Add run_migrations function to deploy.sh that automatically applies pending SQL migrations during deployment. Migrations are run after config installation and before service restart. Migration runner: - Sources /etc/silo/silod.env for SILO_DB_PASSWORD - Reads DB host/port/name/user from production config.yaml - Waits for database connectivity (5 retries) - Applies each migration file in order, skipping already-applied ones - Gracefully degrades if psql is missing or DB password is not set This fixes the missing migration 009 (auth tables) that caused: - 'column created_by of relation projects does not exist' - 'relation api_tokens does not exist' Also adds auth environment variables to silod.env.example: - SILO_SESSION_SECRET - SILO_ADMIN_USERNAME / SILO_ADMIN_PASSWORD - SILO_OIDC_CLIENT_SECRET, SILO_LDAP_BIND_PASSWORD
27 lines
798 B
Plaintext
27 lines
798 B
Plaintext
# Silo daemon environment variables
|
|
# Copy to /etc/silo/silod.env and fill in values
|
|
# Permissions: chmod 600 /etc/silo/silod.env
|
|
|
|
# Database credentials (psql.kindred.internal)
|
|
# Database: silo, User: silo
|
|
SILO_DB_PASSWORD=
|
|
|
|
# MinIO credentials (minio.kindred.internal)
|
|
# User: silouser
|
|
SILO_MINIO_ACCESS_KEY=silouser
|
|
SILO_MINIO_SECRET_KEY=
|
|
|
|
# Authentication
|
|
# Session secret (required when auth is enabled)
|
|
SILO_SESSION_SECRET=
|
|
# Default admin account (created on first startup if both are set)
|
|
SILO_ADMIN_USERNAME=admin
|
|
SILO_ADMIN_PASSWORD=
|
|
# OIDC client secret (if using Keycloak)
|
|
# SILO_OIDC_CLIENT_SECRET=
|
|
# LDAP bind password (if using service account for user search)
|
|
# SILO_LDAP_BIND_PASSWORD=
|
|
|
|
# Optional: Override server base URL
|
|
# SILO_SERVER_BASE_URL=http://silo.kindred.internal:8080
|