Akshay Gaikwad eb0b7d3ef2 Provision to create new oidc provider with same name that of deleted
When we soft delete oidc provider entry which we are doing for delete
provider API endpoint, we cannot create new oidc provider entry with a
same name due to unique constraint violation on name. Applying unique
constraint to name,trash will allow to create new oidc provider entry
with a same name, but fail on deleting that entry because it violates
unique constraint. Hence this commit adds unique constraint
to (id,name) combined.
2022-05-06 11:31:48 +05:30
2022-04-08 17:42:26 +05:30
2022-03-11 17:28:16 +05:30
2022-02-03 11:04:01 +05:30
2022-03-24 12:42:59 +05:30
2022-04-20 16:29:47 +05:30
2022-04-14 17:03:34 +05:30
2022-04-08 17:42:26 +05:30
2022-04-08 17:42:26 +05:30
2022-03-11 17:24:50 +05:30
2022-04-28 21:35:42 +05:30
2022-03-24 12:42:59 +05:30

Rcloud Base

This repository contains all the rcloud-system components that are the backbone for ztka and gitops.

Prerequisites

You can use the bitnami/charts for postgres and elastic/helm-charts for elasticsearch.

Development setup

Using docker-compose

Run following Docker Compose command to setup all requirements like Postgres db, Kratos etc. for the rcloud-base.

This will start up postgres and elasticsearch as well as kratos and run the kratos migrations. It will also run all the necessary migrations. It also starts up a mail slurper for you to use Kratos.

docker-compose --env-file ./env.example up -d

Start rcloud-base:

go run github.com/RafayLabs/rcloud-base

Manual

Start databases

Postgres
docker run --network host \
    --env POSTGRES_HOST_AUTH_METHOD=trust \
    -v pgdata:/var/lib/postgresql/data \
    -it postgres
Elasticsearch
docker run --network host \
    -v elastic-data:/usr/share/elasticsearch/data \
    -e "discovery.type=single-node" \
    -e "xpack.security.enabled=false" \
    -it docker.elastic.co/elasticsearch/elasticsearch:8.0.0

Create the initial db and user

create database admindb;
CREATE ROLE admindbuser WITH LOGIN PASSWORD '<your_password>';
GRANT ALL PRIVILEGES ON DATABASE admindb to admindbuser;

Ory Kratos

Install Ory Kratos using the installation guide from Kratos documentation.

Perform the Kratos migrations:

export DSN='postgres://<user>:<pass>@<host>:<port>/admindb?sslmode=disable'
kratos -c <kratos-config> migrate sql -e --yes

Start the Ory Kratos server using kratos config provided in _kratos directory.

Run application migrations

We use golang-migrate to perform migrations.

Install golang-migrate
go install -tags 'postgres' github.com/golang-migrate/migrate/v4/cmd/migrate@latest

-tags 'postgres' is important as otherwise it compiles without postgres support

You can refer to the guide for full details.

Run migrations

It is required to perform Kratos migrations before this step.

export POSTGRESQL_URL='postgres://<user>:<pass>@<host>:<port>/admindb?sslmode=disable'
migrate -path ./persistence/migrations/admindb -database "$POSTGRESQL_URL" up

See cli-usage for more info.

Start application

Start rcloud-base:

go run github.com/RafayLabs/rcloud-base
Description
Languages
Go 99.2%
Jsonnet 0.5%
PLpgSQL 0.1%