Complete sign-up pipeline: email registration via Logto Experience API, SMTP email verification, and self-service trial tenant creation. Layer 1 — Logto config: - Bootstrap Phase 8b: SMTP email connector with branded HTML templates - Bootstrap Phase 8c: enable SignInAndRegister (email+password sign-up) - Dockerfile installs official Logto connectors (ensures SMTP available) - SMTP env vars in docker-compose, installer templates, .env.example Layer 2 — Experience API (ui/sign-in/experience-api.ts): - Registration flow: initRegistration → sendVerificationCode → verifyCode → addProfile (password) → identifyUser → submit - Sign-in auto-detects email vs username identifier Layer 3 — Custom sign-in UI (ui/sign-in/SignInPage.tsx): - Three-mode state machine: signIn / register / verifyCode - Reads first_screen=register from URL query params - Toggle links between sign-in and register views Layer 4 — Post-registration onboarding: - OnboardingService: reuses VendorTenantService.createAndProvision(), adds calling user to Logto org as owner, enforces one trial per user - OnboardingController: POST /api/onboarding/tenant (authenticated only) - OnboardingPage.tsx: org name + auto-slug form - LandingRedirect: detects zero orgs → redirects to /onboarding - RegisterPage.tsx: /platform/register initiates OIDC with firstScreen Installers (install.sh + install.ps1): - Both prompt for SMTP config in SaaS mode - CLI args, env var capture, cameleer.conf persistence Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
126 lines
6.5 KiB
YAML
126 lines
6.5 KiB
YAML
# Cameleer SaaS — Logto + management plane
|
|
# Loaded in SaaS deployment mode
|
|
|
|
services:
|
|
cameleer-logto:
|
|
image: ${LOGTO_IMAGE:-gitea.siegeln.net/cameleer/cameleer-logto}:${VERSION:-latest}
|
|
restart: unless-stopped
|
|
depends_on:
|
|
cameleer-postgres:
|
|
condition: service_healthy
|
|
environment:
|
|
DB_URL: postgres://${POSTGRES_USER:-cameleer}:${POSTGRES_PASSWORD}@cameleer-postgres:5432/logto
|
|
ENDPOINT: ${PUBLIC_PROTOCOL:-https}://${AUTH_HOST:-localhost}
|
|
ADMIN_ENDPOINT: ${PUBLIC_PROTOCOL:-https}://${AUTH_HOST:-localhost}:${LOGTO_CONSOLE_PORT:-3002}
|
|
TRUST_PROXY_HEADER: 1
|
|
NODE_TLS_REJECT_UNAUTHORIZED: "${NODE_TLS_REJECT:-0}"
|
|
LOGTO_ENDPOINT: http://cameleer-logto:3001
|
|
LOGTO_ADMIN_ENDPOINT: http://cameleer-logto:3002
|
|
LOGTO_PUBLIC_ENDPOINT: ${PUBLIC_PROTOCOL:-https}://${AUTH_HOST:-localhost}
|
|
PUBLIC_HOST: ${PUBLIC_HOST:-localhost}
|
|
AUTH_HOST: ${AUTH_HOST:-localhost}
|
|
PUBLIC_PROTOCOL: ${PUBLIC_PROTOCOL:-https}
|
|
PG_HOST: cameleer-postgres
|
|
PG_USER: ${POSTGRES_USER:-cameleer}
|
|
PG_PASSWORD: ${POSTGRES_PASSWORD}
|
|
PG_DB_SAAS: cameleer_saas
|
|
SAAS_ADMIN_USER: ${SAAS_ADMIN_USER:-admin}
|
|
SAAS_ADMIN_PASS: ${SAAS_ADMIN_PASS:?SAAS_ADMIN_PASS must be set in .env}
|
|
# SMTP (for email verification during registration)
|
|
SMTP_HOST: ${SMTP_HOST:-}
|
|
SMTP_PORT: ${SMTP_PORT:-587}
|
|
SMTP_USER: ${SMTP_USER:-}
|
|
SMTP_PASS: ${SMTP_PASS:-}
|
|
SMTP_FROM_EMAIL: ${SMTP_FROM_EMAIL:-noreply@cameleer.io}
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "node -e \"require('http').get('http://localhost:3001/oidc/.well-known/openid-configuration', r => process.exit(r.statusCode === 200 ? 0 : 1)).on('error', () => process.exit(1))\" && test -f /data/logto-bootstrap.json"]
|
|
interval: 10s
|
|
timeout: 5s
|
|
retries: 60
|
|
start_period: 30s
|
|
labels:
|
|
- traefik.enable=true
|
|
- "traefik.http.routers.cameleer-logto.rule=Host(`${AUTH_HOST:-localhost}`)"
|
|
- traefik.http.routers.cameleer-logto.entrypoints=websecure
|
|
- traefik.http.routers.cameleer-logto.tls=true
|
|
- traefik.http.routers.cameleer-logto.service=cameleer-logto
|
|
- traefik.http.routers.cameleer-logto.middlewares=cameleer-logto-cors
|
|
- "traefik.http.middlewares.cameleer-logto-cors.headers.accessControlAllowOriginList=${PUBLIC_PROTOCOL:-https}://${AUTH_HOST:-localhost}:${LOGTO_CONSOLE_PORT:-3002}"
|
|
- traefik.http.middlewares.cameleer-logto-cors.headers.accessControlAllowMethods=GET,POST,PUT,PATCH,DELETE,OPTIONS
|
|
- traefik.http.middlewares.cameleer-logto-cors.headers.accessControlAllowHeaders=Authorization,Content-Type
|
|
- traefik.http.middlewares.cameleer-logto-cors.headers.accessControlAllowCredentials=true
|
|
- traefik.http.services.cameleer-logto.loadbalancer.server.port=3001
|
|
- traefik.http.routers.cameleer-logto-console.rule=PathPrefix(`/`)
|
|
- traefik.http.routers.cameleer-logto-console.entrypoints=admin-console
|
|
- traefik.http.routers.cameleer-logto-console.tls=true
|
|
- traefik.http.routers.cameleer-logto-console.service=cameleer-logto-console
|
|
- traefik.http.services.cameleer-logto-console.loadbalancer.server.port=3002
|
|
volumes:
|
|
- cameleer-bootstrapdata:/data
|
|
networks:
|
|
- cameleer
|
|
- monitoring
|
|
|
|
cameleer-saas:
|
|
image: ${CAMELEER_IMAGE:-gitea.siegeln.net/cameleer/cameleer-saas}:${VERSION:-latest}
|
|
restart: unless-stopped
|
|
depends_on:
|
|
cameleer-logto:
|
|
condition: service_healthy
|
|
environment:
|
|
# SaaS database
|
|
SPRING_DATASOURCE_URL: jdbc:postgresql://cameleer-postgres:5432/cameleer_saas
|
|
SPRING_DATASOURCE_USERNAME: ${POSTGRES_USER:-cameleer}
|
|
SPRING_DATASOURCE_PASSWORD: ${POSTGRES_PASSWORD}
|
|
# Identity (Logto)
|
|
CAMELEER_SAAS_IDENTITY_LOGTOENDPOINT: http://cameleer-logto:3001
|
|
CAMELEER_SAAS_IDENTITY_LOGTOPUBLICENDPOINT: ${PUBLIC_PROTOCOL:-https}://${AUTH_HOST:-localhost}
|
|
CAMELEER_SAAS_IDENTITY_AUTHHOST: ${AUTH_HOST:-localhost}
|
|
# Provisioning — passed to per-tenant server containers
|
|
CAMELEER_SAAS_PROVISIONING_PUBLICHOST: ${PUBLIC_HOST:-localhost}
|
|
CAMELEER_SAAS_PROVISIONING_PUBLICPROTOCOL: ${PUBLIC_PROTOCOL:-https}
|
|
CAMELEER_SAAS_PROVISIONING_NETWORKNAME: ${COMPOSE_PROJECT_NAME:-cameleer-saas}_cameleer
|
|
CAMELEER_SAAS_PROVISIONING_TRAEFIKNETWORK: cameleer-traefik
|
|
CAMELEER_SAAS_PROVISIONING_DATASOURCEUSERNAME: ${POSTGRES_USER:-cameleer}
|
|
CAMELEER_SAAS_PROVISIONING_DATASOURCEPASSWORD: ${POSTGRES_PASSWORD}
|
|
CAMELEER_SAAS_PROVISIONING_CLICKHOUSEPASSWORD: ${CLICKHOUSE_PASSWORD}
|
|
CAMELEER_SERVER_SECURITY_JWTSECRET: ${CAMELEER_SERVER_SECURITY_JWTSECRET:?CAMELEER_SERVER_SECURITY_JWTSECRET must be set in .env}
|
|
CAMELEER_SAAS_PROVISIONING_SERVERIMAGE: ${CAMELEER_SAAS_PROVISIONING_SERVERIMAGE:-gitea.siegeln.net/cameleer/cameleer-server:latest}
|
|
CAMELEER_SAAS_PROVISIONING_SERVERUIIMAGE: ${CAMELEER_SAAS_PROVISIONING_SERVERUIIMAGE:-gitea.siegeln.net/cameleer/cameleer-server-ui:latest}
|
|
CAMELEER_SAAS_PROVISIONING_RUNTIMEBASEIMAGE: ${CAMELEER_SAAS_PROVISIONING_RUNTIMEBASEIMAGE:-gitea.siegeln.net/cameleer/cameleer-runtime-base:latest}
|
|
labels:
|
|
- traefik.enable=true
|
|
- traefik.http.routers.saas.rule=PathPrefix(`/platform`)
|
|
- traefik.http.routers.saas.entrypoints=websecure
|
|
- traefik.http.routers.saas.tls=true
|
|
- traefik.http.services.saas.loadbalancer.server.port=8080
|
|
# Root redirect: / → /platform/ (scoped to app host so it doesn't catch auth domain)
|
|
- "traefik.http.routers.saas-root.rule=Host(`${PUBLIC_HOST:-localhost}`) && Path(`/`)"
|
|
- traefik.http.routers.saas-root.priority=100
|
|
- traefik.http.routers.saas-root.entrypoints=websecure
|
|
- traefik.http.routers.saas-root.tls=true
|
|
- traefik.http.routers.saas-root.middlewares=root-to-platform
|
|
- traefik.http.routers.saas-root.service=saas
|
|
- "traefik.http.middlewares.root-to-platform.redirectRegex.regex=^(https?://[^/]+)/?$$"
|
|
- "traefik.http.middlewares.root-to-platform.redirectRegex.replacement=$${1}/platform/"
|
|
- traefik.http.middlewares.root-to-platform.redirectRegex.permanent=false
|
|
- "prometheus.io/scrape=true"
|
|
- "prometheus.io/port=8080"
|
|
- "prometheus.io/path=/platform/actuator/prometheus"
|
|
volumes:
|
|
- cameleer-bootstrapdata:/data/bootstrap:ro
|
|
- cameleer-certs:/certs
|
|
- ${DOCKER_SOCKET:-/var/run/docker.sock}:/var/run/docker.sock
|
|
group_add:
|
|
- "${DOCKER_GID:-0}"
|
|
networks:
|
|
- cameleer
|
|
- monitoring
|
|
|
|
volumes:
|
|
cameleer-bootstrapdata:
|
|
|
|
networks:
|
|
monitoring:
|
|
name: cameleer-monitoring-noop
|