mirror of
https://github.com/element-hq/element-docker-demo.git
synced 2026-01-24 22:26:13 +03:00
a first stab at a docker compose up matrix 2.0 stack
This commit is contained in:
28
.env-sample
Normal file
28
.env-sample
Normal file
@@ -0,0 +1,28 @@
|
||||
# These env vars get templated into the configs in the respective containers via init scripts.
|
||||
#
|
||||
# If you want to make more customisations then either edit the templates to add more env variables below
|
||||
# (free free to contribute them back)
|
||||
# or edit the templates directly.
|
||||
|
||||
# n.b. SECRETS_* env variables get pulled in on demand from files in ./secrets
|
||||
|
||||
VOLUME_PATH=.
|
||||
DOMAIN=example.com
|
||||
HOMESERVER_FQDN=matrix.example.com
|
||||
ELEMENT_WEB_FQDN=element.example.com
|
||||
ELEMENT_CALL_FQDN=call.example.com
|
||||
MAS_FQDN=auth.example.com
|
||||
|
||||
REPORT_STATS=yes
|
||||
|
||||
IDENTITY_SERVER_URL=https://vector.im
|
||||
|
||||
MAIL_NOTIF_FROM_ADDRESS=noreply@example.com
|
||||
ABUSE_SUPPORT_EMAIL=abuse@example.com
|
||||
SECURITY_SUPPORT_EMAIL=security@example.com
|
||||
|
||||
MAS_CLIENT_ID="0000000000000000000SYNAPSE"
|
||||
MAS_EMAIL_FROM='"Authentication Service" <support@example.com>'
|
||||
MAS_EMAIL_REPLY_TO='"Authentication Service" <support@example.com>'
|
||||
|
||||
COUNTRY=GB
|
||||
6
.gitignore
vendored
Normal file
6
.gitignore
vendored
Normal file
@@ -0,0 +1,6 @@
|
||||
.DS_Store
|
||||
**/.DS_Store
|
||||
|
||||
.env
|
||||
data
|
||||
secrets
|
||||
241
compose.yml
Normal file
241
compose.yml
Normal file
@@ -0,0 +1,241 @@
|
||||
# FIXME: define a frontend & backend network, and only expose backend services to the frontend (nginx)
|
||||
networks:
|
||||
backend:
|
||||
|
||||
secrets:
|
||||
postgres_password:
|
||||
file: secrets/postgres/postgres_password
|
||||
synapse_signing_key:
|
||||
file: secrets/synapse/${DOMAIN}.signing.key
|
||||
|
||||
services:
|
||||
# dependencies for optionally generating default configs + secrets
|
||||
generate-synapse-secrets:
|
||||
image: ghcr.io/element-hq/synapse:latest
|
||||
restart: "no"
|
||||
volumes:
|
||||
- ${VOLUME_PATH}/data/synapse:/data:rw
|
||||
- ${VOLUME_PATH}/init/generate-synapse-secrets.sh:/entrypoint.sh
|
||||
env_file: .env
|
||||
environment:
|
||||
SYNAPSE_CONFIG_DIR: /data
|
||||
SYNAPSE_CONFIG_PATH: /data/homeserver.yaml.default
|
||||
SYNAPSE_SERVER_NAME: ${DOMAIN}
|
||||
SYNAPSE_REPORT_STATS: ${REPORT_STATS}
|
||||
entrypoint: "/entrypoint.sh"
|
||||
|
||||
generate-mas-secrets:
|
||||
restart: "no"
|
||||
image: ghcr.io/element-hq/matrix-authentication-service:latest
|
||||
volumes:
|
||||
- ${VOLUME_PATH}/data/mas:/data:rw
|
||||
env_file: .env
|
||||
# FIXME: stop this regenerating a spurious default config every time
|
||||
# We can't do the same approach as synapse (unless use a debug image of MAS) as MAS is distroless and has no bash.
|
||||
command: "config generate -o /data/config.yaml.default"
|
||||
|
||||
# dependency for templating /data-template into /data (having extracted any secrets from any default generated configs)
|
||||
init:
|
||||
build: init
|
||||
restart: "no"
|
||||
volumes:
|
||||
- ${VOLUME_PATH}/secrets:/secrets
|
||||
- ${VOLUME_PATH}/data:/data
|
||||
- ${VOLUME_PATH}/data-template:/data-template
|
||||
- ${VOLUME_PATH}/init/init.sh:/init.sh
|
||||
command: "/init.sh"
|
||||
env_file: .env
|
||||
depends_on:
|
||||
generate-synapse-secrets:
|
||||
condition: service_completed_successfully
|
||||
generate-mas-secrets:
|
||||
condition: service_completed_successfully
|
||||
|
||||
# nginx:
|
||||
# image: nginx:latest
|
||||
# restart: unless-stopped
|
||||
# ports:
|
||||
# - "80:80"
|
||||
# - "443:443"
|
||||
# volumes:
|
||||
# - ${VOLUME_PATH}/data/nginx:/etc/nginx/conf.d
|
||||
# - ${VOLUME_PATH}/data/certbot/conf:/etc/letsencrypt
|
||||
# - ${VOLUME_PATH}/data/certbot/www:/var/www/certbot
|
||||
# command: "/bin/sh -c 'while :; do sleep 6h & wait $${!}; nginx -s reload; done & nginx -g \"daemon off;\"'"
|
||||
# depends_on:
|
||||
# init:
|
||||
# condition: service_completed_successfully
|
||||
|
||||
# certbot:
|
||||
# image: certbot/certbot:latest
|
||||
# restart: unless-stopped
|
||||
# volumes:
|
||||
# - ${VOLUME_PATH}/data/certbot/conf:/etc/letsencrypt
|
||||
# - ${VOLUME_PATH}/data/certbot/www:/var/www/certbot
|
||||
# entrypoint: "/bin/sh -c 'trap exit TERM; while :; do certbot renew; sleep 12h & wait $${!}; done;'"
|
||||
# depends_on:
|
||||
# init:
|
||||
# condition: service_completed_successfully
|
||||
|
||||
postgres:
|
||||
image: postgres:latest
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
- ${VOLUME_PATH}/data/postgres:/var/lib/postgresql/data:rw
|
||||
- ${VOLUME_PATH}/data-template/postgres/create-multiple-postgresql-databases.sh:/docker-entrypoint-initdb.d/create-multiple-postgresql-databases.sh
|
||||
networks:
|
||||
- backend
|
||||
environment:
|
||||
POSTGRES_MULTIPLE_DATABASES: synapse,mas
|
||||
POSTGRES_USER: matrix # FIXME: use different username+passwords for synapse & MAS DBs.
|
||||
POSTGRES_PASSWORD_FILE: /run/secrets/postgres_password
|
||||
POSTGRES_INITDB_ARGS: --encoding=UTF8 --locale=C
|
||||
secrets:
|
||||
- postgres_password
|
||||
healthcheck:
|
||||
test: ["CMD-SHELL", "pg_isready"]
|
||||
start_period: "1s"
|
||||
interval: "1s"
|
||||
timeout: "5s"
|
||||
depends_on:
|
||||
init:
|
||||
condition: service_completed_successfully
|
||||
|
||||
redis:
|
||||
image: redis:latest
|
||||
restart: unless-stopped
|
||||
networks:
|
||||
- backend
|
||||
|
||||
synapse:
|
||||
image: ghcr.io/element-hq/synapse:latest
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
- ${VOLUME_PATH}/data/synapse:/data:rw
|
||||
ports:
|
||||
- 8008:8008
|
||||
networks:
|
||||
- backend
|
||||
environment:
|
||||
SYNAPSE_CONFIG_DIR: /data
|
||||
SYNAPSE_CONFIG_PATH: /data/homeserver.yaml
|
||||
secrets:
|
||||
- synapse_signing_key
|
||||
depends_on:
|
||||
postgres:
|
||||
condition: service_healthy
|
||||
init:
|
||||
condition: service_completed_successfully
|
||||
|
||||
synapse-generic-worker-1:
|
||||
image: ghcr.io/element-hq/synapse:latest
|
||||
restart: unless-stopped
|
||||
entrypoint: ["/start.py", "run", "--config-path=/data/homeserver.yaml", "--config-path=/data/workers/synapse-generic-worker-1.yaml"]
|
||||
healthcheck:
|
||||
test: ["CMD-SHELL", "curl -fSs http://localhost:8081/health || exit 1"]
|
||||
start_period: "5s"
|
||||
interval: "15s"
|
||||
timeout: "5s"
|
||||
networks:
|
||||
- backend
|
||||
volumes:
|
||||
- ${VOLUME_PATH}/data/synapse:/data:rw
|
||||
environment:
|
||||
SYNAPSE_WORKER: synapse.app.generic_worker
|
||||
# Expose port if required so your reverse proxy can send requests to this worker
|
||||
# Port configuration will depend on how the http listener is defined in the worker configuration file
|
||||
ports:
|
||||
- 8081:8081
|
||||
secrets:
|
||||
- synapse_signing_key
|
||||
depends_on:
|
||||
- synapse
|
||||
|
||||
synapse-federation-sender-1:
|
||||
image: ghcr.io/element-hq/synapse:latest
|
||||
restart: unless-stopped
|
||||
entrypoint: ["/start.py", "run", "--config-path=/data/homeserver.yaml", "--config-path=/data/workers/synapse-federation-sender-1.yaml"]
|
||||
healthcheck:
|
||||
disable: true
|
||||
networks:
|
||||
- backend
|
||||
volumes:
|
||||
- ${VOLUME_PATH}/data/synapse:/data:rw # Replace VOLUME_PATH with the path to your Synapse volume
|
||||
environment:
|
||||
SYNAPSE_WORKER: synapse.app.federation_sender
|
||||
secrets:
|
||||
- synapse_signing_key
|
||||
depends_on:
|
||||
- synapse
|
||||
|
||||
matrix-authentication-service:
|
||||
image: ghcr.io/element-hq/matrix-authentication-service:latest
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- 8083:8080
|
||||
volumes:
|
||||
- ${VOLUME_PATH}/data/mas:/data:rw
|
||||
networks:
|
||||
- backend
|
||||
# FIXME: do we also need to sync the db?
|
||||
command: "server --config=/data/config.yaml"
|
||||
depends_on:
|
||||
postgres:
|
||||
condition: service_healthy
|
||||
init:
|
||||
condition: service_completed_successfully
|
||||
|
||||
# as a basic local MTA
|
||||
mailhog:
|
||||
image: mailhog/mailhog:latest
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- 8025:8025
|
||||
- 1025:1025
|
||||
networks:
|
||||
- backend
|
||||
|
||||
element-web:
|
||||
image: vectorim/element-web:latest
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- 8080:80
|
||||
healthcheck:
|
||||
test: ["CMD-SHELL", "curl -fSs http://localhost:8080/version || exit 1"]
|
||||
start_period: "5s"
|
||||
interval: "15s"
|
||||
timeout: "5s"
|
||||
networks:
|
||||
- backend
|
||||
volumes:
|
||||
- ${VOLUME_PATH}/data/element-web/config.json:/app/config.json
|
||||
depends_on:
|
||||
init:
|
||||
condition: service_completed_successfully
|
||||
|
||||
element-call:
|
||||
image: ghcr.io/element-hq/element-call
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- 8082:80
|
||||
networks:
|
||||
- backend
|
||||
volumes:
|
||||
- ${VOLUME_PATH}/data/element-call/config.json:/app/config.json
|
||||
depends_on:
|
||||
init:
|
||||
condition: service_completed_successfully
|
||||
|
||||
# livekit-server:
|
||||
# image: livekit/livekit-server:latest
|
||||
# restart: unless-stopped
|
||||
# ports:
|
||||
# - 7880:7880 # HTTP API
|
||||
# - 7881:7881 # WS signalling
|
||||
# # - 50000-60000:50000-60000/tcp # TCP media
|
||||
# # - 50000-60000:50000-60000/udp # UDP media
|
||||
# networks:
|
||||
# - backend
|
||||
# depends_on:
|
||||
# init:
|
||||
# condition: service_completed_successfully
|
||||
34
data-template/element-web/config.json
Normal file
34
data-template/element-web/config.json
Normal file
@@ -0,0 +1,34 @@
|
||||
{
|
||||
"default_server_config": {
|
||||
"m.homeserver": {
|
||||
"base_url": "https://${HOMESERVER_FQDN}",
|
||||
"server_name": "${DOMAIN}"
|
||||
},
|
||||
"m.identity_server": {
|
||||
"base_url": "${IDENTITY_SERVER_URL}"
|
||||
}
|
||||
},
|
||||
"disable_custom_urls": false,
|
||||
"disable_guests": false,
|
||||
"disable_login_language_selector": false,
|
||||
"disable_3pid_login": false,
|
||||
"force_verification": false,
|
||||
"brand": "Element",
|
||||
"default_widget_container_height": 280,
|
||||
"default_country_code": "${COUNTRY}",
|
||||
"show_labs_settings": false,
|
||||
"features": {},
|
||||
"default_federate": true,
|
||||
"default_theme": "light",
|
||||
"room_directory": {
|
||||
"servers": ["${DOMAIN}"]
|
||||
},
|
||||
"setting_defaults": {
|
||||
"breadcrumbs": true
|
||||
},
|
||||
"element_call": {
|
||||
"url": "https://${ELEMENT_CALL_FQDN}",
|
||||
"brand": "Element Call"
|
||||
},
|
||||
"map_style_url": "https://api.maptiler.com/maps/streets/style.json?key=fU3vlMsMn4Jb6dnEIFsx"
|
||||
}
|
||||
101
data-template/mas/config.yaml
Normal file
101
data-template/mas/config.yaml
Normal file
@@ -0,0 +1,101 @@
|
||||
${CONFIG_HEADER}
|
||||
|
||||
http:
|
||||
listeners:
|
||||
- name: web
|
||||
resources:
|
||||
- name: discovery
|
||||
- name: human
|
||||
- name: oauth
|
||||
- name: compat
|
||||
- name: graphql
|
||||
- name: assets
|
||||
binds:
|
||||
- address: '[::]:8080'
|
||||
proxy_protocol: false
|
||||
- name: internal
|
||||
resources:
|
||||
- name: health
|
||||
binds:
|
||||
- host: localhost
|
||||
port: 8081
|
||||
proxy_protocol: false
|
||||
trusted_proxies:
|
||||
- 192.168.0.0/16
|
||||
- 172.16.0.0/12
|
||||
- 10.0.0.0/10
|
||||
- 127.0.0.1/8
|
||||
- fd00::/8
|
||||
- ::1/128
|
||||
public_base: http://[::]:8080/
|
||||
issuer: http://[::]:8080/
|
||||
database:
|
||||
host: postgres
|
||||
database: mas
|
||||
username: matrix
|
||||
password: ${SECRETS_POSTGRES_PASSWORD}
|
||||
max_connections: 10
|
||||
min_connections: 0
|
||||
connect_timeout: 30
|
||||
idle_timeout: 600
|
||||
max_lifetime: 1800
|
||||
email:
|
||||
from: '${MAS_EMAIL_FROM}'
|
||||
reply_to: '${MAS_EMAIL_REPLY_TO}'
|
||||
transport: smtp
|
||||
mode: plain
|
||||
hostname: mailhog
|
||||
port: 1025
|
||||
${SECRETS_MAS_SECRETS}
|
||||
passwords:
|
||||
enabled: true
|
||||
schemes:
|
||||
- version: 1
|
||||
algorithm: argon2id
|
||||
minimum_complexity: 3
|
||||
matrix:
|
||||
homeserver: localhost:8008
|
||||
secret: '${SECRETS_MAS_MATRIX_SECRET}'
|
||||
endpoint: http://localhost:8008/
|
||||
|
||||
# please keep config above this point as close as possible to the original generated config
|
||||
# so that upstream generated config changes can be detected
|
||||
|
||||
# these taken from midhun's quick-mas-setup
|
||||
clients:
|
||||
- client_id: ${MAS_CLIENT_ID}
|
||||
client_auth_method: client_secret_basic
|
||||
client_secret: '${SECRETS_MAS_CLIENT_SECRET}'
|
||||
|
||||
templates:
|
||||
path: /usr/local/share/mas-cli/templates/
|
||||
assets_manifest: /usr/local/share/mas-cli/manifest.json
|
||||
translations_path: /usr/local/share/mas-cli/translations/
|
||||
|
||||
policy:
|
||||
wasm_module: /usr/local/share/mas-cli/policy.wasm
|
||||
client_registration_entrypoint: client_registration/violation
|
||||
register_entrypoint: register/violation
|
||||
authorization_grant_entrypoint: authorization_grant/violation
|
||||
password_entrypoint: password/violation
|
||||
email_entrypoint: email/violation
|
||||
data:
|
||||
client_registration:
|
||||
allow_insecure_uris: true # allow non-SSL and localhost URIs
|
||||
allow_missing_contacts: true # EW doesn't have contacts at this time
|
||||
admin_users:
|
||||
- admin
|
||||
|
||||
branding:
|
||||
service_name: null
|
||||
policy_uri: null
|
||||
tos_uri: null
|
||||
imprint: null
|
||||
logo_uri: null
|
||||
|
||||
upstream_oauth2:
|
||||
providers: []
|
||||
|
||||
experimental:
|
||||
access_token_ttl: 86400
|
||||
compat_token_ttl: 86400
|
||||
14
data-template/nginx/.well-known/matrix/client
Normal file
14
data-template/nginx/.well-known/matrix/client
Normal file
@@ -0,0 +1,14 @@
|
||||
{
|
||||
"m.homeserver": {
|
||||
"base_url": "https://${HOMESERVER_FQDN}"
|
||||
},
|
||||
"m.identity_server": {
|
||||
"base_url": "${IDENTITY_SERVER_URL}"
|
||||
},
|
||||
"org.matrix.msc4143.rtc_foci": [
|
||||
{
|
||||
"type": "livekit",
|
||||
"livekit_service_url": "https://${ELEMENT_CALL_FQDN}"
|
||||
}
|
||||
]
|
||||
}
|
||||
3
data-template/nginx/.well-known/matrix/server
Normal file
3
data-template/nginx/.well-known/matrix/server
Normal file
@@ -0,0 +1,3 @@
|
||||
{
|
||||
"m.server": "${HOMESERVER_FQDN}:443"
|
||||
}
|
||||
7
data-template/nginx/.well-known/matrix/support
Normal file
7
data-template/nginx/.well-known/matrix/support
Normal file
@@ -0,0 +1,7 @@
|
||||
{
|
||||
"support_page": "https://matrix.org/contact/",
|
||||
"contacts": [
|
||||
{ "role": "m.role.admin", "email_address": "${ABUSE_SUPPORT_EMAIL}" },
|
||||
{ "role": "m.role.security", "email_address": "${SECURITY_SUPPORT_EMAIL}" }
|
||||
]
|
||||
}
|
||||
112
data-template/nginx/app.conf
Normal file
112
data-template/nginx/app.conf
Normal file
@@ -0,0 +1,112 @@
|
||||
# taken from https://element-hq.github.io/synapse/latest/reverse_proxy.html
|
||||
# mixed with https://github.com/wmnnd/nginx-certbot/tree/master/data/nginx
|
||||
|
||||
server {
|
||||
server_name example.com;
|
||||
server_tokens off;
|
||||
|
||||
listen 80;
|
||||
|
||||
location /.well-known/acme-challenge/ {
|
||||
root /var/www/certbot;
|
||||
}
|
||||
|
||||
location / {
|
||||
return 301 https://$host$request_uri;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
server_name element.example.com;
|
||||
server_tokens off;
|
||||
|
||||
listen 443 ssl default_server;
|
||||
listen [::]:443 ssl default_server;
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
|
||||
include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||
|
||||
location / {
|
||||
proxy_pass http://element-web:8080;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
server_name call.example.com;
|
||||
server_tokens off;
|
||||
|
||||
listen 443 ssl default_server;
|
||||
listen [::]:443 ssl default_server;
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
|
||||
include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||
|
||||
location / {
|
||||
proxy_pass http://element-call:8082;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
server_name auth.example.com;
|
||||
server_tokens off;
|
||||
|
||||
listen 443 ssl default_server;
|
||||
listen [::]:443 ssl default_server;
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
|
||||
include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||
|
||||
location / {
|
||||
proxy_pass http://auth:8083;
|
||||
}
|
||||
}
|
||||
|
||||
server {
|
||||
server_name matrix.example.com;
|
||||
server_tokens off;
|
||||
|
||||
listen 443 ssl default_server;
|
||||
listen [::]:443 ssl default_server;
|
||||
|
||||
# For the federation port
|
||||
listen 8448 ssl default_server;
|
||||
listen [::]:8448 ssl default_server;
|
||||
|
||||
ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
|
||||
ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
|
||||
include /etc/letsencrypt/options-ssl-nginx.conf;
|
||||
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
|
||||
|
||||
# pass auth to MAS
|
||||
location ~ ^/_matrix/client/(.*)/(login|logout|refresh) { proxy_pass http://auth:8083 }
|
||||
|
||||
# use the generic worker as a synchrotron:
|
||||
# taken from https://element-hq.github.io/synapse/latest/workers.html#synapseappgeneric_worker
|
||||
location ~ ^/_matrix/client/(r0|v3)/sync$ { proxy_pass http://synapse-generic-worker-1:8081 }
|
||||
location ~ ^/_matrix/client/(api/v1|r0|v3)/events$ { proxy_pass http://synapse-generic-worker-1:8081 }
|
||||
location ~ ^/_matrix/client/(api/v1|r0|v3)/initialSync$ { proxy_pass http://synapse-generic-worker-1:8081 }
|
||||
location ~ ^/_matrix/client/(api/v1|r0|v3)/rooms/[^/]+/initialSync$ { proxy_pass http://synapse-generic-worker-1:8081 }
|
||||
|
||||
location / {
|
||||
proxy_pass http://synapse:8008;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header Host $host;
|
||||
|
||||
# Nginx by default only allows file uploads up to 1M in size
|
||||
# Increase client_max_body_size to match max_upload_size defined in homeserver.yaml
|
||||
client_max_body_size 50M;
|
||||
}
|
||||
|
||||
location /.well-known {}
|
||||
|
||||
# Synapse responses may be chunked, which is an HTTP/1.1 feature.
|
||||
proxy_http_version 1.1;
|
||||
}
|
||||
|
||||
24
data-template/postgres/create-multiple-postgresql-databases.sh
Executable file
24
data-template/postgres/create-multiple-postgresql-databases.sh
Executable file
@@ -0,0 +1,24 @@
|
||||
#!/bin/bash
|
||||
|
||||
# from https://github.com/mrts/docker-postgresql-multiple-databases
|
||||
|
||||
set -e
|
||||
set -u
|
||||
|
||||
function create_user_and_database() {
|
||||
local database=$1
|
||||
echo " Creating user and database '$database'"
|
||||
psql -v ON_ERROR_STOP=1 --username "$POSTGRES_USER" <<-EOSQL
|
||||
CREATE USER $database;
|
||||
CREATE DATABASE $database;
|
||||
GRANT ALL PRIVILEGES ON DATABASE $database TO $database;
|
||||
EOSQL
|
||||
}
|
||||
|
||||
if [ -n "$POSTGRES_MULTIPLE_DATABASES" ]; then
|
||||
echo "Multiple database creation requested: $POSTGRES_MULTIPLE_DATABASES"
|
||||
for db in $(echo $POSTGRES_MULTIPLE_DATABASES | tr ',' ' '); do
|
||||
create_user_and_database $db
|
||||
done
|
||||
echo "Multiple databases created"
|
||||
fi
|
||||
98
data-template/synapse/homeserver.yaml
Normal file
98
data-template/synapse/homeserver.yaml
Normal file
@@ -0,0 +1,98 @@
|
||||
${CONFIG_HEADER}
|
||||
|
||||
# Configuration file for Synapse.
|
||||
#
|
||||
# This is a YAML file: see [1] for a quick introduction. Note in particular
|
||||
# that *indentation is important*: all the elements of a list or dictionary
|
||||
# should have the same indentation.
|
||||
#
|
||||
# [1] https://docs.ansible.com/ansible/latest/reference_appendices/YAMLSyntax.html
|
||||
#
|
||||
# For more information on how to configure Synapse, including a complete accounting of
|
||||
# each option, go to docs/usage/configuration/config_documentation.md or
|
||||
# https://element-hq.github.io/synapse/latest/usage/configuration/config_documentation.html
|
||||
server_name: ${DOMAIN}
|
||||
pid_file: /data/homeserver.pid
|
||||
listeners:
|
||||
- port: 8008
|
||||
tls: false
|
||||
type: http
|
||||
x_forwarded: true
|
||||
resources:
|
||||
- names: [client, federation]
|
||||
compress: false
|
||||
- port: 9093
|
||||
tls: false
|
||||
type: http
|
||||
resources:
|
||||
- names: [replication]
|
||||
|
||||
database:
|
||||
name: psycopg2
|
||||
args:
|
||||
user: matrix
|
||||
password: '${SECRETS_POSTGRES_PASSWORD}'
|
||||
host: postgres
|
||||
database: synapse
|
||||
|
||||
log_config: "/data/log.config"
|
||||
media_store_path: /data/media_store
|
||||
registration_shared_secret: '${SECRETS_SYNAPSE_REGISTRATION_SHARED_SECRET}'
|
||||
report_stats: false
|
||||
macaroon_secret_key: '${SECRETS_SYNAPSE_MACAROON_SECRET_KEY}'
|
||||
form_secret: '${SECRETS_SYNAPSE_FORM_SECRET}'
|
||||
signing_key_path: "/run/secrets/synapse_signing_key"
|
||||
trusted_key_servers:
|
||||
- server_name: "matrix.org"
|
||||
|
||||
# please keep config above this point as close as possible to the original generated config
|
||||
# so that upstream generated config changes can be detected
|
||||
|
||||
send_federation: false
|
||||
federation_sender_instances:
|
||||
- synapse-federation-sender-1
|
||||
|
||||
instance_map:
|
||||
main:
|
||||
host: 'synapse'
|
||||
port: 9093
|
||||
|
||||
redis:
|
||||
enabled: true
|
||||
host: redis
|
||||
port: 6379
|
||||
|
||||
email:
|
||||
smtp_host: mailhog
|
||||
smtp_port: 1025
|
||||
enable_tls: false
|
||||
notif_from: "Your %(app)s homeserver <${MAIL_NOTIF_FROM_ADDRESS}>"
|
||||
app_name: Matrix
|
||||
enable_notifs: true
|
||||
notif_for_new_users: false
|
||||
client_base_url: https://${ELEMENT_WEB_FQDN}
|
||||
validation_token_lifetime: 15m
|
||||
invite_client_location: https://${ELEMENT_WEB_FQDN}
|
||||
subjects:
|
||||
message_from_person_in_room: "[%(app)s] You have a message on %(app)s from %(person)s in the %(room)s room..."
|
||||
message_from_person: "[%(app)s] You have a message on %(app)s from %(person)s..."
|
||||
messages_from_person: "[%(app)s] You have messages on %(app)s from %(person)s..."
|
||||
messages_in_room: "[%(app)s] You have messages on %(app)s in the %(room)s room..."
|
||||
messages_in_room_and_others: "[%(app)s] You have messages on %(app)s in the %(room)s room and others..."
|
||||
messages_from_person_and_others: "[%(app)s] You have messages on %(app)s from %(person)s and others..."
|
||||
invite_from_person_to_room: "[%(app)s] %(person)s has invited you to join the %(room)s room on %(app)s..."
|
||||
invite_from_person: "[%(app)s] %(person)s has invited you to chat on %(app)s..."
|
||||
password_reset: "[%(server_name)s] Password reset"
|
||||
email_validation: "[%(server_name)s] Validate your email"
|
||||
|
||||
experimental_features:
|
||||
msc3861: # OIDC
|
||||
enabled: true
|
||||
issuer: http://localhost:8080/
|
||||
client_id: ${MAS_CLIENT_ID}
|
||||
client_auth_method: client_secret_basic
|
||||
client_secret: '${SECRETS_MAS_CLIENT_SECRET}'
|
||||
admin_token: '${SECRETS_MAS_MATRIX_SECRET}'
|
||||
account_management_url: "https://${MAS_FQDN}/account"
|
||||
|
||||
# vim:ft=yaml
|
||||
75
data-template/synapse/log.config
Normal file
75
data-template/synapse/log.config
Normal file
@@ -0,0 +1,75 @@
|
||||
# Log configuration for Synapse.
|
||||
#
|
||||
# This is a YAML file containing a standard Python logging configuration
|
||||
# dictionary. See [1] for details on the valid settings.
|
||||
#
|
||||
# Synapse also supports structured logging for machine readable logs which can
|
||||
# be ingested by ELK stacks. See [2] for details.
|
||||
#
|
||||
# [1]: https://docs.python.org/3/library/logging.config.html#configuration-dictionary-schema
|
||||
# [2]: https://element-hq.github.io/synapse/latest/structured_logging.html
|
||||
|
||||
version: 1
|
||||
|
||||
formatters:
|
||||
precise:
|
||||
format: '%(asctime)s - %(name)s - %(lineno)d - %(levelname)s - %(request)s - %(message)s'
|
||||
|
||||
handlers:
|
||||
file:
|
||||
class: logging.handlers.TimedRotatingFileHandler
|
||||
formatter: precise
|
||||
filename: /data/homeserver.log
|
||||
when: midnight
|
||||
backupCount: 3 # Does not include the current log file.
|
||||
encoding: utf8
|
||||
|
||||
# Default to buffering writes to log file for efficiency.
|
||||
# WARNING/ERROR logs will still be flushed immediately, but there will be a
|
||||
# delay (of up to `period` seconds, or until the buffer is full with
|
||||
# `capacity` messages) before INFO/DEBUG logs get written.
|
||||
buffer:
|
||||
class: synapse.logging.handlers.PeriodicallyFlushingMemoryHandler
|
||||
target: file
|
||||
|
||||
# The capacity is the maximum number of log lines that are buffered
|
||||
# before being written to disk. Increasing this will lead to better
|
||||
# performance, at the expensive of it taking longer for log lines to
|
||||
# be written to disk.
|
||||
# This parameter is required.
|
||||
capacity: 10
|
||||
|
||||
# Logs with a level at or above the flush level will cause the buffer to
|
||||
# be flushed immediately.
|
||||
# Default value: 40 (ERROR)
|
||||
# Other values: 50 (CRITICAL), 30 (WARNING), 20 (INFO), 10 (DEBUG)
|
||||
flushLevel: 30 # Flush immediately for WARNING logs and higher
|
||||
|
||||
# The period of time, in seconds, between forced flushes.
|
||||
# Messages will not be delayed for longer than this time.
|
||||
# Default value: 5 seconds
|
||||
period: 5
|
||||
|
||||
# A handler that writes logs to stderr. Unused by default, but can be used
|
||||
# instead of "buffer" and "file" in the logger handlers.
|
||||
console:
|
||||
class: logging.StreamHandler
|
||||
formatter: precise
|
||||
|
||||
loggers:
|
||||
synapse.storage.SQL:
|
||||
# beware: increasing this to DEBUG will make synapse log sensitive
|
||||
# information such as access tokens.
|
||||
level: INFO
|
||||
|
||||
root:
|
||||
level: INFO
|
||||
|
||||
# Write logs to the `buffer` handler, which will buffer them together in memory,
|
||||
# then write them to a file.
|
||||
#
|
||||
# Replace "buffer" with "console" to log to stderr instead.
|
||||
#
|
||||
handlers: [console]
|
||||
|
||||
disable_existing_loggers: false
|
||||
@@ -0,0 +1,4 @@
|
||||
worker_app: synapse.app.federation_sender
|
||||
worker_name: synapse-federation-sender-1
|
||||
|
||||
worker_log_config: /data/log.config
|
||||
11
data-template/synapse/workers/synapse-generic-worker-1.yaml
Normal file
11
data-template/synapse/workers/synapse-generic-worker-1.yaml
Normal file
@@ -0,0 +1,11 @@
|
||||
worker_app: synapse.app.generic_worker
|
||||
worker_name: synapse-generic-worker-1
|
||||
|
||||
worker_listeners:
|
||||
- type: http
|
||||
port: 8081
|
||||
x_forwarded: true
|
||||
resources:
|
||||
- names: [client, federation]
|
||||
|
||||
worker_log_config: /data/log.config
|
||||
4
init/Dockerfile
Normal file
4
init/Dockerfile
Normal file
@@ -0,0 +1,4 @@
|
||||
FROM alpine:latest
|
||||
|
||||
# TODO: check this doesn't reinstall yq on every launch and use a builder if necessary
|
||||
RUN apk update && apk add yq bash envsubst
|
||||
14
init/generate-mas-secrets.sh
Executable file
14
init/generate-mas-secrets.sh
Executable file
@@ -0,0 +1,14 @@
|
||||
#!/usr/bin/ash
|
||||
|
||||
# a replacement entrypoint script for the MAS docker image which generates default config & secrets if needed.
|
||||
# N.B. NOT USED CURRENTLY AS THE MAS IMAGE HAS NO SHELL
|
||||
|
||||
|
||||
if [[ -f /data/config.yaml ]]
|
||||
then
|
||||
echo "MAS config found - not generating default"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
echo "MAS config not found - generating default for secrets"
|
||||
exec mas-cli config generate -o /data/config.yaml.default
|
||||
12
init/generate-synapse-secrets.sh
Executable file
12
init/generate-synapse-secrets.sh
Executable file
@@ -0,0 +1,12 @@
|
||||
#!/usr/bin/bash
|
||||
|
||||
# a replacement entrypoint script for the synapse docker image which generates default config & secrets if needed.
|
||||
|
||||
if [[ -f ${SYNAPSE_CONFIG_PATH} ]]
|
||||
then
|
||||
echo "Synapse config found - not generating default"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
echo "Synapse config not found - generating default for secrets"
|
||||
exec /start.py generate
|
||||
83
init/init-letsencrypt.sh
Executable file
83
init/init-letsencrypt.sh
Executable file
@@ -0,0 +1,83 @@
|
||||
#!/bin/bash
|
||||
|
||||
# taken from https://raw.githubusercontent.com/wmnnd/nginx-certbot/refs/heads/master/init-letsencrypt.sh
|
||||
|
||||
if ! [ -x "$(command -v docker-compose)" ]; then
|
||||
echo 'Error: docker-compose is not installed.' >&2
|
||||
exit 1
|
||||
fi
|
||||
|
||||
. .env
|
||||
domains=($DOMAIN $HOMESERVER_FQDN $ELEMENT_FQDN $CALL_FQDN $MAS_FQDN)
|
||||
rsa_key_size=4096
|
||||
data_path="./data/certbot"
|
||||
email="" # Adding a valid address is strongly recommended
|
||||
staging=0 # Set to 1 if you're testing your setup to avoid hitting request limits
|
||||
|
||||
if [ -d "$data_path" ]; then
|
||||
read -p "Existing data found for $domains. Continue and replace existing certificate? (y/N) " decision
|
||||
if [ "$decision" != "Y" ] && [ "$decision" != "y" ]; then
|
||||
exit
|
||||
fi
|
||||
fi
|
||||
|
||||
|
||||
if [ ! -e "$data_path/conf/options-ssl-nginx.conf" ] || [ ! -e "$data_path/conf/ssl-dhparams.pem" ]; then
|
||||
echo "### Downloading recommended TLS parameters ..."
|
||||
mkdir -p "$data_path/conf"
|
||||
curl -s https://raw.githubusercontent.com/certbot/certbot/master/certbot-nginx/certbot_nginx/_internal/tls_configs/options-ssl-nginx.conf > "$data_path/conf/options-ssl-nginx.conf"
|
||||
curl -s https://raw.githubusercontent.com/certbot/certbot/master/certbot/certbot/ssl-dhparams.pem > "$data_path/conf/ssl-dhparams.pem"
|
||||
echo
|
||||
fi
|
||||
|
||||
echo "### Creating dummy certificate for $domains ..."
|
||||
path="/etc/letsencrypt/live/$domains"
|
||||
mkdir -p "$data_path/conf/live/$domains"
|
||||
docker-compose run --rm --entrypoint "\
|
||||
openssl req -x509 -nodes -newkey rsa:$rsa_key_size -days 1\
|
||||
-keyout '$path/privkey.pem' \
|
||||
-out '$path/fullchain.pem' \
|
||||
-subj '/CN=localhost'" certbot
|
||||
echo
|
||||
|
||||
|
||||
echo "### Starting nginx ..."
|
||||
docker-compose up --force-recreate -d nginx
|
||||
echo
|
||||
|
||||
echo "### Deleting dummy certificate for $domains ..."
|
||||
docker-compose run --rm --entrypoint "\
|
||||
rm -Rf /etc/letsencrypt/live/$domains && \
|
||||
rm -Rf /etc/letsencrypt/archive/$domains && \
|
||||
rm -Rf /etc/letsencrypt/renewal/$domains.conf" certbot
|
||||
echo
|
||||
|
||||
|
||||
echo "### Requesting Let's Encrypt certificate for $domains ..."
|
||||
#Join $domains to -d args
|
||||
domain_args=""
|
||||
for domain in "${domains[@]}"; do
|
||||
domain_args="$domain_args -d $domain"
|
||||
done
|
||||
|
||||
# Select appropriate email arg
|
||||
case "$email" in
|
||||
"") email_arg="--register-unsafely-without-email" ;;
|
||||
*) email_arg="--email $email" ;;
|
||||
esac
|
||||
|
||||
# Enable staging mode if needed
|
||||
if [ $staging != "0" ]; then staging_arg="--staging"; fi
|
||||
|
||||
docker-compose run --rm --entrypoint "\
|
||||
certbot certonly --webroot -w /var/www/certbot \
|
||||
$staging_arg \
|
||||
$email_arg \
|
||||
$domain_args \
|
||||
--rsa-key-size $rsa_key_size \
|
||||
--agree-tos \
|
||||
--force-renewal" certbot
|
||||
echo
|
||||
|
||||
echo "### Reloading nginx ..."
|
||||
docker-compose exec nginx nginx -s reload
|
||||
82
init/init.sh
Executable file
82
init/init.sh
Executable file
@@ -0,0 +1,82 @@
|
||||
#!/bin/bash
|
||||
|
||||
set -e
|
||||
#set -x
|
||||
|
||||
# basic script to generate templated config for our various docker images.
|
||||
# it runs in its own alpine docker image to pull in yq as a dep, and to let the whole thing be managed by docker-compose.
|
||||
|
||||
# by this point, synapse & mas should generated default config files & secrets
|
||||
# via generate-synapse-secrets.sh and generate-mas-secrets.sh
|
||||
|
||||
if [[ ! -f /secrets/synapse/${DOMAIN}.signing.key ]] # TODO: check for existence of other secrets?
|
||||
then
|
||||
# extract synapse secrets from the config and move them into ./secrets
|
||||
echo "Extracting generated synapse secrets..."
|
||||
mkdir -p /secrets/synapse
|
||||
for secret in registration_shared_secret macaroon_secret_key form_secret
|
||||
do
|
||||
yq .$secret /data/synapse/homeserver.yaml.default > /secrets/synapse/$secret
|
||||
done
|
||||
# ...and files too, just to keep all our secrets in one place
|
||||
mv /data/synapse/${DOMAIN}.signing.key /secrets/synapse
|
||||
fi
|
||||
|
||||
if [[ ! -f /secrets/mas/secrets ]] # TODO: check for existence of other secrets?
|
||||
then
|
||||
echo "Extracting generated MAS secrets..."
|
||||
mkdir -p /secrets/mas
|
||||
# extract MAS secrets from the config and move them into ./secrets
|
||||
for secret in matrix.secret
|
||||
do
|
||||
yq .$secret /data/mas/config.yaml.default > /secrets/mas/$secret
|
||||
done
|
||||
yq '(.secrets) as $s
|
||||
ireduce({}; setpath($s | path; $s))' /data/mas/config.yaml.default > /secrets/mas/secrets
|
||||
head -c16 /dev/urandom | base64 | tr -d '=' > /secrets/mas/client.secret
|
||||
fi
|
||||
|
||||
if [[ ! -f /secrets/postgres/postgres_password ]]
|
||||
then
|
||||
mkdir -p /secrets/postgres
|
||||
head -c16 /dev/urandom | base64 | tr -d '=' > /secrets/postgres/postgres_password
|
||||
fi
|
||||
|
||||
# TODO: compare the default generated config with our templates to see if our templates are stale
|
||||
# we'd have to strip out the secrets from the generated configs to be able to diff them sensibly
|
||||
|
||||
# now we have our secrets extracted from the default configs, overwrite the configs with our templates
|
||||
|
||||
# for simplicity, we just use envsubst for now rather than ansible+jinja or something.
|
||||
template() {
|
||||
dir=$1
|
||||
echo "Templating configs in $dir"
|
||||
for file in `find $dir -type f`
|
||||
do
|
||||
mkdir -p `dirname ${file/-template/}`
|
||||
envsubst < $file > ${file/-template/}
|
||||
done
|
||||
}
|
||||
|
||||
export CONFIG_HEADER="# WARNING: This file is autogenerated by element-quick-start from templates"
|
||||
(
|
||||
export SECRETS_SYNAPSE_REGISTRATION_SHARED_SECRET=$(</secrets/synapse/registration_shared_secret)
|
||||
export SECRETS_SYNAPSE_MACAROON_SECRET_KEY=$(</secrets/synapse/macaroon_secret_key)
|
||||
export SECRETS_SYNAPSE_FORM_SECRET=$(</secrets/synapse/form_secret)
|
||||
export SECRETS_MAS_MATRIX_SECRET=$(</secrets/mas/matrix.secret)
|
||||
export SECRETS_MAS_CLIENT_SECRET=$(</secrets/mas/client.secret)
|
||||
export SECRETS_POSTGRES_PASSWORD=$(</secrets/postgres/postgres_password)
|
||||
template "/data-template/synapse"
|
||||
)
|
||||
|
||||
(
|
||||
export SECRETS_MAS_SECRETS=$(</secrets/mas/secrets)
|
||||
export SECRETS_MAS_MATRIX_SECRET=$(</secrets/mas/matrix.secret)
|
||||
export SECRETS_MAS_CLIENT_SECRET=$(</secrets/mas/client.secret)
|
||||
export SECRETS_POSTGRES_PASSWORD=$(</secrets/postgres/postgres_password)
|
||||
template "/data-template/mas"
|
||||
)
|
||||
|
||||
template "/data-template/element-web"
|
||||
template "/data-template/element-call"
|
||||
template "/data-template/nginx"
|
||||
Reference in New Issue
Block a user