mirror of
https://github.com/Dokploy/templates.git
synced 2026-05-08 17:48:34 -05:00
[PR #776] Reef chain #1304
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/Dokploy/templates/pull/776
Author: @anukulpandey
Created: 4/8/2026
Status: 🔄 Open
Base:
canary← Head:reef-chain📝 Commits (10+)
50cc1bcfeat: reef chain bootstrapf5949cbfix: missing doc field91653cdfeat: reef rpc41920f4fix: meta72b2109feat: toml changes8869a34fix: var in rpc35bfe1cfeat: minimal rpcbba1445feat: default envsf63563fbootnode toml2971695feat: icon📊 Changes
25 files changed (+1201 additions, -0 deletions)
View changed files
➕
blueprints/reef-bootnode/docker-compose.yml(+48 -0)➕
blueprints/reef-bootnode/reef.svg(+68 -0)➕
blueprints/reef-bootnode/template.toml(+37 -0)➕
blueprints/reef-dev-cluster/docker-compose.yml(+44 -0)➕
blueprints/reef-dev-cluster/reef.svg(+68 -0)➕
blueprints/reef-dev-cluster/template.toml(+63 -0)➕
blueprints/reef-eth-rpc/docker-compose.yml(+13 -0)➕
blueprints/reef-eth-rpc/reef.svg(+68 -0)➕
blueprints/reef-eth-rpc/template.toml(+13 -0)➕
blueprints/reef-faucet/docker-compose.yml(+40 -0)➕
blueprints/reef-faucet/reef.svg(+68 -0)➕
blueprints/reef-faucet/template.toml(+21 -0)➕
blueprints/reef-keygen/docker-compose.yml(+38 -0)➕
blueprints/reef-keygen/reef.svg(+68 -0)➕
blueprints/reef-keygen/template.toml(+11 -0)➕
blueprints/reef-rpc/docker-compose.yml(+39 -0)➕
blueprints/reef-rpc/reef.svg(+68 -0)➕
blueprints/reef-rpc/template.toml(+29 -0)➕
blueprints/reef-spec-gen/docker-compose.yml(+37 -0)➕
blueprints/reef-spec-gen/reef.svg(+68 -0)...and 5 more files
📄 Description
What is this PR about?
New PR of Reef Chain
This PR updates the Reef Chain templates to the new
stable2512deployment flow and switches all runtime-fetched scripts to the dedicated scripts repository:https://github.com/anukulpandey/dokploy-reef-chain-scriptsIncluded changes
reef-bootnodeto fetch bootstrap/runtime scripts from the new scripts reporeef-validatorto fetch the validator startup script from the new scripts reporeef-rpcto fetch the RPC startup script from the new scripts reporeef-spec-gento fetch the spec generator API and helper scripts from the new scripts reporeef-dev-clusterto stop downloading the old Makefile-based workflow and instead use the new non-tmuxcluster launcher script8545inreef-dev-clusterfor bundledeth-rpcreef-faucettemplatemeta.jsonreef-dokploy-templates-v2raw GitHub pathsWhy this change
This aligns the Reef templates with the newer
stable2512chain workflow and centralizes all runtime scripts in a single dedicated repository so Dokploy services fetch a stable, maintained source at startup.Checklist
Before submitting this PR, please make sure that:
Issues related (if applicable)
Close automatically the related issues using the keywords:
closes #ISSUE_NUMBERScreenshots or Videos
N/A
Greptile Summary
This PR updates all Reef Chain templates to the
stable2512workflow, centralizes runtime scripts in a dedicated external repository, and adds a newreef-faucettemplate. Several structural issues conflict with the project's Docker Compose conventions documented in AGENTS.md and need to be addressed before merging:portsinstead of the requiredexpose, missingrestartpolicy, and most lack the requiredversion: \"3.8\"header.reef-spec-genservice is namedreef-spec-api, breaking the mandatory folder-name match and the domain config in itstemplate.toml.template.tomlfiles hardcode the same validator private-key seeds as default values (includingFAUCET_SEED), violating the "never hardcode secrets" rule.mainbranch of an external repo without hash verification, creating a supply-chain risk.Confidence Score: 3/5
Not safe to merge — multiple P1 violations of documented Dokploy conventions, a service naming mismatch that breaks domain routing, hardcoded validator private-key seeds, and unpinned external script downloads creating supply-chain exposure.
Five P1 findings are present: (1) all templates use
portsinstead of the mandatoryexpose, (2) none have arestartpolicy, (3) five templates omitversion: "3.8"and one uses "3.9", (4) thereef-spec-genservice name mismatch will break its domain config, and (5) hardcoded default private-key seeds across four templates violate the no-secrets rule and introduce a real security risk on any default deployment.All
docker-compose.ymlfiles (ports/restart/version),blueprints/reef-spec-gen/docker-compose.yml(service name), and alltemplate.tomlfiles that hardcode seed values (reef-bootnode,reef-dev-cluster,reef-validator,reef-faucet).Vulnerabilities
reef-bootnode,reef-dev-cluster,reef-validator, andreef-faucetall ship the same three validator seeds as defaulttemplate.tomlvalues. A default deployment controls a live chain with publicly-known signing keys and a known faucet treasury key.anukulpandey/dokploy-reef-chain-scriptson themainbranch at startup with no checksum validation. A compromised or modified push to that repo will silently affect all running deployments on next restart.Reviews (1): Last reviewed commit: "Wire Reef templates to external scripts ..." | Re-trigger Greptile
(3/5) Reply to the agent's comments like "Can you suggest a fix for this @greptileai?" or ask follow-up questions!
Context used:
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.