Skip to content

Commit 9f53486

Browse files
authored
Merge pull request #167 from AntonShmigel/sxp/10.3.3.012336.2428
Update 10.3 SXP Sitecore Container Deployment to 10.3.3.012336.2428
2 parents b2b1318 + 95fb79c commit 9f53486

File tree

78 files changed

+608
-100
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

78 files changed

+608
-100
lines changed

compose/sxp/10.3/ltsc2019/upgrade/xm1/compose-init.ps1

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,16 @@ Param (
4848

4949
[string]
5050
$CertDataFolder = ".\traefik\certs",
51-
51+
52+
[string]
53+
$IdFolder = ".\id",
54+
55+
[string]
56+
$SqlServerFolder = ".\mssql",
57+
58+
[string]
59+
$SqlServerCertificatePassword = "Password12345",
60+
5261
[string]
5362
$SpecificVersion
5463
)
@@ -114,7 +123,11 @@ function Create-Certificates{
114123
[string]$Topology,
115124
[string]$CdHost,
116125
[string]$CmHost,
117-
[string]$IdHost
126+
[string]$IdHost,
127+
[string]$IdFolder,
128+
[string]$MsSql,
129+
[string]$MsSqlFolder,
130+
[string]$MsSqlCertPswd
118131
)
119132

120133
Write-Information -MessageData "Starting create certificates for '$Topology' topology..." -InformationAction Continue
@@ -134,7 +147,18 @@ function Create-Certificates{
134147
$rootKey = Create-RSAKey -KeyLength 4096
135148
$rootCertificate = Create-SelfSignedCertificate -Key $rootKey
136149
Create-CertificateFile -Certificate $rootCertificate -OutCertPath "$CertDataFolder\RootCA.crt"
137-
150+
151+
# Copy RootCA.crt into id\cert
152+
Copy-Item "$CertDataFolder\RootCA.crt" -Destination "$IdFolder\certs"
153+
154+
$securePswd = (ConvertTo-SecureString -String $MsSqlCertPswd -Force -AsPlainText)
155+
$signerCertificate = Import-CertificateForSigning -SignerCertificate $rootCertificate -SignerCertificatePassword $securePswd
156+
157+
# Create Sql Server Certificate and Key as PFX file
158+
$msSqlCertPath = [System.IO.Path]::Combine((Get-Location), "$MsSqlFolder\certs\$MsSql.pfx")
159+
$mssqlCertificate = Create-SqlServerCertificate -CommonName $MsSql -DnsName $MsSql -SignerCertificate $signerCertificate
160+
Create-PfxFile -Certificate $mssqlCertificate -OutCertPath $msSqlCertPath -Password $securePswd
161+
138162
# Create Certificate and Key files for each Sitecore role
139163
$dnsNames | ForEach-Object {
140164
$selfSignedKey = Create-RSAKey
@@ -208,7 +232,7 @@ function InstallModule {
208232
Install-Module -Name $ModuleName -RequiredVersion $ModuleVersion -Repository $repository.Name -AllowClobber -AllowPrerelease -Scope CurrentUser -Force -ErrorAction "Stop"
209233
}
210234
$localModulePath = ((Get-Module $ModuleName -ListAvailable) | Where-Object Version -eq $ModuleVersion.Split("-")[0]).Path
211-
Write-Host "Importing '$moduleName' '$ModuleVersion' from '$localModulePath' ..."
235+
Write-Host "Importing '$ModuleName' '$ModuleVersion' from '$localModulePath' ..."
212236
Import-Module -Name $localModulePath
213237
}
214238
finally {
@@ -244,6 +268,7 @@ function Invoke-ComposeInit {
244268
"SQL_SERVER" = $SqlServer
245269
"SQL_USERNAME" = $SqlUserName
246270
"SQL_PASSWORD" = $SqlSaPassword
271+
"SQL_TLS_CERTIFICATE_PASSWORD" = $SqlServerCertificatePassword
247272
"IS_ALWAYS_ENCRYPTED" = $IsAlwaysEncrypted
248273
"PROCESSING_ENGINE_TASKS_DATABASE_USERNAME" = $ProcessingEngineTasksDatabaseUserName
249274
"CD_HOST" = $CdHost
@@ -267,7 +292,7 @@ function Invoke-ComposeInit {
267292
Populate-EnvironmentFile -EnvFilePath $EnvFilePath -EnvVariablesTable $envVariablesTable
268293

269294
# Configure TLS/HTTPS certificates
270-
$RootCertificateCreated = Create-Certificates -CertDataFolder $CertDataFolder -Topology $Topology -CdHost $CdHost -CmHost $CmHost -IdHost $IdHost
295+
$RootCertificateCreated = Create-Certificates -CertDataFolder $CertDataFolder -Topology $Topology -CdHost $CdHost -CmHost $CmHost -IdHost $IdHost -IdFolder $IdFolder -MsSql $SqlServer -MsSqlFolder $SqlServerFolder -MsSqlCertPswd $SqlServerCertificatePassword
271296

272297
# The update for the certs_config.yaml file is if Certificates were created for the custom hostnames.
273298
if ($RootCertificateCreated){

compose/sxp/10.3/ltsc2019/upgrade/xm1/upgrade.env

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,6 @@ SQL_SERVER=
66
SQL_USERNAME=
77
SQL_PASSWORD=
88
DATABASE_UPGRADE_FROM_VERSION=10.2.0
9-
DATABASE_UPGRADE_TO_VERSION=10.3.2
9+
DATABASE_UPGRADE_TO_VERSION=10.3.3
1010
SITECORE_LICENSE=
1111
ISOLATION=default

compose/sxp/10.3/ltsc2019/upgrade/xp1/compose-init.ps1

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,16 @@ Param (
4848

4949
[string]
5050
$CertDataFolder = ".\traefik\certs",
51-
51+
52+
[string]
53+
$IdFolder = ".\id",
54+
55+
[string]
56+
$SqlServerFolder = ".\mssql",
57+
58+
[string]
59+
$SqlServerCertificatePassword = "Password12345",
60+
5261
[string]
5362
$SpecificVersion
5463
)
@@ -114,7 +123,11 @@ function Create-Certificates{
114123
[string]$Topology,
115124
[string]$CdHost,
116125
[string]$CmHost,
117-
[string]$IdHost
126+
[string]$IdHost,
127+
[string]$IdFolder,
128+
[string]$MsSql,
129+
[string]$MsSqlFolder,
130+
[string]$MsSqlCertPswd
118131
)
119132

120133
Write-Information -MessageData "Starting create certificates for '$Topology' topology..." -InformationAction Continue
@@ -134,7 +147,18 @@ function Create-Certificates{
134147
$rootKey = Create-RSAKey -KeyLength 4096
135148
$rootCertificate = Create-SelfSignedCertificate -Key $rootKey
136149
Create-CertificateFile -Certificate $rootCertificate -OutCertPath "$CertDataFolder\RootCA.crt"
137-
150+
151+
# Copy RootCA.crt into id\cert
152+
Copy-Item "$CertDataFolder\RootCA.crt" -Destination "$IdFolder\certs"
153+
154+
$securePswd = (ConvertTo-SecureString -String $MsSqlCertPswd -Force -AsPlainText)
155+
$signerCertificate = Import-CertificateForSigning -SignerCertificate $rootCertificate -SignerCertificatePassword $securePswd
156+
157+
# Create Sql Server Certificate and Key as PFX file
158+
$msSqlCertPath = [System.IO.Path]::Combine((Get-Location), "$MsSqlFolder\certs\$MsSql.pfx")
159+
$mssqlCertificate = Create-SqlServerCertificate -CommonName $MsSql -DnsName $MsSql -SignerCertificate $signerCertificate
160+
Create-PfxFile -Certificate $mssqlCertificate -OutCertPath $msSqlCertPath -Password $securePswd
161+
138162
# Create Certificate and Key files for each Sitecore role
139163
$dnsNames | ForEach-Object {
140164
$selfSignedKey = Create-RSAKey
@@ -208,7 +232,7 @@ function InstallModule {
208232
Install-Module -Name $ModuleName -RequiredVersion $ModuleVersion -Repository $repository.Name -AllowClobber -AllowPrerelease -Scope CurrentUser -Force -ErrorAction "Stop"
209233
}
210234
$localModulePath = ((Get-Module $ModuleName -ListAvailable) | Where-Object Version -eq $ModuleVersion.Split("-")[0]).Path
211-
Write-Host "Importing '$moduleName' '$ModuleVersion' from '$localModulePath' ..."
235+
Write-Host "Importing '$ModuleName' '$ModuleVersion' from '$localModulePath' ..."
212236
Import-Module -Name $localModulePath
213237
}
214238
finally {
@@ -244,6 +268,7 @@ function Invoke-ComposeInit {
244268
"SQL_SERVER" = $SqlServer
245269
"SQL_USERNAME" = $SqlUserName
246270
"SQL_PASSWORD" = $SqlSaPassword
271+
"SQL_TLS_CERTIFICATE_PASSWORD" = $SqlServerCertificatePassword
247272
"IS_ALWAYS_ENCRYPTED" = $IsAlwaysEncrypted
248273
"PROCESSING_ENGINE_TASKS_DATABASE_USERNAME" = $ProcessingEngineTasksDatabaseUserName
249274
"CD_HOST" = $CdHost
@@ -267,7 +292,7 @@ function Invoke-ComposeInit {
267292
Populate-EnvironmentFile -EnvFilePath $EnvFilePath -EnvVariablesTable $envVariablesTable
268293

269294
# Configure TLS/HTTPS certificates
270-
$RootCertificateCreated = Create-Certificates -CertDataFolder $CertDataFolder -Topology $Topology -CdHost $CdHost -CmHost $CmHost -IdHost $IdHost
295+
$RootCertificateCreated = Create-Certificates -CertDataFolder $CertDataFolder -Topology $Topology -CdHost $CdHost -CmHost $CmHost -IdHost $IdHost -IdFolder $IdFolder -MsSql $SqlServer -MsSqlFolder $SqlServerFolder -MsSqlCertPswd $SqlServerCertificatePassword
271296

272297
# The update for the certs_config.yaml file is if Certificates were created for the custom hostnames.
273298
if ($RootCertificateCreated){

compose/sxp/10.3/ltsc2019/upgrade/xp1/upgrade.env

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,6 @@ SQL_PASSWORD=
88
IS_ALWAYS_ENCRYPTED=
99
PROCESSING_ENGINE_TASKS_DATABASE_USERNAME=
1010
DATABASE_UPGRADE_FROM_VERSION=10.2.0
11-
DATABASE_UPGRADE_TO_VERSION=10.3.2
11+
DATABASE_UPGRADE_TO_VERSION=10.3.3
1212
SITECORE_LICENSE=
1313
ISOLATION=default

compose/sxp/10.3/ltsc2019/xm1/.env

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
COMPOSE_PROJECT_NAME=sitecore-xm1
22
SITECORE_DOCKER_REGISTRY=scr.sitecore.com/sxp/
33
SITECORE_VERSION=10.3-ltsc2019
4+
SITECORE_ID_VERSION=8.0-ltsc2019
45
EXTERNAL_IMAGE_TAG_SUFFIX=ltsc2019
56
SITECORE_ADMIN_PASSWORD=
67
SQL_SERVER=mssql
78
SQL_SA_LOGIN=sa
89
SQL_SA_PASSWORD=
910
SQL_DATABASE_PREFIX=Sitecore
1011
SQL_CUSTOM_DATABASE_PREFIX_UPDATE_FROM=
12+
SQL_TLS_CERTIFICATE_PASSWORD=
1113
TELERIK_ENCRYPTION_KEY=
1214
SITECORE_GRAPHQL_ENABLED=false
1315
SITECORE_GRAPHQL_EXPOSEPLAYGROUND=false

compose/sxp/10.3/ltsc2019/xm1/compose-init.ps1

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,16 @@ Param (
4848

4949
[string]
5050
$CertDataFolder = ".\traefik\certs",
51-
51+
52+
[string]
53+
$IdFolder = ".\id",
54+
55+
[string]
56+
$SqlServerFolder = ".\mssql",
57+
58+
[string]
59+
$SqlServerCertificatePassword = "Password12345",
60+
5261
[string]
5362
$SpecificVersion
5463
)
@@ -114,7 +123,11 @@ function Create-Certificates{
114123
[string]$Topology,
115124
[string]$CdHost,
116125
[string]$CmHost,
117-
[string]$IdHost
126+
[string]$IdHost,
127+
[string]$IdFolder,
128+
[string]$MsSql,
129+
[string]$MsSqlFolder,
130+
[string]$MsSqlCertPswd
118131
)
119132

120133
Write-Information -MessageData "Starting create certificates for '$Topology' topology..." -InformationAction Continue
@@ -134,7 +147,18 @@ function Create-Certificates{
134147
$rootKey = Create-RSAKey -KeyLength 4096
135148
$rootCertificate = Create-SelfSignedCertificate -Key $rootKey
136149
Create-CertificateFile -Certificate $rootCertificate -OutCertPath "$CertDataFolder\RootCA.crt"
137-
150+
151+
# Copy RootCA.crt into id\cert
152+
Copy-Item "$CertDataFolder\RootCA.crt" -Destination "$IdFolder\certs"
153+
154+
$securePswd = (ConvertTo-SecureString -String $MsSqlCertPswd -Force -AsPlainText)
155+
$signerCertificate = Import-CertificateForSigning -SignerCertificate $rootCertificate -SignerCertificatePassword $securePswd
156+
157+
# Create Sql Server Certificate and Key as PFX file
158+
$msSqlCertPath = [System.IO.Path]::Combine((Get-Location), "$MsSqlFolder\certs\$MsSql.pfx")
159+
$mssqlCertificate = Create-SqlServerCertificate -CommonName $MsSql -DnsName $MsSql -SignerCertificate $signerCertificate
160+
Create-PfxFile -Certificate $mssqlCertificate -OutCertPath $msSqlCertPath -Password $securePswd
161+
138162
# Create Certificate and Key files for each Sitecore role
139163
$dnsNames | ForEach-Object {
140164
$selfSignedKey = Create-RSAKey
@@ -208,7 +232,7 @@ function InstallModule {
208232
Install-Module -Name $ModuleName -RequiredVersion $ModuleVersion -Repository $repository.Name -AllowClobber -AllowPrerelease -Scope CurrentUser -Force -ErrorAction "Stop"
209233
}
210234
$localModulePath = ((Get-Module $ModuleName -ListAvailable) | Where-Object Version -eq $ModuleVersion.Split("-")[0]).Path
211-
Write-Host "Importing '$moduleName' '$ModuleVersion' from '$localModulePath' ..."
235+
Write-Host "Importing '$ModuleName' '$ModuleVersion' from '$localModulePath' ..."
212236
Import-Module -Name $localModulePath
213237
}
214238
finally {
@@ -244,6 +268,7 @@ function Invoke-ComposeInit {
244268
"SQL_SERVER" = $SqlServer
245269
"SQL_USERNAME" = $SqlUserName
246270
"SQL_PASSWORD" = $SqlSaPassword
271+
"SQL_TLS_CERTIFICATE_PASSWORD" = $SqlServerCertificatePassword
247272
"IS_ALWAYS_ENCRYPTED" = $IsAlwaysEncrypted
248273
"PROCESSING_ENGINE_TASKS_DATABASE_USERNAME" = $ProcessingEngineTasksDatabaseUserName
249274
"CD_HOST" = $CdHost
@@ -267,7 +292,7 @@ function Invoke-ComposeInit {
267292
Populate-EnvironmentFile -EnvFilePath $EnvFilePath -EnvVariablesTable $envVariablesTable
268293

269294
# Configure TLS/HTTPS certificates
270-
$RootCertificateCreated = Create-Certificates -CertDataFolder $CertDataFolder -Topology $Topology -CdHost $CdHost -CmHost $CmHost -IdHost $IdHost
295+
$RootCertificateCreated = Create-Certificates -CertDataFolder $CertDataFolder -Topology $Topology -CdHost $CdHost -CmHost $CmHost -IdHost $IdHost -IdFolder $IdFolder -MsSql $SqlServer -MsSqlFolder $SqlServerFolder -MsSqlCertPswd $SqlServerCertificatePassword
271296

272297
# The update for the certs_config.yaml file is if Certificates were created for the custom hostnames.
273298
if ($RootCertificateCreated){

compose/sxp/10.3/ltsc2019/xm1/docker-compose.yml

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,14 +34,19 @@ services:
3434
isolation: ${ISOLATION}
3535
image: ${SITECORE_DOCKER_REGISTRY}nonproduction/mssql-developer:2019-${EXTERNAL_IMAGE_TAG_SUFFIX}
3636
environment:
37+
NAME: ${SQL_SERVER}
3738
SA_PASSWORD: ${SQL_SA_PASSWORD}
39+
TLS_CERTIFICATE_PASSWORD: ${SQL_TLS_CERTIFICATE_PASSWORD}
3840
ACCEPT_EULA: "Y"
3941
ports:
4042
- "14330:1433"
4143
volumes:
4244
- type: bind
4345
source: .\mssql-data
4446
target: c:\data
47+
- type: bind
48+
source: .\mssql\certs
49+
target: c:\certs
4550
mssql-init:
4651
isolation: ${ISOLATION}
4752
image: ${SITECORE_DOCKER_REGISTRY}sitecore-xm1-mssql-init:${SITECORE_VERSION}
@@ -62,7 +67,7 @@ services:
6267
condition: service_healthy
6368
solr:
6469
isolation: ${ISOLATION}
65-
image: ${SITECORE_DOCKER_REGISTRY}nonproduction/solr:8.11.2-${EXTERNAL_IMAGE_TAG_SUFFIX}
70+
image: ${SITECORE_DOCKER_REGISTRY}nonproduction/solr:9.8.1-${EXTERNAL_IMAGE_TAG_SUFFIX}
6671
ports:
6772
- "8984:8983"
6873
volumes:
@@ -84,9 +89,9 @@ services:
8489
condition: service_healthy
8590
id:
8691
isolation: ${ISOLATION}
87-
image: ${SITECORE_DOCKER_REGISTRY}sitecore-id7:${SITECORE_VERSION}
92+
image: ${SITECORE_DOCKER_REGISTRY}sitecore-identity:${SITECORE_ID_VERSION}
8893
environment:
89-
Sitecore_Sitecore__IdentityServer__SitecoreMemberShipOptions__ConnectionString: Data Source=${SQL_SERVER};Initial Catalog=${SQL_DATABASE_PREFIX}.Core;User ID=${SQL_SA_LOGIN};Password=${SQL_SA_PASSWORD}
94+
Sitecore_Sitecore__IdentityServer__SitecoreMemberShipOptions__ConnectionString: Data Source=${SQL_SERVER};Initial Catalog=${SQL_DATABASE_PREFIX}.Core;User ID=${SQL_SA_LOGIN};Password=${SQL_SA_PASSWORD};Encrypt=true;TrustServerCertificate=false;
9095
Sitecore_Sitecore__IdentityServer__AccountOptions__PasswordRecoveryUrl: https://${CM_HOST}/sitecore/login?rc=1
9196
Sitecore_Sitecore__IdentityServer__Clients__PasswordClient__ClientSecrets__ClientSecret1: ${SITECORE_IDSECRET}
9297
Sitecore_Sitecore__IdentityServer__Clients__DefaultClient__AllowedCorsOrigins__AllowedCorsOriginsGroup1: https://${CM_HOST}
@@ -105,6 +110,10 @@ services:
105110
- "traefik.http.routers.id-secure.entrypoints=websecure"
106111
- "traefik.http.routers.id-secure.rule=Host(`${ID_HOST}`)"
107112
- "traefik.http.routers.id-secure.tls=true"
113+
volumes:
114+
- type: bind
115+
source: .\id\certs
116+
target: c:\certs
108117
cd:
109118
isolation: ${ISOLATION}
110119
image: ${SITECORE_DOCKER_REGISTRY}sitecore-xm1-cd:${SITECORE_VERSION}
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
Add a CA certificate to the trusted root store:
2+
RootCA.crt
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
Add TLS certificates for the mssql service to this folder:
2+
mssql.pfx

compose/sxp/10.3/ltsc2019/xp0/.env

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
COMPOSE_PROJECT_NAME=sitecore-xp0
22
SITECORE_DOCKER_REGISTRY=scr.sitecore.com/sxp/
33
SITECORE_VERSION=10.3-ltsc2019
4+
SITECORE_ID_VERSION=8.0-ltsc2019
45
EXTERNAL_IMAGE_TAG_SUFFIX=ltsc2019
56
SITECORE_ADMIN_PASSWORD=
67
SQL_SERVER=mssql
78
SQL_SA_LOGIN=sa
89
SQL_SA_PASSWORD=
910
SQL_DATABASE_PREFIX=Sitecore
1011
SQL_CUSTOM_DATABASE_PREFIX_UPDATE_FROM=
12+
SQL_TLS_CERTIFICATE_PASSWORD=
1113
TELERIK_ENCRYPTION_KEY=
1214
SITECORE_GRAPHQL_ENABLED=false
1315
SITECORE_GRAPHQL_EXPOSEPLAYGROUND=false

0 commit comments

Comments
 (0)