From 35b8a294a4c746eac1845259adb20aced501ae30 Mon Sep 17 00:00:00 2001 From: pedro Date: Fri, 2 Feb 2024 19:36:57 +0100 Subject: [PATCH] deployment for early pilots (first on test pilot) - includes idhub entrypoint relevant refactor - prepare env vars for test pilot --- .env.example | 5 +- docker-compose__pilot-test.yml | 3 +- docker/idhub.entrypoint.sh | 98 +++++++++++++++++++++------------- 3 files changed, 67 insertions(+), 39 deletions(-) diff --git a/.env.example b/.env.example index 47a3257..2624406 100644 --- a/.env.example +++ b/.env.example @@ -9,7 +9,7 @@ MUSICIAN_SECRET_KEY='changeme_v9&&N$Lt9t*5EGwm0w' # specially useful if you want to deploy in a specific domain MUSICIAN_API_BASE_URL='https://orchestra.example.org' -MUSICIAN_ALLOWED_HOSTS='musician.example.org' +MUSICIAN_ALLOWED_HOSTS='127.0.0.1,localhost,musician.example.org' MUSICIAN_DOMAIN='musician.example.org' # DEVICEHUB @@ -93,6 +93,9 @@ IDHUB_EMAIL='admin@example.org' # by default it is set to 'y' to facilitate idhub dev when outside docker IDHUB_SYNC_ORG_DEV='n' +IDHUB_PILOT_TEST__IDHUB_DEPLOYMENT='PILOTS_EARLY' +IDHUB_PILOT_TEST__ADMIN_EMAIL='idhub_admin@example.com' + # AUTHENTIK aka goauthentik #### diff --git a/docker-compose__pilot-test.yml b/docker-compose__pilot-test.yml index 844d343..53e1c26 100644 --- a/docker-compose__pilot-test.yml +++ b/docker-compose__pilot-test.yml @@ -5,7 +5,8 @@ services: init: true image: dkr-dsg.ac.upc.edu/trustchain-oc1-orchestral/idhub:latest environment: - - DEPLOYMENT=${IDHUB_DEPLOYMENT} + - DEPLOYMENT=${IDHUB_PILOT_TEST__IDHUB_DEPLOYMENT} + - ADMIN_EMAIL=${IDHUB_PILOT_TEST__ADMIN_EMAIL} - SECRET_KEY=${IDHUB_SECRET_KEY:-publicsecretisnotsecureVtmKBfxpVV47PpBCF2Nzz2H6qnbd} - ALLOWED_HOSTS=${IDHUB_ALLOWED_HOSTS:-*} - STATIC_ROOT=${IDHUB_STATIC_ROOT:-/static/} diff --git a/docker/idhub.entrypoint.sh b/docker/idhub.entrypoint.sh index 3d26545..09658af 100755 --- a/docker/idhub.entrypoint.sh +++ b/docker/idhub.entrypoint.sh @@ -4,6 +4,64 @@ set -e set -u set -x + +usage() { + cat <&2 + ./manage.py initial_datas + + if [ "${RESPONSE_URI:-}" ]; then + config_oidc4vp + fi + ;; + PROD) + printf "creating superuser \n user: ${DJANGO_SUPERUSER_USERNAME}\n password: ${DJANGO_SUPERUSER_PASSWORD}\n email: ${DJANGO_SUPERUSER_EMAIL}\n" >&2 + ## thanks https://stackoverflow.com/questions/6244382/how-to-automate-createsuperuser-on-django/59467533#59467533 + ./manage.py createsuperuser --no-input + esac + fi +} + _set() { key="${1}" value="${2}" @@ -45,46 +103,12 @@ main() { cd "${idhub_dir}" if [ ! -f "./manage.py" ]; then - cat <&2 - ./manage.py initial_datas - - if [ "${RESPONSE_URI:-}" ]; then - config_oidc4vp - fi - else - printf "creating superuser \n user: ${DJANGO_SUPERUSER_USERNAME}\n password: ${DJANGO_SUPERUSER_PASSWORD}\n email: ${DJANGO_SUPERUSER_EMAIL}\n" >&2 - ## thanks https://stackoverflow.com/questions/6244382/how-to-automate-createsuperuser-on-django/59467533#59467533 - ./manage.py createsuperuser --no-input - fi - fi - - # enable dev flags when DEVELOPMENT deployment - if [ "${DEPLOYMENT}" = 'DEVELOPMENT' ]; then - export DEBUG=True - export DEVELOPMENT=True - fi + inject_env_vars #./manage.py collectstatic