14 KiB
NODE.DC current infra handoff
Last updated: 2026-05-15.
This document is the fast context entrypoint for a new engineering chat. Read it first before touching deploy, Synology, Authentik, Launcher, or Tasker.
Product shape
NODE.DC is intentionally modular. It is not a single monorepo with all products merged into one codebase.
Source-of-truth repositories:
| Module | Responsibility | Local source |
|---|---|---|
| Platform | Infra, Authentik, reverse proxy, Synology deploy scripts, architecture docs | /Users/dcconstructions/Downloads/mnt/NODEDC/platform |
| Launcher / Hub | NODE.DC control plane, user/admin UI, access requests, access matrix, Authentik sync | /Users/dcconstructions/Downloads/mnt/data/nodedc_launcher |
| Tasker / Operational Core | Plane fork, tasks/workspaces/projects, standalone-capable product module | /Users/dcconstructions/Downloads/mnt/data/dc_taskmanager/NODEDC_TASKMANAGER |
| Ops Agents Gateway | Standalone MCP/API router for Tasker operational agents | /Users/dcconstructions/Downloads/mnt/data/NODEDC_TASKMANAGER_CODEXAPI |
Current Git branches:
- Platform:
main - Launcher:
main - Tasker:
master - Ops Agents Gateway:
main
The modules communicate through HTTP/OIDC/internal APIs. They must remain independently buildable and deployable.
Ownership boundaries
Do not collapse data into one shared database.
| Area | Owner | Runtime state |
|---|---|---|
| Identity, SSO, OIDC providers | Authentik | Authentik PostgreSQL volume in nodedc-platform |
| Clients, users, groups, Launcher access matrix | Launcher | Launcher JSON/runtime storage under /volume1/docker/nodedc-platform/launcher |
| Workspaces, projects, issues, comments, files | Tasker | Tasker PostgreSQL + MinIO/RabbitMQ/Redis volumes under nodedc-tasker |
Launcher can project access into Tasker, but it must not become the owner of Tasker domain tables. Tasker can run standalone if NODE.DC integration env vars are disabled or pointed elsewhere.
Synology topology
Current NAS root:
/volume1/docker/nodedc-platform
Mounted on macOS as:
/Volumes/docker/nodedc-platform
Public domains:
https://id.nodedc.ru -> Authentik
https://hub.nodedc.ru -> Launcher / Hub
https://ops.nodedc.ru -> Tasker / Operational Core
https://ops-agents.nodedc.ru -> Ops Agents Gateway / MCP endpoint
Local/NAS check domains used during rollout:
auth.nas.nodedc
launcher.nas.nodedc
task.nas.nodedc
auth.local.nodedc
launcher.local.nodedc
task.local.nodedc
Platform compose project
Compose project:
nodedc-platform
Compose file:
/volume1/docker/nodedc-platform/platform/docker-compose.platform-http.yml
Source copy:
/Users/dcconstructions/Downloads/mnt/NODEDC/platform/infra/synology/docker-compose.platform-http.yml
Main services:
reverse-proxy: Caddy HTTP edge, publishes host port18080.launcher:nodedc/launcher:local, serves Hub on container port5173.postgresql-authentik: Authentik PostgreSQL.authentik-server: Authentik web/server.authentik-worker: Authentik worker.
Main Docker volumes:
authentik-databaseauthentik-dataauthentik-certscaddy-datacaddy-config
Launcher bind-mounted runtime state:
/volume1/docker/nodedc-platform/launcher/server-storage -> /app/server/storage
/volume1/docker/nodedc-platform/launcher/uploads -> /app/dist/storage/uploads
/volume1/docker/nodedc-platform/launcher/uploads -> /app/public/storage/uploads
These directories must be writable by container user node / UID 1000.
Tasker compose project
Compose project:
nodedc-tasker
NAS runtime/deploy directory:
/volume1/docker/nodedc-platform/tasker/plane-app
NAS source/deploy copy:
/volume1/docker/nodedc-platform/tasker/plane-src
Repository source:
/Users/dcconstructions/Downloads/mnt/data/dc_taskmanager/NODEDC_TASKMANAGER/plane-src
Repository compose/runtime template:
/Users/dcconstructions/Downloads/mnt/data/dc_taskmanager/NODEDC_TASKMANAGER/plane-app/docker-compose.yaml
Main services:
web: Tasker frontend, imagenodedc/plane-frontend:ru.admin: Tasker admin frontend, imagenodedc/plane-admin:ru.space: public/space frontend, imagenodedc/plane-space:ru.live: live server, imagenodedc/plane-live:local.api: backend API, imagenodedc/plane-backend:local.worker,beat-worker,migrator: backend workers/migrations.plane-db: PostgreSQL.plane-redis: Valkey/Redis.plane-mq: RabbitMQ.plane-minio: uploads/files.proxy: Tasker edge proxy, publishesLISTEN_HTTP_PORT/ current NAS port18090.
Main Docker volumes under the nodedc-tasker project:
nodedc-tasker_pgdatanodedc-tasker_redisdatanodedc-tasker_rabbitmq_datanodedc-tasker_uploads- log and proxy volumes from
plane-app/docker-compose.yaml
NAS-only runtime files currently exist and are intentionally not committed with secrets:
/volume1/docker/nodedc-platform/tasker/plane-app/.env.synology
/volume1/docker/nodedc-platform/tasker/plane-app/docker-compose.synology.override.yml
The current override only adds extra_hosts entries so Tasker backend containers can resolve id.nodedc.ru, hub.nodedc.ru, ops.nodedc.ru, local domains, NAS domains, and host.docker.internal through host-gateway.
Ops Agents Gateway compose project
Compose project:
nodedc-ops-agents
Recommended NAS runtime/deploy directory:
/volume1/docker/nodedc-platform/ops-agents
Repository source:
/Users/dcconstructions/Downloads/mnt/data/NODEDC_TASKMANAGER_CODEXAPI
Public entrypoint:
https://ops-agents.nodedc.ru
Synology reverse proxy should route:
HTTPS ops-agents.nodedc.ru:443 -> HTTP 172.22.0.222:18190
Do not use host port 18090 for this module: 18090 is the Tasker proxy port. Gateway container port remains 4100; host bind/port are controlled by HOST_BIND=172.22.0.222 and HOST_PORT=18190.
Main services:
agent-gateway: NODE.DC Operational Agents Gateway, image built from source by compose.postgres: Gateway-owned PostgreSQL database for agents, grants, tokens, idempotency, and audit.
Deployment checklist:
/Users/dcconstructions/Downloads/mnt/data/NODEDC_TASKMANAGER_CODEXAPI/docs/SYNOLOGY_DEPLOY.md
Deploy model
NAS is a deploy target and runtime state holder. It is not the source of truth for code.
Normal direction:
Git repo -> build image / sync deploy files -> Synology compose recreate selected service
Do not edit NAS copies as the long-term fix. If an emergency live edit is made on NAS, port it back into the relevant repo before continuing product work.
Platform / Launcher deploy
From macOS with /Volumes/docker mounted:
cd /Users/dcconstructions/Downloads/mnt/NODEDC/platform
NAS_ROOT=/Volumes/docker/nodedc-platform \
LAUNCHER_REPO=/Users/dcconstructions/Downloads/mnt/data/nodedc_launcher \
TASKER_REPO=/Users/dcconstructions/Downloads/mnt/data/dc_taskmanager/NODEDC_TASKMANAGER \
TASKER_CHANGED_BASE=533f8c6 \
GATEWAY_REPO=/Users/dcconstructions/Downloads/mnt/data/NODEDC_TASKMANAGER_CODEXAPI \
./infra/synology/deploy-current.sh
The script syncs platform deploy files plus optional Launcher, Tasker, and Ops Agents Gateway source copies. It prints the Docker commands that must be run on Synology, because Docker there requires interactive sudo.
Tasker full source sync over SMB is intentionally not the default. Use TASKER_CHANGED_BASE=<commit> for normal deploys, or TASKER_SYNC_SOURCE=1 only when a full source refresh is required.
The script does not overwrite live secret files:
/volume1/docker/nodedc-platform/platform/.env.synology
/volume1/docker/nodedc-platform/tasker/plane-app/.env.synology
/volume1/docker/nodedc-platform/ops-agents/.env
Launcher image build is done from the Launcher repo when frontend/backend code changes:
cd /volume1/docker/nodedc-platform/launcher/source
sudo /usr/local/bin/docker build --no-cache -t nodedc/launcher:local .
Launcher container recreate:
cd /volume1/docker/nodedc-platform/platform
sudo /usr/local/bin/docker compose \
--env-file /volume1/docker/nodedc-platform/platform/.env.synology \
-f /volume1/docker/nodedc-platform/platform/docker-compose.platform-http.yml \
up -d --force-recreate --no-deps launcher
Tasker deploy
Tasker rebuild script is in the Tasker repo and copied to NAS:
/Users/dcconstructions/Downloads/mnt/data/dc_taskmanager/NODEDC_TASKMANAGER/plane-src/rebuild-nas-legacy.sh
Production-style frontend rebuild on NAS:
cd /volume1/docker/nodedc-platform/tasker/plane-src
BUILD_BACKEND=0 BUILD_WEB=1 BUILD_ADMIN=0 sh rebuild-nas-legacy.sh
Admin frontend rebuild:
cd /volume1/docker/nodedc-platform/tasker/plane-src
BUILD_BACKEND=0 BUILD_WEB=0 BUILD_ADMIN=1 sh rebuild-nas-legacy.sh
Combined web/admin rebuild:
cd /volume1/docker/nodedc-platform/tasker/plane-src
BUILD_BACKEND=0 BUILD_WEB=1 BUILD_ADMIN=1 sh rebuild-nas-legacy.sh
The script defaults production frontend links to:
VITE_NODEDC_LAUNCHER_URL=https://hub.nodedc.ru
Local/staging can override:
VITE_NODEDC_LAUNCHER_URL=http://launcher.local.nodedc \
BUILD_BACKEND=0 BUILD_WEB=1 BUILD_ADMIN=0 \
sh rebuild-nas-legacy.sh
Manual recreate command used on NAS:
cd /volume1/docker/nodedc-platform/tasker/plane-app
sudo /usr/local/bin/docker compose -p nodedc-tasker \
--env-file .env.synology \
-f docker-compose.yaml \
-f docker-compose.synology.override.yml \
up -d --no-build --force-recreate web
Replace web with admin, api, or another service only when that service image was intentionally rebuilt.
Tasker backend must receive the Gateway internal URL/token before Codex/Ops Agent UI can create agents in production:
PLANE_NODEDC_AGENT_GATEWAY_URL=http://172.22.0.222:18190
PLANE_NODEDC_AGENT_GATEWAY_TOKEN=<same value as NODEDC_AGENT_GATEWAY_INTERNAL_TOKEN>
After changing these env vars, rebuild/recreate Tasker backend services: api, worker, beat-worker, and migrator when migrations are expected.
Ops Agents Gateway deploy
From the Gateway repo on Synology or from a synced source copy:
cd /volume1/docker/nodedc-platform/ops-agents
sudo /usr/local/bin/docker compose --env-file .env -f docker-compose.synology.yml up -d --build
Required Synology .env values are documented in:
/Users/dcconstructions/Downloads/mnt/data/NODEDC_TASKMANAGER_CODEXAPI/docs/SYNOLOGY_DEPLOY.md
Minimum checks:
curl -fsS http://172.22.0.222:18190/healthz
curl -fsS http://172.22.0.222:18190/readyz
curl -fsS -i https://ops-agents.nodedc.ru/mcp | head
Backup rules
Platform backup script:
cd /Users/dcconstructions/Downloads/mnt/NODEDC/platform
NAS_ROOT=/Volumes/docker/nodedc-platform ./infra/synology/backup-current.sh
It creates filesystem backups and generates a Synology-side Authentik database dump command.
Tasker safety:
- Frontend-only Tasker rebuilds do not touch Tasker PostgreSQL or MinIO uploads.
- Backend image rebuild is not enough to lose data by itself, but backend migrations can change DB schema.
- Before backend migrations, backup
nodedc-tasker_pgdataandnodedc-tasker_uploads. - Never run destructive volume commands on NAS production data.
Hard rules:
Never run docker compose down -v on production/staging data.
Never delete nodedc-tasker_* volumes without a verified backup.
Never use docker system prune blindly on the NAS.
Never commit .env.synology or real secrets.
Local development model
The same codebase must support local and production-like runs. Differences must come from env vars and build args, not branches with hardcoded production URLs.
Local target domains:
127.0.0.1 auth.local.nodedc
127.0.0.1 launcher.local.nodedc
127.0.0.1 task.local.nodedc
Platform local docs:
/Users/dcconstructions/Downloads/mnt/NODEDC/platform/docs/DEPLOYMENT_LOCAL.md
/Users/dcconstructions/Downloads/mnt/NODEDC/platform/infra/README.md
Tasker local/prod integration env contract:
/Users/dcconstructions/Downloads/mnt/data/dc_taskmanager/NODEDC_TASKMANAGER/docs_prod/NODEDC_TASKER_DEPLOY_MODEL.md
Useful local Tasker frontend build checks:
cd /Users/dcconstructions/Downloads/mnt/data/dc_taskmanager/NODEDC_TASKMANAGER/plane-src
pnpm turbo run build --filter=web
pnpm turbo run build --filter=admin
Known current validation note: admin typecheck passes. Full web typecheck currently has pre-existing upstream/local Plane TypeScript debt unrelated to the NODE.DC logo/deploy baseline work.
Current docs map
Read these in order:
- This file:
/Users/dcconstructions/Downloads/mnt/NODEDC/platform/docs/CURRENT_INFRA_HANDOFF.md - Architecture:
/Users/dcconstructions/Downloads/mnt/NODEDC/platform/docs/ARCHITECTURE.md - Synology deploy:
/Users/dcconstructions/Downloads/mnt/NODEDC/platform/infra/synology/README.md - Local deploy:
/Users/dcconstructions/Downloads/mnt/NODEDC/platform/docs/DEPLOYMENT_LOCAL.md - Tasker deploy model:
/Users/dcconstructions/Downloads/mnt/data/dc_taskmanager/NODEDC_TASKMANAGER/docs_prod/NODEDC_TASKER_DEPLOY_MODEL.md - Ops Agents Gateway deploy:
/Users/dcconstructions/Downloads/mnt/data/NODEDC_TASKMANAGER_CODEXAPI/docs/SYNOLOGY_DEPLOY.md
New-chat bootstrap prompt
Use this when starting a new engineering chat:
We are working on NODE.DC. First read:
/Users/dcconstructions/Downloads/mnt/NODEDC/platform/docs/CURRENT_INFRA_HANDOFF.md
Respect the modular architecture:
- Platform repo owns infra/Synology/Auth/reverse-proxy docs and scripts.
- Launcher repo owns Hub/control-plane.
- Tasker repo owns Plane fork and must remain standalone-capable.
- Ops Agents Gateway repo owns MCP/API routing for external operational agents.
- NAS is deploy target/runtime state, not source of truth.
- Do not touch production volumes destructively.
- Do not commit secrets or .env.synology.
Known follow-up hardening
- Add a sanitized committed Tasker
docker-compose.synology.override.example.yml. - Add a Tasker volume backup script equivalent to Platform
backup-current.sh. - Add an Ops Agents Gateway backup script for its Postgres volume/dump.
- Add a single smoke-check script for public domains:
id.nodedc.ru,hub.nodedc.ru,ops.nodedc.ru,ops-agents.nodedc.ru. - Decide whether release tags should be coordinated across the three repos after stable production milestones.