WIP
parent
780e4d1717
commit
5f66209f33
|
|
@ -1,4 +1,7 @@
|
||||||
plugins { id("com.diffplug.spotless") version "6.22.0" }
|
plugins {
|
||||||
|
id("com.diffplug.spotless") version "6.22.0"
|
||||||
|
id("maven-publish")
|
||||||
|
}
|
||||||
|
|
||||||
repositories { mavenCentral() }
|
repositories { mavenCentral() }
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -10,7 +10,9 @@ plugins {
|
||||||
|
|
||||||
repositories {
|
repositories {
|
||||||
// Use Maven Central for resolving dependencies.
|
// Use Maven Central for resolving dependencies.
|
||||||
mavenCentral()
|
maven {
|
||||||
|
url = uri("https://mvn.demo.rattermeyer.de/releases")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
dependencies {
|
dependencies {
|
||||||
|
|
|
||||||
|
|
@ -9,10 +9,15 @@ Lets say it is `192.168.1.151` then the URLs for accessing the services are:
|
||||||
|===
|
|===
|
||||||
|Service | URL | User / Pwd
|
|Service | URL | User / Pwd
|
||||||
|
|
||||||
| git | https://git.demo.rattermeyer.de.nip.io[] |
|
| Traefik Dashboard | http://traefik.demorattermeyer.de[] |
|
||||||
| woodpecker | https://ci.demo.rattermeyer.de.nip.io[] |
|
| git | https://git.demo.rattermeyer.de[] |
|
||||||
| Traefik Dashboard | http://traefik.demorattermeyer.de.nip.io[] |
|
| woodpecker | https://ci.demo.rattermeyer.de[] |
|
||||||
|
|
| mvn ui | https://mvn-ui.demo.rattermeyer.de[] |
|
||||||
|
| mvn (repo) | http://mvn.rattermeyer.de[] |
|
||||||
|
| Mail | https://mail.demo.rattermeyer.de[] |
|
||||||
|
| Docker Registry | https://container.demo.rattermeyer.de[] |
|
||||||
|
| Docker Registry UI | https://container-ui.demo.rattermeyer.de[] |
|
||||||
|
| NPM Registry / proxy | https://npm.demo.rattermeyer.de[] |
|
||||||
|===
|
|===
|
||||||
|
|
||||||
First start forgejo using:
|
First start forgejo using:
|
||||||
|
|
@ -25,13 +30,13 @@ E.g., fjadmin / admin123 / fjadmin@rattermeyer.de
|
||||||
|
|
||||||
Setup > Applications > oauth2 apps
|
Setup > Applications > oauth2 apps
|
||||||
|
|
||||||
woodpecker / https://ci.demo.rattermeyer.de.nip.io/authorize
|
woodpecker / https://ci.demo.rattermeyer.de/authorize
|
||||||
|
|
||||||
note client-id and client-secret and enter this in .env for.
|
note client-id and client-secret and enter this in .env for.
|
||||||
|
|
||||||
Now you can start everything using `docker compose up -d`.
|
Now you can start everything using `docker compose up -d`.
|
||||||
|
|
||||||
== Chaning IP
|
== Changing IP
|
||||||
|
|
||||||
If the IP address of your computer changes, you have to update some configuration.
|
If the IP address of your computer changes, you have to update some configuration.
|
||||||
|
|
||||||
|
|
@ -43,7 +48,7 @@ If the IP address of your computer changes, you have to update some configuratio
|
||||||
|
|
||||||
== Check access to woodpecker
|
== Check access to woodpecker
|
||||||
|
|
||||||
Access https://ci.demo.rattermeyer.de.nip.io and try to login.
|
Access https://ci.demo.rattermeyer.de and try to login.
|
||||||
|
|
||||||
|
|
||||||
== Create and push a repository
|
== Create and push a repository
|
||||||
|
|
@ -56,7 +61,7 @@ You need to disable ssl verification for this remote in your local git directory
|
||||||
|
|
||||||
Then add the repository
|
Then add the repository
|
||||||
|
|
||||||
git remote add origin https://git.demo.rattermeyer.de.nip.io:8543/fjadmin/ci-demo-2.git
|
git remote add origin https://git.demo.rattermeyer.de:8543/fjadmin/ci-demo-2.git
|
||||||
|
|
||||||
and push it
|
and push it
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,278 @@
|
||||||
|
---
|
||||||
|
version: "3.7"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
woodpecker:
|
||||||
|
forgejo:
|
||||||
|
sonarqube:
|
||||||
|
proxy:
|
||||||
|
driver: bridge
|
||||||
|
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
forgejo:
|
||||||
|
postgres:
|
||||||
|
woodpecker:
|
||||||
|
traefik_config:
|
||||||
|
traefik_certs:
|
||||||
|
traefik_logs:
|
||||||
|
traefik_acme:
|
||||||
|
registry:
|
||||||
|
artifacts_data:
|
||||||
|
verdaccio_data:
|
||||||
|
verdaccio_config:
|
||||||
|
verdaccio_plugins:
|
||||||
|
sonarqube_data:
|
||||||
|
sonarqube_logs:
|
||||||
|
|
||||||
|
services:
|
||||||
|
traefik:
|
||||||
|
image: traefik:v2.10.5
|
||||||
|
container_name: traefik
|
||||||
|
restart: always
|
||||||
|
# using network mode host allows traefik access to all "docker networks"
|
||||||
|
# otherwise traefik needs to be part of any network defined
|
||||||
|
network_mode: host
|
||||||
|
command:
|
||||||
|
- "--certificatesresolvers.letsencrypt.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory"
|
||||||
|
- "--certificatesresolvers.letsencrypt.acme.email=richard.attermeyer@gmail.com"
|
||||||
|
volumes:
|
||||||
|
- "/var/run/docker.sock:/var/run/docker.sock:ro"
|
||||||
|
- "./traefik/traefik.yml:/etc/traefik/traefik.yml:ro"
|
||||||
|
- "traefik_certs:/etc/certs"
|
||||||
|
- "traefik_logs:/var/log/traefik"
|
||||||
|
- "traefik_acme:/etc/acme"
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.dashboard.rule=Host(`${TRAEFIK_HOST}`)"
|
||||||
|
- "traefik.http.routers.dashboard.tls=true"
|
||||||
|
- "traefik.http.routers.dashboard.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.dashboard.entrypoints=https"
|
||||||
|
- "traefik.http.routers.dashboard.service=api@internal"
|
||||||
|
- "traefik.http.services.dashboard.loadbalancer.server.port=8080"
|
||||||
|
- "traefik.http.middlewares.local-ipwhitelist.ipwhitelist.sourcerange=${TRAEIFK_LOCALIP_WHITELIST}"
|
||||||
|
|
||||||
|
smtp:
|
||||||
|
image: "maildev/maildev:2.1.0"
|
||||||
|
networks:
|
||||||
|
- proxy
|
||||||
|
ports:
|
||||||
|
- "1025:1025"
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.mail.rule=Host(`${MAIL_HOST}`)"
|
||||||
|
- "traefik.http.routers.mail.tls=true"
|
||||||
|
- "traefik.http.routers.mail.entrypoints=https"
|
||||||
|
- "traefik.http.services.mail.loadbalancer.server.port=1080"
|
||||||
|
|
||||||
|
forgejo:
|
||||||
|
image: codeberg.org/forgejo/forgejo:1.20
|
||||||
|
container_name: forgejo
|
||||||
|
environment:
|
||||||
|
- USER_UID=1000
|
||||||
|
- USER_GID=1000
|
||||||
|
- FORGEJO__database__DB_TYPE=postgres
|
||||||
|
- FORGEJO__database__HOST=db:5432
|
||||||
|
- FORGEJO__database__NAME=forgejo
|
||||||
|
- FORGEJO__database__USER=forgejo_admin
|
||||||
|
- FORGEJO__database__PASSWD=forgejo_admin
|
||||||
|
- FORGEJO__database__SCHEMA=forgejo
|
||||||
|
- FORGEJO__server__ROOT_URL=${FORGEJO_URL}
|
||||||
|
- FORGEJO__webhook__SKIP_TLS_VERIFY=true
|
||||||
|
- FORGEJO__webhook__ALLOWED_HOST_LIST=external,*
|
||||||
|
- FORGEJO__webhook__DELIVER_TIMEOUT=20
|
||||||
|
- FORGEJO__mailer__SMTP_ADDR=smtp
|
||||||
|
- FORGEJO__mailer__SMTP_PORT=1025
|
||||||
|
- FORGEJO__mailer__SMTP_ENABLED=true
|
||||||
|
- FORGEJO__server__LFS_START_SERVER=true
|
||||||
|
- FORGEJO__CRON__ENABLED=true
|
||||||
|
- FORGEJO__service__DISABLE_REGISTRATION=true
|
||||||
|
restart: always
|
||||||
|
ports:
|
||||||
|
- "3000:3000"
|
||||||
|
networks:
|
||||||
|
- forgejo
|
||||||
|
- proxy
|
||||||
|
volumes:
|
||||||
|
- forgejo:/data
|
||||||
|
- /etc/timezone:/etc/timezone:ro
|
||||||
|
- /etc/localtime:/etc/localtime:ro
|
||||||
|
depends_on:
|
||||||
|
- db
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.forgejo.rule=Host(`${FORGEJO_HOST}`)"
|
||||||
|
- "traefik.http.routers.forgejo.entrypoints=https"
|
||||||
|
- "traefik.http.routers.forgejo.tls=true"
|
||||||
|
- "traefik.http.routers.forgejo.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.services.forgejo.loadbalancer.server.port=3000"
|
||||||
|
- "traefik.tcp.routers.forgejo-ssh.rule=HostSNI(`*`)"
|
||||||
|
- "traefik.tcp.routers.forgejo-ssh.entrypoints=ssh"
|
||||||
|
- "traefik.tcp.routers.forgejo-ssh.service=gitea-ssh-svc"
|
||||||
|
- "traefik.tcp.services.forgejo-ssh-svc.loadbalancer.server.port=22"
|
||||||
|
|
||||||
|
db:
|
||||||
|
image: postgres:16
|
||||||
|
restart: always
|
||||||
|
environment:
|
||||||
|
- POSTGRES_PASSWORD=changeme
|
||||||
|
- POSTGRESQL_POSTGRES_PASSWORD=changeme
|
||||||
|
- PGPASSWORD=changeme
|
||||||
|
- POSTGRESQL_PASSWORD=changeme
|
||||||
|
- POSTGRESQL_MULTIPLE_DATABASES=forgejo,sonarqube
|
||||||
|
networks:
|
||||||
|
- forgejo
|
||||||
|
- sonarqube
|
||||||
|
volumes:
|
||||||
|
- postgres:/var/lib/postgresql/data
|
||||||
|
- "./postgresql/initdb.d:/docker-entrypoint-initdb.d:Z"
|
||||||
|
|
||||||
|
woodpecker-server:
|
||||||
|
image: woodpeckerci/woodpecker-server:v1.0.5
|
||||||
|
container_name: woodpecker-server
|
||||||
|
restart: unless-stopped
|
||||||
|
cpus: 0.5
|
||||||
|
mem_limit: 512m
|
||||||
|
networks:
|
||||||
|
- woodpecker
|
||||||
|
- proxy
|
||||||
|
environment:
|
||||||
|
- "WOODPECKER_OPEN=true"
|
||||||
|
- "WOODPECKER_HOST=${WOODPECKER_URL}"
|
||||||
|
- "WOODPECKER_AGENT_SECRET=${WOODPECKER_AGENT_SECRET}"
|
||||||
|
- "WOODPECKER_ADMIN=${WOODPECKER_ADMIN}"
|
||||||
|
- "WOODPECKER_GITEA=true"
|
||||||
|
- "WOODPECKER_GITEA_URL=${WOODPECKER_FORGEJO_URL}"
|
||||||
|
- "WOODPECKER_GITEA_CLIENT=${WOODPECKER_FORGEJO_CLIENT}"
|
||||||
|
- "WOODPECKER_GITEA_SECRET=${WOODPECKER_FORGEJO_SECRET}"
|
||||||
|
- "WOODPECKER_GITEA_SKIP_VERIFY=true"
|
||||||
|
- "WOODPECKER_LIMIT_MEM=2147483648"
|
||||||
|
- "WOODPECKER_LIMIT_MEM_SWAP=2147483648"
|
||||||
|
volumes:
|
||||||
|
- "woodpecker:/var/lib/woodpecker"
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.woodpecker.rule=Host(`${WOODPECKER_HOST}`)"
|
||||||
|
- "traefik.http.routers.woodpecker.tls=true"
|
||||||
|
- "traefik.http.routers.woodpecker.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.woodpecker.entrypoints=https"
|
||||||
|
- "traefik.http.services.woodpecker.loadbalancer.server.port=8000"
|
||||||
|
|
||||||
|
woodpecker-agent:
|
||||||
|
container_name: woodpecker-agent
|
||||||
|
image: woodpeckerci/woodpecker-agent:v1.0.5
|
||||||
|
restart: unless-stopped
|
||||||
|
cpus: 0.5
|
||||||
|
mem_limit: 512m
|
||||||
|
depends_on:
|
||||||
|
- woodpecker-server
|
||||||
|
networks:
|
||||||
|
- woodpecker
|
||||||
|
environment:
|
||||||
|
- "WOODPECKER_SERVER=woodpecker-server:9000"
|
||||||
|
- "WOODPECKER_AGENT_SECRET=${WOODPECKER_AGENT_SECRET}"
|
||||||
|
- "WOODPECKER_MAX_WORKFLOWS=2"
|
||||||
|
volumes:
|
||||||
|
- "/var/run/docker.sock:/var/run/docker.sock"
|
||||||
|
|
||||||
|
registry:
|
||||||
|
image: registry:2
|
||||||
|
container_name: registry
|
||||||
|
networks:
|
||||||
|
- proxy
|
||||||
|
environment:
|
||||||
|
- REGISTRY_STORAGE_DELETE_ENABLED=true
|
||||||
|
volumes:
|
||||||
|
- registry:/var/lib/registry
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.registry.rule=Host(`${REGISTRY_HOST}`)"
|
||||||
|
- "traefik.http.routers.registry.tls=true"
|
||||||
|
- "traefik.http.routers.registry.middlewares=local-ipwhitelist"
|
||||||
|
- "traefik.http.routers.registry.entrypoints=https"
|
||||||
|
- "traefik.http.services.registry.loadbalancer.server.port=5000"
|
||||||
|
ui:
|
||||||
|
image: joxit/docker-registry-ui:latest
|
||||||
|
environment:
|
||||||
|
- DELETE_IMAGES=true
|
||||||
|
- REGISTRY_TITLE=My Private Docker Registry
|
||||||
|
- NGINX_PROXY_PASS_URL=http://registry:5000
|
||||||
|
- SINGLE_REGISTRY=true
|
||||||
|
depends_on: ['registry']
|
||||||
|
networks:
|
||||||
|
- proxy
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.regui.rule=Host(`${REGISTRY_UI_HOST}`)"
|
||||||
|
- "traefik.http.routers.regui.tls=true"
|
||||||
|
- "traefik.http.routers.regui.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.regui.entrypoints=https"
|
||||||
|
- "traefik.http.services.regui.loadbalancer.passhostheader=true"
|
||||||
|
mvn-registry:
|
||||||
|
image: ghcr.io/dzikoysk/reposilite:3.5.0
|
||||||
|
container_name: reposilite
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: ${REPOSILITE_MEMORY}
|
||||||
|
networks:
|
||||||
|
- proxy
|
||||||
|
volumes:
|
||||||
|
- artifacts_data:/app/data
|
||||||
|
stdin_open: true
|
||||||
|
environment:
|
||||||
|
- JAVA_OPTS=-Xmx${REPOSILITE_MEMORY} ${REPOSILITE_JAVA_COMPOSE_OPTS}
|
||||||
|
- REPOSILITE_OPTS=--port ${REPOSILITE_PORT} ${REPOSILITE_COMPOSE_OPTS}
|
||||||
|
tty: true
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.mvn.rule=Host(`${REPOSILITE_HOST}`)"
|
||||||
|
- "traefik.http.routers.mvn.tls=true"
|
||||||
|
- "traefik.http.routers.mvn.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.mvn.entrypoints=https"
|
||||||
|
|
||||||
|
verdaccio:
|
||||||
|
image: verdaccio/verdaccio:5
|
||||||
|
container_name: verdaccio
|
||||||
|
volumes:
|
||||||
|
- verdaccio_data:/verdaccio/storage
|
||||||
|
- verdaccio_config:/verdaccio/conf
|
||||||
|
- verdaccio_plugins:/verdaccio/plugins
|
||||||
|
ports:
|
||||||
|
- "4873:4873"
|
||||||
|
networks:
|
||||||
|
- proxy
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.npm.rule=Host(`${VERDACCIO_HOST}`)"
|
||||||
|
- "traefik.http.routers.npm.entrypoints=http"
|
||||||
|
- "traefik.http.services.npm.loadbalancer.server.port=4873"
|
||||||
|
|
||||||
|
sonarqube:
|
||||||
|
image: demo/sonarqube:9.9-custom
|
||||||
|
build:
|
||||||
|
context: ./sonarqube
|
||||||
|
volumes:
|
||||||
|
- 'sonarqube_data:/opt/sonarqube/data'
|
||||||
|
- 'sonarqube_logs:/opt/sonarqube/logs'
|
||||||
|
depends_on:
|
||||||
|
- db
|
||||||
|
networks:
|
||||||
|
- sonarqube
|
||||||
|
environment:
|
||||||
|
# ALLOW_EMPTY_PASSWORD is recommended only for development.
|
||||||
|
- ALLOW_EMPTY_PASSWORD=yes
|
||||||
|
- SONAR_JDBC_URL=jdbc:postgresql://db:5432/sonarqube
|
||||||
|
- SONAR_JDBC_USERNAME=sonarqube_admin
|
||||||
|
- SONAR_JDBC_PASSWORD=sonarqube_admin
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.sonarqube.rule=Host(`${SONARQUBE_HOST}`)"
|
||||||
|
- "traefik.http.routers.sonarqube.tls=true"
|
||||||
|
- "traefik.http.routers.sonarqube.tls.certresolver=letsencrypt"
|
||||||
|
- "traefik.http.routers.sonarqube.entrypoints=https"
|
||||||
|
#
|
||||||
|
# watchtower:
|
||||||
|
# image: containrrr/watchtower:latest
|
||||||
|
# volumes:
|
||||||
|
# - /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
|
@ -47,7 +47,7 @@ services:
|
||||||
- "traefik.http.routers.dashboard.entrypoints=https"
|
- "traefik.http.routers.dashboard.entrypoints=https"
|
||||||
- "traefik.http.routers.dashboard.service=api@internal"
|
- "traefik.http.routers.dashboard.service=api@internal"
|
||||||
- "traefik.http.services.dashboard.loadbalancer.server.port=8080"
|
- "traefik.http.services.dashboard.loadbalancer.server.port=8080"
|
||||||
- "traefik.http.middlewares.local-ipwhitelist.ipwhitelist.sourcerange=127.0.0.1/32, 192.168.0.0/16, 172.16.0.0/12, ::1"
|
- "traefik.http.middlewares.local-ipwhitelist.ipwhitelist.sourcerange=${TRAEIFK_LOCALIP_WHITELIST}"
|
||||||
|
|
||||||
smtp:
|
smtp:
|
||||||
image: "maildev/maildev:2.1.0"
|
image: "maildev/maildev:2.1.0"
|
||||||
|
|
@ -180,6 +180,7 @@ services:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.registry.rule=Host(`${REGISTRY_HOST}`)"
|
- "traefik.http.routers.registry.rule=Host(`${REGISTRY_HOST}`)"
|
||||||
- "traefik.http.routers.registry.tls=true"
|
- "traefik.http.routers.registry.tls=true"
|
||||||
|
- "traefik.http.routers.registry.middlewares=local-ipwhitelist"
|
||||||
- "traefik.http.routers.registry.entrypoints=https"
|
- "traefik.http.routers.registry.entrypoints=https"
|
||||||
- "traefik.http.services.registry.loadbalancer.server.port=5000"
|
- "traefik.http.services.registry.loadbalancer.server.port=5000"
|
||||||
ui:
|
ui:
|
||||||
|
|
@ -218,15 +219,9 @@ services:
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.mvn.rule=Host(`${REPOSILITE_HOST}`)"
|
- "traefik.http.routers.mvn.rule=Host(`${REPOSILITE_HOST}`)"
|
||||||
- "traefik.http.routers.mvn.entrypoints=http"
|
- "traefik.http.routers.mvn.tls=true"
|
||||||
- "traefik.http.routers.mvn.service=mvn"
|
- "traefik.http.routers.mvn.tls.certresolver=letsencrypt"
|
||||||
- "traefik.http.routers.mvn.middlewares=local-ipwhitelist"
|
- "traefik.http.routers.mvn.entrypoints=https"
|
||||||
- "traefik.http.services.mvn.loadbalancer.server.port=${REPOSILITE_PORT}"
|
|
||||||
- "traefik.http.routers.mvnui.rule=Host(`${REPOSILITE_UI_HOST}`)"
|
|
||||||
- "traefik.http.routers.mvnui.entrypoints=https"
|
|
||||||
- "traefik.http.routers.mvnui.tls=true"
|
|
||||||
- "traefik.http.routers.mvnui.service=mvn"
|
|
||||||
- "traefik.http.services.mvnui.loadbalancer.server.port=${REPOSILITE_PORT}"
|
|
||||||
|
|
||||||
verdaccio:
|
verdaccio:
|
||||||
image: verdaccio/verdaccio:5
|
image: verdaccio/verdaccio:5
|
||||||
|
|
@ -0,0 +1,48 @@
|
||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
function create_user_and_database() {
|
||||||
|
local database=$1
|
||||||
|
echo " Creating user and database '$database'"
|
||||||
|
psql -v ON_ERROR_STOP=1 --username postgres <<EOSQL
|
||||||
|
CREATE USER $database PASSWORD '$database';
|
||||||
|
CREATE USER ${database}_admin WITH PASSWORD '${database}_admin';
|
||||||
|
ALTER USER ${database}_admin WITH CREATEROLE;
|
||||||
|
CREATE DATABASE $database;
|
||||||
|
ALTER DATABASE $database OWNER TO ${database}_admin
|
||||||
|
EOSQL
|
||||||
|
|
||||||
|
psql -v ON_ERROR_STOP=1 --username postgres -d "$database" <<EOSQL
|
||||||
|
CREATE SCHEMA ${database};
|
||||||
|
ALTER SCHEMA ${database} OWNER TO ${database}_admin;
|
||||||
|
GRANT USAGE ON SCHEMA ${database} TO ${database};
|
||||||
|
|
||||||
|
GRANT ALL ON SCHEMA ${database} TO ${database}_admin;
|
||||||
|
|
||||||
|
GRANT select,insert,update,delete ON ALL TABLES IN SCHEMA ${database} TO ${database};
|
||||||
|
ALTER DEFAULT PRIVILEGES FOR USER ${database}_admin IN SCHEMA ${database} GRANT select,insert,update,delete ON TABLES TO ${database};
|
||||||
|
|
||||||
|
GRANT select,usage ON ALL SEQUENCES IN SCHEMA ${database} to ${database};
|
||||||
|
ALTER DEFAULT PRIVILEGES FOR USER ${database}_admin IN SCHEMA ${database} GRANT select,usage ON SEQUENCES TO ${database};
|
||||||
|
|
||||||
|
GRANT execute ON ALL FUNCTIONS IN SCHEMA ${database} to ${database};
|
||||||
|
ALTER DEFAULT PRIVILEGES FOR user ${database}_admin IN SCHEMA ${database} GRANT execute ON FUNCTIONS TO ${database};
|
||||||
|
ALTER DEFAULT PRIVILEGES FOR user ${database}_admin IN SCHEMA ${database} GRANT execute ON FUNCTIONS TO ${database};
|
||||||
|
|
||||||
|
-- extensions must be created by superuser
|
||||||
|
-- therefore we cannot create them as part of the application setup process
|
||||||
|
CREATE EXTENSION IF NOT EXISTS pgcrypto WITH SCHEMA ${database};
|
||||||
|
CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA ${database};
|
||||||
|
|
||||||
|
EOSQL
|
||||||
|
}
|
||||||
|
|
||||||
|
if [ -n "$POSTGRESQL_MULTIPLE_DATABASES" ]; then
|
||||||
|
echo "Multiple database creation requested: $POSTGRESQL_MULTIPLE_DATABASES"
|
||||||
|
for db in $(echo "$POSTGRESQL_MULTIPLE_DATABASES" | tr ',' ' '); do
|
||||||
|
create_user_and_database "$db"
|
||||||
|
done
|
||||||
|
echo "Multiple databases created"
|
||||||
|
fi
|
||||||
|
|
@ -0,0 +1,6 @@
|
||||||
|
FROM sonarqube:9.9-community
|
||||||
|
ARG COMMUNITY_BRANCH_VERSION=1.14.0
|
||||||
|
ENV COMMUNITY_BRANCH_URL=https://github.com/mc1arke/sonarqube-community-branch-plugin/releases/download/${COMMUNITY_BRANCH_VERSION}/sonarqube-community-branch-plugin-${COMMUNITY_BRANCH_VERSION}.jar
|
||||||
|
WORKDIR ${SONARQUBE_HOME}/extensions
|
||||||
|
RUN wget ${COMMUNITY_BRANCH_URL}
|
||||||
|
WORKDIR ${SONARQUBE_HOME}
|
||||||
|
|
@ -0,0 +1,16 @@
|
||||||
|
---
|
||||||
|
storage: ./storage
|
||||||
|
auth:
|
||||||
|
htpasswd:
|
||||||
|
file: ./htpasswd
|
||||||
|
uplinks:
|
||||||
|
npmjs:
|
||||||
|
url: https://registry.npmjs.org/
|
||||||
|
packages:
|
||||||
|
'@*/*':
|
||||||
|
access: $all
|
||||||
|
publish: $authenticated
|
||||||
|
proxy: npmjs
|
||||||
|
'**':
|
||||||
|
proxy: npmjs
|
||||||
|
log: {type: stdout, format: pretty, level: http}
|
||||||
|
|
@ -2,6 +2,42 @@
|
||||||
* This file was generated by the Gradle 'init' task.
|
* This file was generated by the Gradle 'init' task.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
plugins { id("com.opitzconsulting.demo.ci.java-library-conventions") }
|
plugins {
|
||||||
|
id("com.opitzconsulting.demo.ci.java-library-conventions")
|
||||||
|
`maven-publish`
|
||||||
|
id("org.springframework.boot") version "3.2.0"
|
||||||
|
id("io.spring.dependency-management") version "1.1.4"
|
||||||
|
}
|
||||||
|
|
||||||
dependencies { api(project(":list")) }
|
repositories {
|
||||||
|
maven {
|
||||||
|
url = uri("https://mvn.demo.rattermeyer.de")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
publishing {
|
||||||
|
repositories {
|
||||||
|
maven {
|
||||||
|
name = "mvnRepository"
|
||||||
|
url = uri("https://mvn.demo.rattermeyer.de/releases")
|
||||||
|
isAllowInsecureProtocol = true
|
||||||
|
credentials(PasswordCredentials::class)
|
||||||
|
authentication {
|
||||||
|
create<BasicAuthentication>("basic")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
publications {
|
||||||
|
create<MavenPublication>("maven") {
|
||||||
|
groupId = "com.example"
|
||||||
|
artifactId = "utils-library"
|
||||||
|
version = "1.0.0"
|
||||||
|
from(components["java"])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
dependencies {
|
||||||
|
implementation("org.springframework.boot:spring-boot-starter")
|
||||||
|
api(project(":list")) }
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue