diff --git a/README.md b/README.md index caa852b..fd87e3e 100644 --- a/README.md +++ b/README.md @@ -40,6 +40,8 @@ All services below are running under Docker, except NSD and Borg. - move Mastodon to pim.kunis.nl - Podman - Replace watchtower with Podman features +- Move nginx static content server to this repo +- Move dataserver to its own repo ### NSD diff --git a/inventory/group_vars/homeserver.yml b/inventory/group_vars/homeserver.yml index 3f33826..3df3da5 100644 --- a/inventory/group_vars/homeserver.yml +++ b/inventory/group_vars/homeserver.yml @@ -6,5 +6,7 @@ jitsi_videobridge_port: 54562 git_ssh_port: 56287 prometheus_port: 8081 traefik_api_port: 8080 +internal_forgejo_port: 3000 # Needed to pull from a repository from another docker container. +internal_matrix_port: 3001 # Needed for proxying through NGINX domain_name_pim: pim.kunis.nl diff --git a/playbooks/all.yml b/playbooks/all.yml index 8add242..05468b3 100644 --- a/playbooks/all.yml +++ b/playbooks/all.yml @@ -16,6 +16,7 @@ - {role: 'static', tags: 'static'} - {role: 'inbucket', tags: 'inbucket'} - {role: 'prometheus', tags: 'prometheus'} + - {role: 'matrix', tags: 'matrix'} - name: Setup dataserver hosts: dataserver roles: diff --git a/roles/forgejo/templates/docker-compose.yml.j2 b/roles/forgejo/templates/docker-compose.yml.j2 index 91ecb6d..921dc80 100644 --- a/roles/forgejo/templates/docker-compose.yml.j2 +++ b/roles/forgejo/templates/docker-compose.yml.j2 @@ -12,6 +12,8 @@ services: - USER_UID=1000 - USER_GID=1000 restart: always + ports: + - "{{ internal_forgejo_port }}:3000" networks: - traefik volumes: diff --git a/roles/matrix/files/matrix.log.config b/roles/matrix/files/matrix.log.config new file mode 100644 index 0000000..e5cc93a --- /dev/null +++ b/roles/matrix/files/matrix.log.config @@ -0,0 +1,32 @@ +version: 1 + +formatters: + precise: + + format: '%(asctime)s - %(name)s - %(lineno)d - %(levelname)s - %(request)s - %(message)s' + + +handlers: + + + console: + class: logging.StreamHandler + formatter: precise + + + +loggers: + synapse.storage.SQL: + # beware: increasing this to DEBUG will make synapse log sensitive + # information such as access tokens. + level: INFO + + +root: + level: INFO + + + handlers: [console] + + +disable_existing_loggers: false \ No newline at end of file diff --git a/roles/matrix/files/matrix.signing.key b/roles/matrix/files/matrix.signing.key new file mode 100644 index 0000000..84cc79b --- /dev/null +++ b/roles/matrix/files/matrix.signing.key @@ -0,0 +1,8 @@ +$ANSIBLE_VAULT;1.1;AES256 +38363633306139626564313833363364653037613238396266303133663231643739373237666662 +6639636136303666353639353632373530326263633264350a616465313137663731393464383263 +65373565343462633733366636343766656666396531383638363232363565646364663035353333 +3236383136353065660a353631326630623165366631666639343864633531383238643131373363 +64303565363439343064393039323265623364633738373163373339376134643966333032326564 +61646536633335633938336438663430643461623230666163636561303430393732663062393461 +346332333463636566326364663465306565 diff --git a/roles/matrix/tasks/main.yml b/roles/matrix/tasks/main.yml new file mode 100644 index 0000000..4ce0826 --- /dev/null +++ b/roles/matrix/tasks/main.yml @@ -0,0 +1,31 @@ +- name: Create app directory + file: + path: "{{ service_dir }}" + state: directory +- name: Copy signing key + copy: + src: "{{ role_path }}/files/matrix.log.config" + dest: "{{ service_dir }}/matrix.log.config" +- name: Copy Docker Compose script + template: + src: "{{ role_path }}/templates/docker-compose.yml.j2" + dest: "{{ service_dir }}/docker-compose.yml" +- name: Copy homeserver.yaml + template: + src: "{{ role_path }}/templates/homeserver.yaml.j2" + dest: "{{ service_dir }}/homeserver.yaml" + register: homeserver +- name: Copy signing key + copy: + src: "{{ role_path }}/files/matrix.signing.key" + dest: "{{ service_dir }}/matrix.signing.key" +- name: Create data directory + file: + path: "{{ data_dir }}" + state: directory +- name: Start the Docker Compose + docker_compose: + project_src: "{{ service_dir }}" + pull: true + remove_orphans: true + restarted: "{{ homeserver.changed }}" diff --git a/roles/matrix/templates/docker-compose.yml.j2 b/roles/matrix/templates/docker-compose.yml.j2 new file mode 100644 index 0000000..0449299 --- /dev/null +++ b/roles/matrix/templates/docker-compose.yml.j2 @@ -0,0 +1,41 @@ +version: '3' + +services: + synapse: + image: docker.io/matrixdotorg/synapse:v1.77.0 + restart: unless-stopped + environment: + - SYNAPSE_CONFIG_PATH=/data/homeserver.yaml + volumes: + - /data/matrix/uploads:/data/uploads + - /data/matrix/media:/data/media + - /srv/matrix/homeserver.yaml:/data/homeserver.yaml + - /srv/matrix/matrix.log.config:/data/matrix.log.config + - /srv/matrix/matrix.signing.key:/data/matrix.signing.key + depends_on: + - db + networks: + - traefik + ports: + - "{{ internal_matrix_port }}:8008" + labels: + - traefik.enable=true + - traefik.http.routers.matrix.entryPoints=websecure + - traefik.http.routers.matrix.rule=Host(`{{ matrix_domain }}`) + - traefik.http.routers.matrix.tls=true + - traefik.http.routers.matrix.tls.certResolver=letsencrypt + - traefik.http.routers.matrix.service=matrix + - traefik.http.services.matrix.loadbalancer.server.port=8008 + + db: + image: docker.io/postgres:12-alpine + environment: + - POSTGRES_USER=synapse + - POSTGRES_PASSWORD={{ database_password }} + - POSTGRES_INITDB_ARGS=--encoding=UTF-8 --lc-collate=C --lc-ctype=C + volumes: + - /data/matrix/schemas:/var/lib/postgresql/data + +networks: + traefik: + external: true diff --git a/roles/matrix/templates/homeserver.yaml.j2 b/roles/matrix/templates/homeserver.yaml.j2 new file mode 100644 index 0000000..0b84c3c --- /dev/null +++ b/roles/matrix/templates/homeserver.yaml.j2 @@ -0,0 +1,35 @@ +# Configuration file for Synapse. +# +# For more information on how to configure Synapse, including a complete accounting of +# each option, go to docs/usage/configuration/config_documentation.md or +# https://matrix-org.github.io/synapse/latest/usage/configuration/config_documentation.html +server_name: "{{ matrix_domain }}" +pid_file: /data/homeserver.pid +listeners: + - port: 8008 + tls: false + type: http + x_forwarded: true + resources: + - names: [client, federation] + compress: false +database: + name: psycopg2 + args: + user: synapse + password: "{{ database_password }}" + host: db + cp_min: 5 + cp_max: 10 +log_config: "/data/matrix.log.config" +media_store_path: "/data/media" +registration_shared_secret: "{{ registration_shared_secret }}" +report_stats: false +macaroon_secret_key: "{{ macaroon_secret_key }}" +form_secret: "{{ form_secret }}" +signing_key_path: "/data/matrix.signing.key" +trusted_key_servers: + - server_name: "matrix.org" + + +# vim:ft=yaml diff --git a/roles/matrix/vars/main.yml b/roles/matrix/vars/main.yml new file mode 100644 index 0000000..637e90c --- /dev/null +++ b/roles/matrix/vars/main.yml @@ -0,0 +1,41 @@ +service_name: matrix +data_dir: "{{ base_data_dir }}/{{ service_name }}" +service_dir: "{{ base_service_dir }}/{{ service_name }}" + +matrix_domain: "matrix.{{ domain_name_pim }}" + +registration_shared_secret: !vault | + $ANSIBLE_VAULT;1.1;AES256 + 66643364393432353763666361383331316635356431636530663162643134653939306438366533 + 3463393262623364336430363638356439393461393237650a626630633963343530643565323633 + 35613636386365393035666366636534306266613935653136666430366330323032653164363066 + 6531323364383131360a616465336164303030643132336264646333346666626138386331636164 + 65366438356238383234386662363631316334613439613739303165613363636261643934656665 + 32653764373939373739666263653261343036636365316566623934343261653436613962343335 + 343132326461336338323938326264666630 +macaroon_secret_key: !vault | + $ANSIBLE_VAULT;1.1;AES256 + 61656638626162383134356238393031346464623930363636376136633038623836323737633463 + 3733383661663339313965636134373037366235613562340a376334666266623438313066346166 + 64333564613438313861396632633464386236356236313461373461613632346538343837343264 + 3363623135613063300a333932363036353063653931616361363934633239653732343737373536 + 31366265383939303664623565633435626530316430323036663261353334336264306162653361 + 38306437616333316638396161393164393766356566323362343565663630306465663133333733 + 343039623366313961393136356239373837 +form_secret: !vault | + $ANSIBLE_VAULT;1.1;AES256 + 38646165646636353331323565343033396431623338633734653838633032363930323637656637 + 3931643733343537343534386137313737383562346534300a353535633239626332393831613661 + 39366230313234663930363962386336646639393566356437623937393062353134303138363734 + 6430653164656339660a613234313464653138313331333137646331323338346230643630636466 + 35383837356633303061663362626439653030333063383532373663316330373737323736326562 + 37313034363262346333343166343231316264303934366565643466396164333166643561373365 + 656533393033356363303933353231376466 +database_password: !vault | + $ANSIBLE_VAULT;1.1;AES256 + 38393732313834343631626234353261653536646434343561613264626162363839303432333133 + 3635333330626263666430353931666635393738643163300a633231343334666331373936333565 + 36376164396464623233613033636562626630623730633730666333363437613234636638356630 + 3336373235336232630a353732653331623963313865333765633965353630363733386534313639 + 38643839323733393031373139376662326134653965646366663631396464393861636538313563 + 3934363539366139346633626433396438663739393332663030 diff --git a/roles/nsd/files/zones/pim.kunis.nl b/roles/nsd/files/zones/pim.kunis.nl index f68d70d..3c61f54 100644 --- a/roles/nsd/files/zones/pim.kunis.nl +++ b/roles/nsd/files/zones/pim.kunis.nl @@ -1,7 +1,7 @@ $ORIGIN pim.kunis.nl. $TTL 60 -pim.kunis.nl. IN SOA ns.pim.kunis.nl. pim.kunis.nl. 2023020800 1800 3600 1209600 3600 +pim.kunis.nl. IN SOA ns.pim.kunis.nl. pim.kunis.nl. 2023022500 1800 3600 1209600 3600 NS ns.pim.kunis.nl. A 84.245.14.149 @@ -17,3 +17,4 @@ dav IN CNAME www.pim.kunis.nl. git IN CNAME www.pim.kunis.nl. meet IN CNAME www.pim.kunis.nl. rss IN CNAME www.pim.kunis.nl. +matrix IN CNAME www.pim.kunis.nl. diff --git a/roles/static/files/matrix/client b/roles/static/files/matrix/client new file mode 100644 index 0000000..4db647f --- /dev/null +++ b/roles/static/files/matrix/client @@ -0,0 +1,5 @@ +{ + "m.homeserver": { + "base_url": "https://matrix.pim.kunis.nl" + } +} diff --git a/roles/static/files/matrix/server b/roles/static/files/matrix/server new file mode 100644 index 0000000..341190b --- /dev/null +++ b/roles/static/files/matrix/server @@ -0,0 +1,3 @@ +{ + "m.server": "matrix.pim.kunis.nl:443" +} diff --git a/roles/static/files/security.txt b/roles/static/files/security.txt deleted file mode 100644 index b1800e5..0000000 --- a/roles/static/files/security.txt +++ /dev/null @@ -1 +0,0 @@ -testje diff --git a/roles/static/tasks/main.yml b/roles/static/tasks/main.yml index 5f0cba5..ec53b20 100644 --- a/roles/static/tasks/main.yml +++ b/roles/static/tasks/main.yml @@ -17,10 +17,10 @@ cmd: "docker run --rm --volume=\"{{ service_dir }}/git:/srv/jekyll:Z\" -it jekyll/minimal jekyll build" chdir: "{{ service_dir }}" when: repo.changed -- name: Copy security.txt +- name: Copy Matrix static files copy: - src: "{{ role_path }}/files/security.txt" - dest: "{{ service_dir }}/security.txt" + src: "{{ role_path }}/files/matrix/" + dest: "{{ service_dir }}/matrix/" - name: Copy docker compose file template: src: "{{ role_path }}/templates/docker-compose.yml.j2" diff --git a/roles/static/templates/docker-compose.yml.j2 b/roles/static/templates/docker-compose.yml.j2 index 773d584..ebaa0c0 100644 --- a/roles/static/templates/docker-compose.yml.j2 +++ b/roles/static/templates/docker-compose.yml.j2 @@ -12,15 +12,24 @@ services: - {{ service_dir }}/security.txt:/var/www/blog/security.txt networks: - traefik + extra_hosts: + - "host.docker.internal:host-gateway" labels: - traefik.enable=true - traefik.http.routers.blog.entrypoints=websecure - - "traefik.http.routers.blog.rule=(Host(`{{ domain_name_pim }}`) || Path(`/security.txt`, `/.well-known/security.txt`))" + - "traefik.http.routers.blog.rule=(Host(`{{ domain_name_pim }}`) || Path(`/security.txt`, `/.well-known/security.txt`, `/_matrix`, `/.well-known/matrix/`))" - traefik.http.routers.blog.tls=true - traefik.http.routers.blog.tls.certresolver=letsencrypt - traefik.http.routers.blog.service=blog - traefik.http.services.blog.loadbalancer.server.port=80 + - traefik.http.routers.matrix-fed.entrypoints=matrix + - traefik.http.routers.matrix-fed.rule=Host(`matrix.pim.kunis.nl`) + - traefik.http.routers.matrix-fed.tls=true + - traefik.http.routers.matrix-fed.tls.certresolver=letsencrypt + - traefik.http.routers.matrix-fed.service=matrix-fed + - traefik.http.services.matrix-fed.loadbalancer.server.port=8448 + networks: traefik: external: true diff --git a/roles/static/templates/nginx.conf.j2 b/roles/static/templates/nginx.conf.j2 index 5267742..e626efd 100644 --- a/roles/static/templates/nginx.conf.j2 +++ b/roles/static/templates/nginx.conf.j2 @@ -2,19 +2,39 @@ server { listen 80 default_server; location /security.txt { - return 301 https://$host/.well-known/security.txt; + return 301 https://{{ domain_name_pim }}/.well-known/security.txt; } location /.well-known/security.txt { - add_header Content-Type 'text/plain'; - add_header Cache-Control 'no-cache, no-store, must-revalidate'; - add_header Pragma 'no-cache'; - add_header Expires '0'; - add_header Vary '*'; - return 200 "Contact: mailto:pim@kunis.nl\nExpires: 1970-01-01T00:00:00.000Z\nPreferred-Languages: en,nl\n"; + return 301 https://{{ domain_name_pim }}/.well-known/security.txt; } } +server { + # For the federation port + listen 8448 http2 default_server; + listen [::]:8448 http2 default_server; + + server_name matrix.pim.kunis.nl; + + location ~ ^(/_matrix|/_synapse/client) { + # note: do not add a path (even a single /) after the port in `proxy_pass`, + # otherwise nginx will canonicalise the URI and cause signature verification + # errors. + proxy_pass http://host.docker.internal:{{ internal_matrix_port }}; + proxy_set_header X-Forwarded-For $remote_addr; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_set_header Host $host; + + # Nginx by default only allows file uploads up to 1M in size + # Increase client_max_body_size to match max_upload_size defined in homeserver.yaml + client_max_body_size 50M; + + # Synapse responses may be chunked, which is an HTTP/1.1 feature. + proxy_http_version 1.1; + } +} + server { listen 80; server_name {{ domain_name_pim }}; diff --git a/roles/static/vars/main.yml b/roles/static/vars/main.yml index d0ee1bc..8838234 100644 --- a/roles/static/vars/main.yml +++ b/roles/static/vars/main.yml @@ -1,3 +1,3 @@ service_name: static service_dir: "{{ base_service_dir }}/{{ service_name }}" -git_origin: https://git.pim.kunis.nl/pim/static.git +git_origin: "http://localhost:{{ internal_forgejo_port }}/pim/static.git" diff --git a/roles/traefik/templates/docker-compose.yml.j2 b/roles/traefik/templates/docker-compose.yml.j2 index 36c32b8..6740d71 100644 --- a/roles/traefik/templates/docker-compose.yml.j2 +++ b/roles/traefik/templates/docker-compose.yml.j2 @@ -14,6 +14,7 @@ services: - "80:80" - "{{ git_ssh_port }}:{{ git_ssh_port }}" - "{{ traefik_api_port }}:{{ traefik_api_port }}" + - "8448:8448" volumes: - /var/run/docker.sock:/var/run/docker.sock - {{ service_dir }}/traefik.toml:/etc/traefik/traefik.toml diff --git a/roles/traefik/templates/traefik.toml.j2 b/roles/traefik/templates/traefik.toml.j2 index 4f265c7..f3e592b 100644 --- a/roles/traefik/templates/traefik.toml.j2 +++ b/roles/traefik/templates/traefik.toml.j2 @@ -15,6 +15,8 @@ loglevel = "DEBUG" address = ":{{ jitsi_videobridge_port }}/udp" [entryPoints.internal] address = ":{{ traefik_api_port }}" + [entryPoints.matrix] + address = ":8448" [api] insecure = false diff --git a/util/secret-service-client.sh b/util/secret-service-client.sh old mode 100644 new mode 100755