You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
QUIRREL_API_URL=http://localhost:9181QUIRREL_BASE_URL=http://localhost:3000QUIRREL_ENCRYPTION_SECRET=*** (setting on AWS side as well)# QUIRREL_TOKEN= (setting on AWS side as well)
name: app
type: Load Balanced Web Service
# Distribute traffic to your service.
http:
# Requests to this path will be forwarded to your service.
# To match all requests you can use the "/" path.
path: '/'
healthcheck:
path: '/'
interval: 60s
timeout: 30s
unhealthy_threshold: 5
grace_period: 300s
allowed_source_ips: []
image:
# Docker build arguments. For additional overrides: https://aws.github.io/copilot-cli/docs/manifest/lb-web-service/#image-build
build:
dockerfile: Dockerfile
# Port exposed through your container to route traffic to it.
port: 3000
cpu: 256 # Number of CPU units for the task.
memory: 1024 # Amount of memory in MiB used by the task.
count: 1 # Number of tasks that should be running in your service.
exec: true # Enable running commands in your container.
network:
vpc:
placement: private
secrets:
DATABASE_PASSWORD:
secretsmanager: '${COPILOT_APPLICATION_NAME}/${COPILOT_ENVIRONMENT_NAME}/DatabasePassword:password::'
SESSION_SECRET_KEY:
secretsmanager: '${COPILOT_APPLICATION_NAME}/${COPILOT_ENVIRONMENT_NAME}/SessionSecretKey:sessionSecretKey::'
QUIRREL_TOKEN: /copilot/${COPILOT_APPLICATION_NAME}/${COPILOT_ENVIRONMENT_NAME}/secrets/api/QUIRREL_TOKEN # 二度目の起動のときにサーバーから取得してSystemManagerに設定しておく
QUIRREL_ENCRYPTION_SECRET:
secretsmanager: '${COPILOT_APPLICATION_NAME}/${COPILOT_ENVIRONMENT_NAME}/QuirrelEncryptionSecret:quirrelEncryptionSecret::'
API_TOKEN: /copilot/${COPILOT_APPLICATION_NAME}/${COPILOT_ENVIRONMENT_NAME}/secrets/api/API_TOKEN
variables:
NODE_ENV: production
QUIRREL_API_URL: http://worker.${COPILOT_ENVIRONMENT_NAME}.${COPILOT_APPLICATION_NAME}.local:9181
QUIRREL_BASE_URL: http://app.${COPILOT_ENVIRONMENT_NAME}.${COPILOT_APPLICATION_NAME}.local:3000
environments:
prod:
http:
alias: dx.com
variables:
CLIENT_ORIGIN: https://dx.com
MAIL_FROM_SUPPORT: [email protected]
test:
http:
alias: test.dx.com
variables:
CLIENT_ORIGIN: https://test.dx.com
MAIL_FROM_SUPPORT: [email protected]
woker/manifest.yml
name: worker
type: Backend Service
# Your service does not allow any traffic.
# Configuration for your containers and service.
image:
location: ghcr.io/quirrel-dev/quirrel:sha-5d02551 # Quirrel:The Task Queueing Solution for Serverless.
port: 9181
healthcheck:
command: ['CMD-SHELL', 'curl -f http://localhost:9181 || exit 1']
interval: 10s
retries: 1
timeout: 5s
start_period: 100s
cpu: 256 # Number of CPU units for the task.
memory: 512 # Amount of memory in MiB used by the task.
count: 1 # Number of tasks that should be running in your service.
exec: true # Enable running commands in your container.
network:
vpc:
placement: private
# Optional fields for more advanced use-cases.
#
#variables: # Pass environment variables as key value pairs.
# LOG_LEVEL: info
secrets: # Pass secrets from AWS Systems Manager (SSM) Parameter Store.
PASSPHRASES:
secretsmanager: '${COPILOT_APPLICATION_NAME}/${COPILOT_ENVIRONMENT_NAME}/Passphrases:passphrases::'
woker/addons/quirrel-secrets.yml
Parameters:
App:
Type: String
Description: Your application's name.
Env:
Type: String
Description: The environment name your service, job, or workflow is being deployed to.
Name:
Type: String
Description: The name of the service, job, or workflow being deployed.
Resources:
QuirrelEncryptionSecret:
Type: 'AWS::SecretsManager::Secret'
Properties:
Description: Quirrel Encryption secret created by AWS CloudFormation.
Name: !Sub ${App}/${Env}/QuirrelEncryptionSecret
GenerateSecretString:
SecretStringTemplate: '{}'
GenerateStringKey: quirrelEncryptionSecret
PasswordLength: 32
ExcludePunctuation: Yes
ExcludeUppercase: Yes
QuirrelPassphrasesSecret:
Type: 'AWS::SecretsManager::Secret'
Properties:
Description: Quirrel Passphrases secret created by AWS CloudFormation.
Name: !Sub ${App}/${Env}/Passphrases
GenerateSecretString:
SecretStringTemplate: '{}'
GenerateStringKey: passphrases
PasswordLength: 32
ExcludePunctuation: Yes
ExcludeUppercase: Yes
Expected behavior/code
Quirrel in a.ts triggered
run code inside b.ts and call const file = await readClient.file.findFirst
Environment
Quirrel version:1.9.0(already tried, 1.9.3 and sha-5d02551)
Blitz.js
AWS
AWS copilot
Docker
The text was updated successfully, but these errors were encountered:
Bug Report
Current Behavior
Self-Hosting Quirrel enqueue works fine locally. but on the AWS returns 500 error and CloudWatch shows error logs below.
Input Code
Expected behavior/code
const file = await readClient.file.findFirst
Environment
The text was updated successfully, but these errors were encountered: