Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Public sandbox #1012

Open
gabestein opened this issue Mar 3, 2025 · 4 comments
Open

Public sandbox #1012

gabestein opened this issue Mar 3, 2025 · 4 comments
Assignees

Comments

@gabestein
Copy link
Member

gabestein commented Mar 3, 2025

Motivation

So potential users can see what we've been up to and decide whether or not to adopt Platform!!

Requirements

  • Allows people to login to PubPub as a community admin (but not superadmin).
  • Seeded with two "user-safe" community examples

Acceptance Criteria

  • Uses a branch preview for "main"
  • Is reset on every merge!!!!!
  • Does not allow users to send real emails via email actions
  • Maybe also does not allow users to send real requests via HTTP action
@tefkah
Copy link
Member

tefkah commented Mar 10, 2025

We could indeed likely use the pull-preview on main for this.
We should probably set it to reset more quickly though, maybe every few hours?

Questions:

  • What constitutes a "user-safe" community? are we concerned they can run something nefarious? (emails are something to think of)
  • How do we force a reset more often? Maybe have a cron-job run an ssh command docker-compose exec platform-migrations "pnpm --filter reset"? We can run cron-jobs through github actions, but we would need to know the ip of the main preview. We could maybe set this in a repo secret/variable, which gets set once the main preview is deployed.
  • How do we have different set of communities for this community vs others? Some env var we set during deploy in the preview action?

@3mcd 3mcd added the 1-day label Mar 10, 2025
@kalilsn
Copy link
Member

kalilsn commented Mar 10, 2025

I think we need to prevent emails from being sent and users from using the http action in the sandbox env. For the emails, we could just expose inbucket, but we'll also need to make sure they can't configure a custom SMTP server once #1028 is done.

How do we force a reset more often?

Maybe we could do this with our jobs service?

@gabestein
Copy link
Member Author

Nice, added. I also think we should probably prevent the HTTP action from actually sending requests. Maybe it always runs in test mode?

@gabestein
Copy link
Member Author

For now, prevent actions from being run

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Development

No branches or pull requests

4 participants