feat(#174): bastion Dockerfile and compose file#177
Conversation
|
@witash and @njuguna-n - is it OK to remove these two lines that expose the postgres ports ? for a sane default for production I don't think we want this exposed - I've removed it in this PR.
Thought: Instead of services:
postgres:
ports:
- 5432:5432
pgadmin:
image: dpage/pgadmin4
environment:
PGADMIN_DEFAULT_EMAIL: ${PGADMIN_DEFAULT_EMAIL:-pgadmin4@pgadmin.org}
PGADMIN_DEFAULT_PASSWORD: ${PGADMIN_DEFAULT_PASSWORD:-admin}
PGADMIN_CONFIG_SERVER_MODE: 'False'
ports:
- "${PGADMIN_PORT:-5050}:80" |
|
@njuguna-n or @witash - before I send this PR out for formal review - can you point me toward how I should add tests for the new bastion container? Maybe an existing pattern we have? I'm a test n00b and need a little guidance 🙏 thanks! |
|
Hello @mrjones-plip for this one you are looking at adding e2e tests right? You can have a look at existing e2e tests here for some guidance. |
…and modify 'test:e2e' for CI
|
While ready for review, I think we should wait until #187 is merged. Then I can get all a green CI on this branch - otherwise right now green CI is impossible because of #186 @lorerod and @dianabarsan - if you can't wait, you can have a preliminary look at e2d and new bastion container respectively! Otherwise, feel free to wait until this PR is fully baked. |
|
hmmm - I note cleanup never runs, it just hangs here: Maybe I'm not being patient enough? ! |
…ove version from compose file
lorerod
left a comment
There was a problem hiding this comment.
Thank you @mrjones-plip!
And thanks for also working in the documentation of this change.
There was a problem hiding this comment.
@mrjones-plip Could we explore dynamic secret generation or docker secrets instead? We can do it on a separate PR if you think it is a good idea.
|
🎉 This PR is included in version 1.2.0 🎉 The release is available on GitHub release Your semantic-release bot 📦🚀 |
Description
This PR:
Dockerfileto build a bastion container - based on Alpine3.20docker-compose.bastion.ymlto define a bastion host to allow SSH tunnels to access postgresports:lines from docker file so it doesn't expose the port externally (unless you run pgadmin compose file)POSTGRES_PASSWORD, I think this is still to "insecure by default" so we should silo them off by default insteadports:file to pgadmin compose file for postgres servercloses #174
Code review checklist
License
The software is provided under AGPL-3.0. Contributions to this project are accepted under the same license.