Merge branch 'master' into feature/488-redis_server
This commit is contained in:
commit
44e23ffa1f
@ -1,30 +1,37 @@
|
|||||||
{
|
{
|
||||||
"id": "akkounts",
|
"id": "akkounts",
|
||||||
"postgresql_username": {
|
"postgresql_username": {
|
||||||
"encrypted_data": "drHBdPcrH3BqlsVfWP/vL5Thok8Uub6JhjuU\n",
|
"encrypted_data": "W+Ia820+uYCAED9LRkQ1ZVe//56GRS5u0HrG\n",
|
||||||
"iv": "n+08nhiHoK4jRVwd\n",
|
"iv": "NpuVENC7C5FCjsEz\n",
|
||||||
"auth_tag": "elB4rx8k+jj34iQepECQNA==\n",
|
"auth_tag": "KbqVv27nTc4qm7kzRWcjUQ==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"postgresql_password": {
|
"postgresql_password": {
|
||||||
"encrypted_data": "Hu8yjpvf3/KY/K3gcbRbEce3OkjSrN91m2lCcePT+A==\n",
|
"encrypted_data": "gPzUikJ3vBhjEzor0ie2341VPLRHNIvGvuD+HBwldw==\n",
|
||||||
"iv": "+GFS35dpYy4zD2pi\n",
|
"iv": "Jsnldm8Bx9IzXMNy\n",
|
||||||
"auth_tag": "jCJQMskBFo9TSr8Uq7BWkw==\n",
|
"auth_tag": "63YXFGVxHn23X+/11qwTSA==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"sentry_dsn": {
|
"sentry_dsn": {
|
||||||
"encrypted_data": "KG8apiKfWa4gWwiz8tFLZywpp7gMp3hLDCREeR/RA6+i6Of7qYRx0YRzYdpE\n8gdaO0EOQZ4PXzVBsiIQy4ijHRt8udo2PNzzZP6h91jdAjw=\n",
|
"encrypted_data": "3aC1Nc+WiJIn+jc4HY4Rb1WAqCqEurbOLXhbah4zSIbVIaNGEKzaoC+IA+qi\nV1jAVxbE0A1w91MrGE6HNa+oMjiTMurYx7JzVBIpCm01rgo=\n",
|
||||||
"iv": "KWU6LeHdE3iwPyBU\n",
|
"iv": "SxEbTBYY2Pa5BzAF\n",
|
||||||
"auth_tag": "7pQO/t8pXiwrlb5xAas+Zg==\n",
|
"auth_tag": "zGkIpM/aeyuNm2F0I3VAcA==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"rails_master_key": {
|
"rails_master_key": {
|
||||||
"encrypted_data": "E4OVlsZgm9wupyi9Xs7iEy11wJrCXL0Qrm9akulW7vmdrEfnI8KC6x1UooM+\nEI1fYmLs\n",
|
"encrypted_data": "cWOeQYNzOjgDNi7ZpkMC/jN7nSPyODYRhA6EIhhihzPxkEDt+/4HGNAhLHGK\nlJiQeRD/\n",
|
||||||
"iv": "YFRMYT8D+bF+iu5+\n",
|
"iv": "Svsvx9gsO9OQs9RV\n",
|
||||||
"auth_tag": "wT7rorNWEKGNR7xQLTe/xg==\n",
|
"auth_tag": "mXVNNo13F6FddhWnri1yHQ==\n",
|
||||||
|
"version": 3,
|
||||||
|
"cipher": "aes-256-gcm"
|
||||||
|
},
|
||||||
|
"discourse_connect_secret": {
|
||||||
|
"encrypted_data": "BQcE5fUkiqJyuOR1dR9vNyxWzgWGX1Wl1WINJDGJ1sJiajrgAspPgDt0dX5L\nhxG8CQ==\n",
|
||||||
|
"iv": "UKpt0F1FODuosQ9u\n",
|
||||||
|
"auth_tag": "MLgv0jR9MhWGmQNUkA8GUQ==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
}
|
}
|
||||||
|
@ -2,6 +2,9 @@
|
|||||||
"name": "production",
|
"name": "production",
|
||||||
"override_attributes": {
|
"override_attributes": {
|
||||||
"akkounts": {
|
"akkounts": {
|
||||||
|
"discourse": {
|
||||||
|
"public_url": "https://community.kosmos.org"
|
||||||
|
},
|
||||||
"lndhub": {
|
"lndhub": {
|
||||||
"public_url": "https://lndhub.kosmos.org",
|
"public_url": "https://lndhub.kosmos.org",
|
||||||
"public_key": "024cd3be18617f39cf645851e3ba63f51fc13f0bb09e3bb25e6fd4de556486d946"
|
"public_key": "024cd3be18617f39cf645851e3ba63f51fc13f0bb09e3bb25e6fd4de556486d946"
|
||||||
|
@ -9,7 +9,7 @@
|
|||||||
"automatic": {
|
"automatic": {
|
||||||
"fqdn": "akkounts-1",
|
"fqdn": "akkounts-1",
|
||||||
"os": "linux",
|
"os": "linux",
|
||||||
"os_version": "5.4.0-100-generic",
|
"os_version": "5.4.0-148-generic",
|
||||||
"hostname": "akkounts-1",
|
"hostname": "akkounts-1",
|
||||||
"ipaddress": "192.168.122.160",
|
"ipaddress": "192.168.122.160",
|
||||||
"roles": [
|
"roles": [
|
||||||
|
@ -36,6 +36,8 @@
|
|||||||
"kosmos_garage::firewall_rpc",
|
"kosmos_garage::firewall_rpc",
|
||||||
"kosmos_garage::nginx_web",
|
"kosmos_garage::nginx_web",
|
||||||
"kosmos_gitea::nginx",
|
"kosmos_gitea::nginx",
|
||||||
|
"kosmos_rsk::nginx_testnet",
|
||||||
|
"kosmos_rsk::nginx_mainnet",
|
||||||
"kosmos_website",
|
"kosmos_website",
|
||||||
"kosmos_website::default",
|
"kosmos_website::default",
|
||||||
"kosmos-akkounts::nginx",
|
"kosmos-akkounts::nginx",
|
||||||
|
@ -22,6 +22,8 @@ default_run_list = %w(
|
|||||||
kosmos_garage::firewall_rpc
|
kosmos_garage::firewall_rpc
|
||||||
kosmos_garage::nginx_web
|
kosmos_garage::nginx_web
|
||||||
kosmos_gitea::nginx
|
kosmos_gitea::nginx
|
||||||
|
kosmos_rsk::nginx_testnet
|
||||||
|
kosmos_rsk::nginx_mainnet
|
||||||
kosmos_website::default
|
kosmos_website::default
|
||||||
kosmos-akkounts::nginx
|
kosmos-akkounts::nginx
|
||||||
kosmos-akkounts::nginx_api
|
kosmos-akkounts::nginx_api
|
||||||
|
@ -9,7 +9,6 @@ default_attributes 'rskj' => {
|
|||||||
|
|
||||||
default_run_list = %w(
|
default_run_list = %w(
|
||||||
kosmos_rsk::rskj
|
kosmos_rsk::rskj
|
||||||
kosmos_rsk::nginx
|
|
||||||
)
|
)
|
||||||
|
|
||||||
env_run_lists(
|
env_run_lists(
|
||||||
|
@ -5,12 +5,14 @@ node.default['akkounts']['domain'] = 'accounts.kosmos.org'
|
|||||||
|
|
||||||
node.default['akkounts_api']['domain'] = 'api.kosmos.org'
|
node.default['akkounts_api']['domain'] = 'api.kosmos.org'
|
||||||
|
|
||||||
node.default['akkounts']['lndhub']['api_url'] = nil
|
|
||||||
node.default['akkounts']['lndhub']['public_url'] = nil
|
|
||||||
node.default['akkounts']['lndhub']['public_key'] = nil
|
|
||||||
node.default['akkounts']['lndhub']['postgres_db'] = 'lndhub'
|
|
||||||
|
|
||||||
node.default['akkounts']['smtp']['from_address'] = 'Kosmos Accounts <accounts@kosmos.org>'
|
node.default['akkounts']['smtp']['from_address'] = 'Kosmos Accounts <accounts@kosmos.org>'
|
||||||
node.default['akkounts']['smtp']['domain'] = 'kosmos.org'
|
node.default['akkounts']['smtp']['domain'] = 'kosmos.org'
|
||||||
node.default['akkounts']['smtp']['auth_method'] = 'plain'
|
node.default['akkounts']['smtp']['auth_method'] = 'plain'
|
||||||
node.default['akkounts']['smtp']['enable_starttls'] = 'auto'
|
node.default['akkounts']['smtp']['enable_starttls'] = 'auto'
|
||||||
|
|
||||||
|
node.default['akkounts']['discourse']['public_url'] = nil
|
||||||
|
|
||||||
|
node.default['akkounts']['lndhub']['api_url'] = nil
|
||||||
|
node.default['akkounts']['lndhub']['public_url'] = nil
|
||||||
|
node.default['akkounts']['lndhub']['public_key'] = nil
|
||||||
|
node.default['akkounts']['lndhub']['postgres_db'] = 'lndhub'
|
||||||
|
@ -60,9 +60,14 @@ env[:sentry_dsn] = credentials["sentry_dsn"]
|
|||||||
if webhooks_allowed_ips.length > 0
|
if webhooks_allowed_ips.length > 0
|
||||||
env[:webhooks_allowed_ips] = webhooks_allowed_ips
|
env[:webhooks_allowed_ips] = webhooks_allowed_ips
|
||||||
end
|
end
|
||||||
|
|
||||||
if btcpay_host
|
if btcpay_host
|
||||||
env[:btcpay_api_url] = "http://#{btcpay_host}:23001/api/v1"
|
env[:btcpay_api_url] = "http://#{btcpay_host}:23001/api/v1"
|
||||||
end
|
end
|
||||||
|
|
||||||
|
env[:discourse_public_url] = node['akkounts']['discourse']['public_url']
|
||||||
|
env[:discourse_connect_secret] = credentials['discourse_connect_secret']
|
||||||
|
|
||||||
if lndhub_host
|
if lndhub_host
|
||||||
node.override["akkounts"]["lndhub"]["api_url"] = "http://#{lndhub_host}:3026"
|
node.override["akkounts"]["lndhub"]["api_url"] = "http://#{lndhub_host}:3026"
|
||||||
env[:lndhub_legacy_api_url] = node["akkounts"]["lndhub"]["api_url"]
|
env[:lndhub_legacy_api_url] = node["akkounts"]["lndhub"]["api_url"]
|
||||||
|
@ -27,6 +27,7 @@ server {
|
|||||||
proxy_buffers 1024 8k;
|
proxy_buffers 1024 8k;
|
||||||
|
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto https;
|
||||||
|
|
||||||
proxy_pass http://_discourse;
|
proxy_pass http://_discourse;
|
||||||
proxy_http_version 1.1;
|
proxy_http_version 1.1;
|
||||||
|
@ -1,2 +1,4 @@
|
|||||||
node.default['rskj']['version'] = '4.2.0~focal'
|
node.default['rskj']['version'] = '4.4.0~focal'
|
||||||
node.default['rskj']['network'] = 'testnet'
|
node.default['rskj']['network'] = 'testnet'
|
||||||
|
|
||||||
|
node.default['rskj']['nginx']['domain'] = nil
|
||||||
|
@ -1,27 +0,0 @@
|
|||||||
#
|
|
||||||
# Cookbook Name:: kosmos_rsk
|
|
||||||
# Recipe:: nginx
|
|
||||||
#
|
|
||||||
|
|
||||||
include_recipe "kosmos-nginx"
|
|
||||||
|
|
||||||
app_name = "rskj"
|
|
||||||
domain = node[app_name]["nginx"]["domain"]
|
|
||||||
|
|
||||||
nginx_certbot_site domain
|
|
||||||
|
|
||||||
template "#{node['nginx']['dir']}/sites-available/#{domain}" do
|
|
||||||
source "nginx_conf_#{app_name}.erb"
|
|
||||||
owner 'www-data'
|
|
||||||
mode 0640
|
|
||||||
variables app_name: app_name,
|
|
||||||
domain: domain,
|
|
||||||
port: "4444",
|
|
||||||
ssl_cert: "/etc/letsencrypt/live/#{domain}/fullchain.pem",
|
|
||||||
ssl_key: "/etc/letsencrypt/live/#{domain}/privkey.pem"
|
|
||||||
notifies :reload, 'service[nginx]', :delayed
|
|
||||||
end
|
|
||||||
|
|
||||||
nginx_site domain do
|
|
||||||
action :enable
|
|
||||||
end
|
|
8
site-cookbooks/kosmos_rsk/recipes/nginx_mainnet.rb
Normal file
8
site-cookbooks/kosmos_rsk/recipes/nginx_mainnet.rb
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
#
|
||||||
|
# Cookbook Name:: kosmos_rsk
|
||||||
|
# Recipe:: nginx_mainnet
|
||||||
|
#
|
||||||
|
|
||||||
|
rskj_nginx_site "mainnet" do
|
||||||
|
domain "rsk.kosmos.org"
|
||||||
|
end
|
8
site-cookbooks/kosmos_rsk/recipes/nginx_testnet.rb
Normal file
8
site-cookbooks/kosmos_rsk/recipes/nginx_testnet.rb
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
#
|
||||||
|
# Cookbook Name:: kosmos_rsk
|
||||||
|
# Recipe:: nginx_testnet
|
||||||
|
#
|
||||||
|
|
||||||
|
rskj_nginx_site "testnet" do
|
||||||
|
domain "rsk-testnet.kosmos.org"
|
||||||
|
end
|
37
site-cookbooks/kosmos_rsk/resources/nginx_site.rb
Normal file
37
site-cookbooks/kosmos_rsk/resources/nginx_site.rb
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
resource_name :rskj_nginx_site
|
||||||
|
provides :rskj_nginx_site
|
||||||
|
|
||||||
|
property :network, String, required: true, name_property: true
|
||||||
|
property :domain, String, required: true
|
||||||
|
|
||||||
|
action :create do
|
||||||
|
include_recipe "kosmos-nginx"
|
||||||
|
|
||||||
|
network = new_resource.network
|
||||||
|
domain = new_resource.domain
|
||||||
|
|
||||||
|
nginx_certbot_site domain
|
||||||
|
|
||||||
|
upstream_hosts = []
|
||||||
|
search(:node, "role:rskj_#{network}").each do |node|
|
||||||
|
upstream_hosts << node["knife_zero"]["host"]
|
||||||
|
end
|
||||||
|
upstream_hosts.push("localhost") if upstream_hosts.empty?
|
||||||
|
|
||||||
|
template "#{node['nginx']['dir']}/sites-available/#{domain}" do
|
||||||
|
source "nginx_conf_rskj.erb"
|
||||||
|
owner 'www-data'
|
||||||
|
mode 0640
|
||||||
|
variables domain: domain,
|
||||||
|
upstream_name: "rskj_#{network}",
|
||||||
|
upstream_hosts: upstream_hosts,
|
||||||
|
upstream_port: "4444",
|
||||||
|
ssl_cert: "/etc/letsencrypt/live/#{domain}/fullchain.pem",
|
||||||
|
ssl_key: "/etc/letsencrypt/live/#{domain}/privkey.pem"
|
||||||
|
notifies :reload, 'service[nginx]', :delayed
|
||||||
|
end
|
||||||
|
|
||||||
|
nginx_site domain do
|
||||||
|
action :enable
|
||||||
|
end
|
||||||
|
end
|
@ -1,23 +1,39 @@
|
|||||||
# Generated by Chef
|
upstream _<%= @upstream_name %> {
|
||||||
<% if File.exist?(@ssl_cert) && File.exist?(@ssl_key) -%>
|
<% @upstream_hosts.each do |host| %>
|
||||||
|
server <%= host %>:<%= @upstream_port %>;
|
||||||
|
<% end %>
|
||||||
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
listen 443 ssl http2;
|
listen 443 ssl http2;
|
||||||
listen [::]:443 ssl http2;
|
listen [::]:443 ssl http2;
|
||||||
add_header Strict-Transport-Security "max-age=15768000";
|
|
||||||
|
|
||||||
ssl_certificate <%= @ssl_cert %>;
|
|
||||||
ssl_certificate_key <%= @ssl_key %>;
|
|
||||||
|
|
||||||
server_name <%= @domain %>;
|
server_name <%= @domain %>;
|
||||||
|
|
||||||
|
add_header Strict-Transport-Security "max-age=15768000";
|
||||||
|
|
||||||
access_log <%= node[:nginx][:log_dir] %>/<%= @domain %>.access.log json;
|
access_log <%= node[:nginx][:log_dir] %>/<%= @domain %>.access.log json;
|
||||||
error_log <%= node[:nginx][:log_dir] %>/<%= @domain %>.error.log warn;
|
error_log <%= node[:nginx][:log_dir] %>/<%= @domain %>.error.log warn;
|
||||||
|
|
||||||
location / {
|
location / {
|
||||||
|
if ($request_method = 'OPTIONS') {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
add_header 'Access-Control-Allow-Methods' 'GET, POST, OPTIONS';
|
||||||
|
add_header 'Access-Control-Allow-Headers' 'DNT,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Range';
|
||||||
|
add_header 'Access-Control-Max-Age' 1209600;
|
||||||
|
add_header 'Content-Type' 'text/plain; charset=utf-8';
|
||||||
|
add_header 'Content-Length' 0;
|
||||||
|
return 204;
|
||||||
|
}
|
||||||
|
|
||||||
|
proxy_set_header Host $http_host;
|
||||||
|
proxy_set_header X-Forwarded-Proto https;
|
||||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
proxy_redirect off;
|
proxy_redirect off;
|
||||||
proxy_pass http://localhost:<%= @port %>;
|
proxy_pass http://_<%= @upstream_name %>;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
ssl_certificate <%= @ssl_cert %>;
|
||||||
|
ssl_certificate_key <%= @ssl_key %>;
|
||||||
}
|
}
|
||||||
<% end -%>
|
|
||||||
|
@ -9,7 +9,7 @@ end
|
|||||||
|
|
||||||
describe package('rskj') do
|
describe package('rskj') do
|
||||||
it { should be_installed }
|
it { should be_installed }
|
||||||
its('version') { should eq '4.2.0~focal' }
|
its('version') { should eq '4.4.0~focal' }
|
||||||
end
|
end
|
||||||
|
|
||||||
describe service('rsk') do
|
describe service('rsk') do
|
||||||
@ -21,3 +21,10 @@ end
|
|||||||
describe port(4444) do
|
describe port(4444) do
|
||||||
it { should be_listening }
|
it { should be_listening }
|
||||||
end
|
end
|
||||||
|
|
||||||
|
describe parse_config_file('/etc/rsk/node.conf', {
|
||||||
|
assignment_regex: /^\s*([^=]*?)\s*=\s*(.*?)\s*$/
|
||||||
|
}) do
|
||||||
|
its(['blockchain.config.name']) { should eq '"testnet"' }
|
||||||
|
its(['database.dir']) { should eq '/var/lib/rsk/database/testnet' }
|
||||||
|
end
|
||||||
|
Loading…
x
Reference in New Issue
Block a user