4.7 KiB
4.7 KiB
title, status, type, priority, created_at, updated_at
| title | status | type | priority | created_at | updated_at |
|---|---|---|---|---|---|
| Deployment Strategy | in-progress | epic | normal | 2026-02-09T14:03:53Z | 2026-02-10T08:16:36Z |
Define and implement a deployment strategy for running the nuzlocke-tracker in production on a local Unraid server while keeping laptop/PC as the development environment.
Context
- Components: API (Python/FastAPI), Frontend (Vite/React), PostgreSQL database
- Dev environment: Laptop/PC — continue using the existing
docker-compose.ymlfor local development - Production host: Unraid server running Docker containers
- Networking: LAN-only access, Nginx Proxy Manager already in place on Unraid
- Orchestration: Docker Compose for production (matching dev workflow). Deploy via SSH from the dev machine.
Decided Approach
Docker Compose + SSH + Gitea (source hosting, container registry)
- Gitea runs on Unraid behind Nginx Proxy Manager with SSL (e.g.,
gitea.nerdboden.de). It serves as the self-hosted Git remote and container registry. - Images are built on the dev machine (podman or docker, cross-compiled for linux/amd64) and pushed to Gitea's container registry as user-level packages (e.g.,
gitea.nerdboden.de/thefurya/nuzlocke-tracker-api:latest,gitea.nerdboden.de/thefurya/nuzlocke-tracker-frontend:latest). - Production runs docker compose on Unraid at
/mnt/user/appdata/nuzlocke-tracker/, pulling images from the Gitea container registry instead of mounting source. - A deploy script on the dev machine automates the full flow: build images → push to Gitea registry → SCP compose file to Unraid → generate
.envif missing → SSH to pull images and (re)start containers. - Nginx Proxy Manager handles routing on the LAN (e.g.,
nuzlocke.nerdboden.de→ frontend container,gitea.nerdboden.de→ Gitea). - Database uses a bind mount (
./data/postgres) for persistence on the Unraid disk; migrations run automatically on API container startup.
Branching Strategy
main + develop + feature branches
main— always production-ready. Only receives merges fromdevelopwhen ready to deploy. The deploy script builds frommain.develop— integration branch for day-to-day work. Features are merged here and tested before promoting tomain.feature/*— short-lived branches offdevelopfor individual features/fixes. Merged back intodevelopvia PR or direct merge when complete.
Workflow:
- Create
feature/xyzfromdevelop - Work on the feature, commit, merge into
develop - When ready to deploy: merge
develop→main - Run
./deploy.sh(builds frommain, pushes to Gitea registry, deploys to Unraid via SSH)
Checklist
- Set up branching structure — create
developbranch frommain, establish themain/develop/feature/*workflow - Update CLAUDE.md with branching rules — once the branching structure is in place, add instructions to CLAUDE.md that the branching strategy must be adhered to (always work on feature branches, never commit directly to
main, merge flow isfeature/*→develop→main) - Configure Gitea container registry — create an access token with
read:packageandwrite:packagescopes, verifydocker login gitea.nerdboden.deworks, test pushing and pulling an image as a user-level package - Create production docker-compose file (
docker-compose.prod.yml) — uses images from the Gitea container registry, production env vars, no source volume mounts, proper restart policies - Create production Dockerfiles (or multi-stage builds) — ensure frontend is built and served statically (e.g., via the API or a lightweight nginx container), API runs without debug mode
- Create deploy script —
./deploy.shbuilds images (podman/docker, linux/amd64), pushes to Gitea registry, SCPs compose file, generates.envif needed, pulls and starts containers via SSH - Configure Nginx Proxy Manager — add proxy host entries for Gitea and the nuzlocke-tracker frontend/API on the appropriate ports
- Environment & secrets management — deploy script auto-generates
.envwithPOSTGRES_PASSWORDon Unraid if missing; file lives at/mnt/user/appdata/nuzlocke-tracker/.env - Implement Gitea Actions CI/CD pipeline — set up Gitea Actions runner on Unraid, create CI workflow (lint/test on
develop) and deploy workflow (build/push/deploy onmain); uses GitHub Actions-compatible syntax for portability - Database backup strategy — set up a simple scheduled backup for the PostgreSQL data (e.g., cron +
pg_dumpscript on Unraid) - Document the deployment workflow — README or docs covering how to deploy, redeploy, rollback, and manage the production instance