(doc about adding a new domain to an existing instance is below this page)
Creating a new instance
This document is mainly a memo for not forgetting steps when trying to install a new instance (db + backend + frontend). It barely explains the reasons behind these operations. Reasons have to be found in the project repositories directly, in ops best-practices, or in my head🤷‍♂️. Many of these steps may only apply if you do the same kind of setup as ours (very AWS specific).
Required from others
- the domain name (then adding the domain name and TXT entry for the certificate)
- the supported languages and the default one
- the login-module client id and secret
itemPlatformId
to communicate with tasks- the title on top left (inc. language-specific ones) for the frontend
- whether skills are enabled
SSL / DNS
- create a new certificate in the same region as the load balancer (+ TXT entry in the DNS to validate it)
- create a new DNS entry to the load balancer
Database
Run the following action as a db admin. I suppose the new instance is called “myinstance” (short token to be chosen).
Create the user/database
CREATE USER 'alg-myinstance-backend'@'%' IDENTIFIED BY '...'; # for the backend API
CREATE USER 'alg-myinstance-admin'@'%' IDENTIFIED BY '...'; # for migration and commands
CREATE DATABASE alg_myinstance_prod;
GRANT SELECT, INSERT, UPDATE, DELETE, DROP, CREATE TEMPORARY TABLES ON `alg_myinstance_prod`.* TO `alg-myinstance-backend`@`%`;
GRANT ALL PRIVILEGES ON alg_myinstance_prod.* TO 'alg-myinstance-admin'@'%';
Create the db schema:
If you do not have a running DB, install the schema on the backend and run migration (see “Seeding the database” section of the backend README).
Otherwise, you can copy another instance schema:
mysqldump --no-data --triggers --routines --events --add-drop-trigger --no-create-db --skip-opt -h <HOSTNAME> -u <ADMIN_USER> --protocol=TCP <EXISTING_DB_NAME> -p > db-schema-dump.sql
Search and replace <ADMIN_USER>
as trigger definer, to alg-myinstance-admin
. Remove “@SESSION.SQL_LOG_BIN” and “GLOBAL.GTID_PURGED” lines. Then:
mysql -h <HOSTNAME> -u alg-myinstance-admin --protocol=TCP alg_myinstance_prod -p < db-schema-dump.sql
Creating initial data
Create the default groups
INSERT INTO `groups` (id, name, type, description, is_open, is_public, frozen_membership) values (2, 'TempUsers', 'Base', 'temporary users', 0, 0, 1);
INSERT INTO `groups` (id, name, type, description, is_open, is_public, frozen_membership) values (3, 'AllUsers', 'Base', 'AllUsers', 0, 0, 1);
Create supported languages for items
INSERT INTO languages VALUES ('en', 'English'), ('fr', 'French');
Create the initial item and set it as the root activity for the groups
SET FOREIGN_KEY_CHECKS=0;
INSERT INTO items (id, type, default_language_tag) VALUES (1, 'Chapter', 'en');
SET FOREIGN_KEY_CHECKS=1;
INSERT INTO items_strings (item_id, language_tag, title) VALUES (1, 'en', 'Root chapter (rename me)');
UPDATE `groups` SET root_activity_id = 1 WHERE id IN (2, 3);
INSERT INTO permissions_granted (group_id, item_id, source_group_id, origin, can_view) VALUES (2, 1, 2, 'group_membership', 'content') ;
INSERT INTO permissions_granted (group_id, item_id, source_group_id, origin, can_view) VALUES (3, 1, 3, 'group_membership', 'content') ;
Create the initial skill if enabled
SET FOREIGN_KEY_CHECKS=0;
INSERT INTO items (id, type, default_language_tag) VALUES (2, 'Skill', 'en');
SET FOREIGN_KEY_CHECKS=1;
INSERT INTO items_strings (item_id, language_tag, title) VALUES (2, 'en', 'Root skill (rename me)');
UPDATE `groups` SET root_skill_id = 2 WHERE id IN (2, 3);
INSERT INTO permissions_granted (group_id, item_id, source_group_id, origin, can_view) VALUES (2, 2, 2, 'group_membership', 'content') ;
INSERT INTO permissions_granted (group_id, item_id, source_group_id, origin, can_view) VALUES (3, 2, 3, 'group_membership', 'content') ;
Create an initial “admin” group
INSERT INTO `groups` (id, name, type, is_open, is_public, frozen_membership) VALUES (5, 'Platform admins', 'Other', 0, 0, 0);
INSERT INTO permissions_granted (group_id, item_id, source_group_id, origin, can_view, can_grant_view, can_watch, can_edit, is_owner) VALUES (5, 1, 5, 'group_membership', 'solution', 'solution_with_grant', 'answer_with_grant', 'all_with_grant', 1) ;
INSERT INTO group_managers (group_id, manager_id , can_manage, can_grant_group_access , can_watch_members) VALUES (3, 5, 'memberships_and_group', 1, 1);
If skills are enabled:
INSERT INTO permissions_granted (group_id, item_id, source_group_id, origin, can_view, can_grant_view, can_watch, can_edit, is_owner) VALUES (5, 2, 5, 'group_membership', 'solution', 'solution_with_grant', 'answer_with_grant', 'all_with_grant', 1) ;
Config
Frontend
On AlgoreaConfig, fork an existing frontend branch and change:
- the supported languages in the build config
- in the main config:
itemPlatformId
(for communication with tasks)oauthClientId
(for communication with the login-module)defaultActivityId
:1
if you have followed the steps abovedefaultSkillId
:2
if enabled and using our defaultallUsersGroupId
:3
if using our defaulttitle
andlanguageSpecificTitles
.searchApiUrl
: undefined for nowforumServerUrl
: undefined for now
Backend
On AlgoreaConfig, fork an existing backend branch and change:
Generate a new key pair:
rm *key*
openssl genrsa --out private_key.pem 4096
openssl rsa -in private_key.pem -pubout -out public_key.pem
Then encrypt the private key.
Decrypt the env config and adapt it:
- token platform name
- the login-module id and secret (and possibly url)
- the database name, users and passwords
- empty the propagation end point
Send the public key to the login module manager, and the token platform name if you chose it yourself.
Ops
-
In the ACM (certificate manager), create a new certificate for the new domain with DNS validation.
-
On AlgoreaConfig, add the new deployment environment in the env file. Force redeployment on the “AlgoreaOps” CI (opsbot-deploy*) directly.
-
Deploy the frontend and backend using the slack bot (
deploy frontend|backend <new_env_name> <version>
) -
Create manually the
released
tag on the “*-static-serve” and “server” lambda functions pointing to the deployed version -
re-compute the permissions via the slack bot:
command backend <env> db-recompute
ALB
-
In EC2/LB, create a new target rule for the lambda function, pointing to the
released
tag of the lambdas, enable multi-header on the backend target -
In EC2/ALB:
- add the new certificate
- copy the other rules to match the hosts (frontend and backend)
- depending on the default language you want to redirect the unknown path to, adapt the alias rule
Allow access to assets
If a new domain is used, add it to allowed origin in the response header policy of the CloudFront distribution.
Boostrap permissions on a first user
Once your first user has signed in, add him as a manager of group 5
:
INSERT INTO group_managers (group_id, manager_id, can_manage, can_grant_group_access, can_watch_members) VALUES (5,<new_user_group_id>,'memberships_and_group',1,1);
(find the the group_id
of the user using SELECT group_id, login FROM users WHERE temp_user = 0;
)
Then, the user can add himself (using the webapp) as the member of the group, which will give him access to manage content.
Propagation end-point
In the ops repository, in src/backend-propagation
, run sls deploy --stage pbl --aws-profile algorea
to deploy the propagation end-point.
Update the “ALGOREA_SERVER__PROPAGATION_ENDPOINT” in the backend config with the end-point url.
Forum
To setup the forum, first, in the ops repository:
- create a directory in
envionments/forum
based on the existing ones - refer it in the
environments/deployments.yaml
file
That should create the forum. Then copy the wss
url to the frontend config.
Search
TODO