/scripts/install-gitea.sh"))
|
||||||
gitea-service = indent(6, file("${path.module}/lib/services/gitea.service"))
|
gitea-service = indent(6, file("${path.module}/lib/services/gitea.service"))
|
||||||
|
|
||||||
|
|||||||
@@ -1,22 +1,27 @@
|
|||||||
variable "name" {
|
variable "name" {
|
||||||
|
description = "Virtual Machine name"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "vm_id" {
|
variable "vm_id" {
|
||||||
|
description = "Virtual Machine id"
|
||||||
type = number
|
type = number
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "node_name" {
|
variable "node_name" {
|
||||||
|
description = "Proxmox node name"
|
||||||
type = string
|
type = string
|
||||||
default = "mop"
|
default = "mop"
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "cores" {
|
variable "cores" {
|
||||||
|
description = "Number of CPU cores for this virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 2
|
default = 2
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "memory" {
|
variable "memory" {
|
||||||
|
description = "Memory RAM for this virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 2048
|
default = 2048
|
||||||
}
|
}
|
||||||
@@ -28,35 +33,39 @@ variable "balloon" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
variable "template_id" {
|
variable "template_id" {
|
||||||
|
description = "Virtual machine template ID"
|
||||||
type = number
|
type = number
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "ssh_public_key" {
|
variable "ssh_public_key" {
|
||||||
type = string
|
|
||||||
description = "Public SSH key for cloud-init user"
|
description = "Public SSH key for cloud-init user"
|
||||||
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "hostname" {
|
variable "hostname" {
|
||||||
description = "VM hostname"
|
description = "Virtual Machine hostname (<service-name>)"
|
||||||
type = string
|
type = string
|
||||||
default = "test"
|
default = "test"
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "domain" {
|
variable "domain" {
|
||||||
description = "VM domain"
|
description = "Virtual Machine domain (example.fr)"
|
||||||
type = string
|
type = string
|
||||||
default = ""
|
default = ""
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "disk_size" {
|
variable "disk_size" {
|
||||||
|
description = "Disk size for the virtual machine"
|
||||||
type = number
|
type = number
|
||||||
default = 10
|
default = 10
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "proxmox_host_ip" {
|
variable "proxmox_host_ip" {
|
||||||
|
description = "Proxmox host base ip"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "vm_ip_address" {
|
variable "vm_ip_address" {
|
||||||
|
description = "Virtual machine ip"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
@@ -1,4 +1,3 @@
|
|||||||
# testt
|
|
||||||
http:
|
http:
|
||||||
routers:
|
routers:
|
||||||
http-catchall:
|
http-catchall:
|
||||||
|
|||||||
@@ -2,5 +2,3 @@ ssh_public_key = "<ssh-public-key>"
|
|||||||
proxmox_api_token = "<proxmox-api-token>"
|
proxmox_api_token = "<proxmox-api-token>"
|
||||||
proxmox_endpoint = "http://mop:8006"
|
proxmox_endpoint = "http://mop:8006"
|
||||||
proxmox_host_ip = "192.168.1.121"
|
proxmox_host_ip = "192.168.1.121"
|
||||||
gateway_repository = "../gateway"
|
|
||||||
gateway_token = "xxx"
|
|
||||||
10
variables.tf
10
variables.tf
@@ -17,13 +17,3 @@ variable "proxmox_host_ip" {
|
|||||||
description = "Proxmox ip for backup nfs share"
|
description = "Proxmox ip for backup nfs share"
|
||||||
type = string
|
type = string
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "gateway_repository" {
|
|
||||||
description = "Gateway repository relative path (from this terraform repository), for traefik automatic config generation."
|
|
||||||
type = string
|
|
||||||
}
|
|
||||||
|
|
||||||
variable "gateway_token" {
|
|
||||||
description = "Gateway webhook token same in /module/apps/gateway/.env"
|
|
||||||
type = string
|
|
||||||
}
|
|
||||||
Reference in New Issue
Block a user