Compare commits
7 Commits
Author | SHA1 | Date | |
---|---|---|---|
e9f84f8fd8 | |||
ef719bcee4 | |||
309122240a | |||
fd3c7a606a | |||
ad6a1c87dd | |||
cfbd809761 | |||
2d78fff08f |
64
.env.sample
64
.env.sample
@ -1,64 +0,0 @@
|
|||||||
TYPE=matrix-synapse
|
|
||||||
|
|
||||||
DOMAIN=matrix.example.com
|
|
||||||
LETS_ENCRYPT_ENV=production
|
|
||||||
|
|
||||||
SECRET_DB_PASSWORD_VERSION=v1
|
|
||||||
|
|
||||||
SYNAPSE_ADMIN_EMAIL=admin@example.com
|
|
||||||
|
|
||||||
SECRET_REGISTRATION_SHARED_SECRET_VERSION=v1
|
|
||||||
SECRET_MACAROON_SECRET_KEY_VERSION=v1
|
|
||||||
SECRET_FORM_SECRET_VERSION=v1
|
|
||||||
|
|
||||||
COMPOSE_FILE="compose.yml"
|
|
||||||
|
|
||||||
#DISABLE_FEDERATION=1
|
|
||||||
|
|
||||||
# Set "true" to enable federation endpoint on $DOMAIN/.well-known/matrix/server
|
|
||||||
SERVE_SERVER_WELLKNOWN=false
|
|
||||||
|
|
||||||
ENABLE_REGISTRATION=false
|
|
||||||
PASSWORD_LOGIN_ENABLED=true
|
|
||||||
|
|
||||||
#AUTO_JOIN_ROOM_ENABLED=1
|
|
||||||
#AUTO_JOIN_ROOM="#example:example.com"
|
|
||||||
|
|
||||||
SQL_LOG_LEVEL=WARN
|
|
||||||
ROOT_LOG_LEVEL=WARN
|
|
||||||
|
|
||||||
REDACTION_RETENTION_PERIOD=7d
|
|
||||||
|
|
||||||
RETENTION_MAX_LIFETIME=1m
|
|
||||||
|
|
||||||
ENABLE_3PID_LOOKUP=true
|
|
||||||
|
|
||||||
USER_IPS_MAX_AGE=1d
|
|
||||||
|
|
||||||
ENCRYPTED_BY_DEFAULT=all
|
|
||||||
|
|
||||||
#ENABLE_ALLOWLIST=1
|
|
||||||
#FEDERATION_ALLOWLIST="[]"
|
|
||||||
|
|
||||||
#COMPOSE_FILE="compose.yml:compose.keycloak.yml"
|
|
||||||
#KEYCLOAK_ENABLED=1
|
|
||||||
#KEYCLOAK_NAME=
|
|
||||||
#KEYCLOAK_URL=
|
|
||||||
#KEYCLOAK_CLIENT_ID=
|
|
||||||
#KEYCLOAK_CLIENT_DOMAIN=
|
|
||||||
#SECRET_KEYCLOAK_CLIENT_SECRET_VERSION=v1
|
|
||||||
|
|
||||||
#COMPOSE_FILE="compose.yml:compose.turn.yml"
|
|
||||||
#TURN_ENABLED=1
|
|
||||||
#TURN_URIS="[\"turns:coturn.foo.zone?transport=udp\", \"turns:coturn.foo.zone?transport=tcp\"]"
|
|
||||||
#TURN_ALLOW_GUESTS=true
|
|
||||||
#SECRET_TURN_SHARED_SECRET_VERSION=v1
|
|
||||||
|
|
||||||
#COMPOSE_FILE="compose.yml:compose.smtp.yml"
|
|
||||||
#SMTP_ENABLED=1
|
|
||||||
#SMTP_APP_NAME=
|
|
||||||
#SMTP_FROM=
|
|
||||||
#SMTP_HOST=
|
|
||||||
#SMTP_PORT=
|
|
||||||
#SMTP_USER=
|
|
||||||
#SECRET_SMTP_PASSWORD_VERSION=v1
|
|
11
.envrc.sample
Normal file
11
.envrc.sample
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
export STACK_NAME=matrix
|
||||||
|
export APP=matrix
|
||||||
|
|
||||||
|
export DOMAIN=matrix.example.com
|
||||||
|
export LETS_ENCRYPT_ENV=production
|
||||||
|
|
||||||
|
export ENTRYPOINT_CONF_VERSION=v1
|
||||||
|
|
||||||
|
## TURN server
|
||||||
|
#export TURNSERVER_CONF_VERSION=v1
|
||||||
|
#export COTURN_SHARED_SECRET_VERSION=v1
|
3
.gitignore
vendored
3
.gitignore
vendored
@ -1,2 +1 @@
|
|||||||
.envrc
|
/.envrc
|
||||||
synapse
|
|
||||||
|
94
README.md
94
README.md
@ -1,81 +1,19 @@
|
|||||||
# Matrix (Synapse)
|
# Matrix Synapse
|
||||||
|
|
||||||
<!-- metadata -->
|
Matrix Synapse, based on the [official `matrixdotorg/synapse`
|
||||||
|
image][synapse-docker].
|
||||||
|
|
||||||
* **Category**: Apps
|
1. Set up Docker Swarm and [`abra`][abra]
|
||||||
* **Status**: 0, work-in-progress
|
2. Deploy [`compose-stacks/traefik`][compose-traefik]
|
||||||
* **Image**: [`matrixdotorg/synapse`](https://hub.docker.com/r/matrixdotorg/synapse), 4, upstream
|
2. `cp .envrc.sample .envrc`
|
||||||
* **Healthcheck**: Yes
|
3. Edit `.envrc` - be sure to change `$DOMAIN` to something that resolves to
|
||||||
* **Backups**: No
|
your Docker swarm box
|
||||||
* **Email**: Yes
|
4. `direnv allow` (or `. .envrc`)
|
||||||
* **Tests**: No
|
4. `abra secret_generate coturn_shared_secret`
|
||||||
* **SSO**: Yes
|
5. `abra deploy`
|
||||||
|
6. `abra service_run synapse` to open a shell
|
||||||
|
7. `abra register_new_matrix_user`
|
||||||
|
|
||||||
<!-- endmetadata -->
|
[synapse-docker]: https://hub.docker.com/r/matrixdotorg/synapse
|
||||||
|
[abra]: https://git.autonomic.zone/autonomic-cooperative/abra
|
||||||
## Basic usage
|
[compose-traefik]: https://git.autonomic.zone/compose-stacks/traefik
|
||||||
|
|
||||||
1. Set up Docker Swarm and [`abra`](https://docs.coopcloud.tech/abra/)
|
|
||||||
2. Deploy [`coop-cloud/traefik`](https://git.coopcloud.tech/coop-cloud/traefik)
|
|
||||||
3. `abra app new matrix-synapse --secrets` (optionally with `--pass` if you'd like to save secrets in `pass`)
|
|
||||||
4. `abra app YOURAPPDOMAIN config` - be sure to change `$DOMAIN` to something that resolves to your Docker swarm box
|
|
||||||
5. `abra app YOURAPPDOMAIN deploy`
|
|
||||||
6. Create an initial user: `abra app YOURAPPDOMAIN run app register_new_matrix_user -c /data/homeserver.yaml http://localhost:8008`
|
|
||||||
|
|
||||||
## Tips & Tricks
|
|
||||||
|
|
||||||
### Disabling federation
|
|
||||||
|
|
||||||
> We're not sure this does it exactly and there is still a discussion running
|
|
||||||
> upstrem about whether this is the right way to do it & whether it could be
|
|
||||||
> more convenient. We welcome issues / change sets to close up more federation
|
|
||||||
> functionality.
|
|
||||||
|
|
||||||
- use `DISABLE_FEDERATION=1` to turn off federation listeners
|
|
||||||
- don't use [`compose.matrix.yml`](https://git.coopcloud.tech/coop-cloud/traefik/src/branch/master/compose.matrix.yml) in your traefik config to keep the federation ports closed
|
|
||||||
|
|
||||||
### Enabling federation
|
|
||||||
|
|
||||||
See [`#27`](https://git.coopcloud.tech/coop-cloud/matrix-synapse/pulls/27) for more.
|
|
||||||
|
|
||||||
Depending on your setup, using `SERVE_SERVER_WELLKNOWN=true` might work to start federating.
|
|
||||||
|
|
||||||
### Seeing what changed in `homeserver.yaml` between versions
|
|
||||||
|
|
||||||
Change the version range to suit your needs.
|
|
||||||
|
|
||||||
```
|
|
||||||
git clone https://github.com/matrix-org/synapse
|
|
||||||
cd synapse/docs
|
|
||||||
git log --follow -p v1.48.0..v1.51.0 sample_config.yaml
|
|
||||||
```
|
|
||||||
|
|
||||||
### Generating a new `homeserver.yaml`
|
|
||||||
|
|
||||||
The default is also available to see [here](https://matrix-org.github.io/synapse/latest/usage/configuration/homeserver_sample_config.html).
|
|
||||||
|
|
||||||
```
|
|
||||||
docker run -it \
|
|
||||||
--entrypoint="" \
|
|
||||||
-e SYNAPSE_SERVER_NAME=foo.com \
|
|
||||||
-e SYNAPSE_REPORT_STATS=no \
|
|
||||||
matrixdotorg/synapse:v1.48.0 \
|
|
||||||
sh -c '/start.py generate; cat /data/homeserver.yaml' > homeserver.yaml.tmpl`
|
|
||||||
```
|
|
||||||
|
|
||||||
### Generating a new `<server>.log.config`
|
|
||||||
|
|
||||||
```
|
|
||||||
docker run -it \
|
|
||||||
--entrypoint="" \
|
|
||||||
-e SYNAPSE_SERVER_NAME=foo.com \
|
|
||||||
-e SYNAPSE_REPORT_STATS=no \
|
|
||||||
matrixdotorg/synapse:v1.48.0 \
|
|
||||||
sh -c '/start.py generate; cat /data/foo.com.log.config' > log.config
|
|
||||||
```
|
|
||||||
|
|
||||||
### Getting client discovery on a custom domain
|
|
||||||
|
|
||||||
You'll need to deploy something like [this](https://git.autonomic.zone/ruangrupa/well-known-uris).
|
|
||||||
|
|
||||||
This could be implemented in this recipe but we haven't merged it in yet. Chang sets are welcome.
|
|
||||||
|
3
abra-commands.sh
Normal file
3
abra-commands.sh
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
sub_register_new_matrix_user() {
|
||||||
|
abra run synapse register_new_matrix_user -c /data/homeserver.yaml http://localhost:8008
|
||||||
|
}
|
3
abra.sh
3
abra.sh
@ -1,3 +0,0 @@
|
|||||||
export ENTRYPOINT_CONF_VERSION=v1
|
|
||||||
export HOMESERVER_YAML_VERSION=v8
|
|
||||||
export LOG_CONFIG_VERSION=v2
|
|
35
compose.coturn.yml
Normal file
35
compose.coturn.yml
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
services:
|
||||||
|
app:
|
||||||
|
environment:
|
||||||
|
- TURN_SERVER=${DOMAIN}
|
||||||
|
- TURN_PORT=3478
|
||||||
|
secrets:
|
||||||
|
- coturn_shared_secret
|
||||||
|
|
||||||
|
coturn:
|
||||||
|
image: instrumentisto/coturn:latest
|
||||||
|
networks:
|
||||||
|
- swarm_host
|
||||||
|
secrets:
|
||||||
|
- coturn_shared_secret
|
||||||
|
configs:
|
||||||
|
- source: turnserver_conf
|
||||||
|
target: /etc/coturn/turnserver.conf
|
||||||
|
|
||||||
|
configs:
|
||||||
|
turnserver_conf:
|
||||||
|
name: ${STACK_NAME}_turnserver_conf_${TURNSERVER_CONF_VERSION}
|
||||||
|
file: turnserver.conf.tmpl
|
||||||
|
template_driver: golang
|
||||||
|
|
||||||
|
secrets:
|
||||||
|
coturn_shared_secret:
|
||||||
|
external: true
|
||||||
|
name: ${STACK_NAME}_coturn_shared_secret_${COTURN_SHARED_SECRET_VERSION}
|
||||||
|
|
||||||
|
networks:
|
||||||
|
# use host-mode networking until Docker can handle mass port-forwards:
|
||||||
|
# https://github.com/moby/moby/issues/11185
|
||||||
|
swarm_host:
|
||||||
|
external:
|
||||||
|
name: 'host'
|
@ -1,22 +0,0 @@
|
|||||||
---
|
|
||||||
version: "3.8"
|
|
||||||
|
|
||||||
services:
|
|
||||||
app:
|
|
||||||
secrets:
|
|
||||||
- db_password
|
|
||||||
- form_secret
|
|
||||||
- keycloak_client_secret
|
|
||||||
- macaroon_secret_key
|
|
||||||
- registration_shared_secret
|
|
||||||
environment:
|
|
||||||
- KEYCLOAK_CLIENT_DOMAIN
|
|
||||||
- KEYCLOAK_CLIENT_ID
|
|
||||||
- KEYCLOAK_ENABLED
|
|
||||||
- KEYCLOAK_NAME
|
|
||||||
- KEYCLOAK_URL
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
keycloak_client_secret:
|
|
||||||
external: true
|
|
||||||
name: ${STACK_NAME}_keycloak_client_secret_${SECRET_KEYCLOAK_CLIENT_SECRET_VERSION}
|
|
@ -1,17 +0,0 @@
|
|||||||
---
|
|
||||||
version: "3.8"
|
|
||||||
|
|
||||||
services:
|
|
||||||
app:
|
|
||||||
secrets:
|
|
||||||
- keycloak2_client_secret
|
|
||||||
environment:
|
|
||||||
- KEYCLOAK2_CLIENT_ID
|
|
||||||
- KEYCLOAK2_ENABLED
|
|
||||||
- KEYCLOAK2_NAME
|
|
||||||
- KEYCLOAK2_URL
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
keycloak2_client_secret:
|
|
||||||
external: true
|
|
||||||
name: ${STACK_NAME}_keycloak2_client_secret_${SECRET_KEYCLOAK2_CLIENT_SECRET_VERSION}
|
|
@ -1,23 +0,0 @@
|
|||||||
---
|
|
||||||
version: "3.8"
|
|
||||||
|
|
||||||
services:
|
|
||||||
app:
|
|
||||||
secrets:
|
|
||||||
- db_password
|
|
||||||
- form_secret
|
|
||||||
- macaroon_secret_key
|
|
||||||
- registration_shared_secret
|
|
||||||
- smtp_password
|
|
||||||
environment:
|
|
||||||
- SMTP_APP_NAME
|
|
||||||
- SMTP_ENABLED
|
|
||||||
- SMTP_FROM
|
|
||||||
- SMTP_HOST
|
|
||||||
- SMTP_PORT
|
|
||||||
- SMTP_USER
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
smtp_password:
|
|
||||||
external: true
|
|
||||||
name: ${STACK_NAME}_smtp_password_${SECRET_SMTP_PASSWORD_VERSION}
|
|
@ -1,20 +0,0 @@
|
|||||||
---
|
|
||||||
version: "3.8"
|
|
||||||
|
|
||||||
services:
|
|
||||||
app:
|
|
||||||
secrets:
|
|
||||||
- db_password
|
|
||||||
- form_secret
|
|
||||||
- macaroon_secret_key
|
|
||||||
- registration_shared_secret
|
|
||||||
- turn_shared_secret
|
|
||||||
environment:
|
|
||||||
- TURN_ALLOW_GUESTS
|
|
||||||
- TURN_ENABLED
|
|
||||||
- TURN_URIS
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
turn_shared_secret:
|
|
||||||
external: true
|
|
||||||
name: ${STACK_NAME}_turn_shared_secret_${SECRET_TURN_SHARED_SECRET_VERSION}
|
|
102
compose.yml
102
compose.yml
@ -3,117 +3,47 @@ version: "3.8"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
app:
|
app:
|
||||||
image: "matrixdotorg/synapse:v1.55.2"
|
image: "matrixdotorg/synapse:v1.9.1"
|
||||||
volumes:
|
volumes:
|
||||||
- "data:/data"
|
- "synapse:/data"
|
||||||
secrets:
|
|
||||||
- db_password
|
|
||||||
- registration_shared_secret
|
|
||||||
- macaroon_secret_key
|
|
||||||
- form_secret
|
|
||||||
environment:
|
environment:
|
||||||
- ENCRYPTED_BY_DEFAULT
|
|
||||||
- AUTO_JOIN_ROOM
|
|
||||||
- AUTO_JOIN_ROOM_ENABLED
|
|
||||||
- DISABLE_FEDERATION
|
|
||||||
- DOMAIN
|
|
||||||
- ENABLE_3PID_LOOKUP
|
|
||||||
- ENABLE_ALLOWLIST
|
|
||||||
- ENABLE_REGISTRATION
|
|
||||||
- FEDERATION_ALLOWLIST
|
|
||||||
- LETSENCRYPT_HOST=${DOMAIN}
|
|
||||||
- PASSWORD_LOGIN_ENABLED
|
|
||||||
- REDACTION_RETENTION_PERIOD
|
|
||||||
- ROOT_LOG_LEVEL
|
|
||||||
- SERVE_SERVER_WELLKNOWN
|
|
||||||
- SQL_LOG_LEVEL
|
|
||||||
- STACK_NAME
|
|
||||||
- SYNAPSE_ADMIN_EMAIL
|
|
||||||
- SYNAPSE_REPORT_STATS=no
|
|
||||||
- SYNAPSE_SERVER_NAME=${DOMAIN}
|
|
||||||
- USER_IPS_MAX_AGE
|
|
||||||
- VIRTUAL_HOST=${DOMAIN}
|
- VIRTUAL_HOST=${DOMAIN}
|
||||||
- VIRTUAL_PORT=8008
|
- VIRTUAL_PORT=8008
|
||||||
networks:
|
- LETSENCRYPT_HOST=${DOMAIN}
|
||||||
|
- SYNAPSE_SERVER_NAME=${DOMAIN}
|
||||||
|
- SYNAPSE_REPORT_STATS=no
|
||||||
|
networks:
|
||||||
- proxy
|
- proxy
|
||||||
- internal
|
|
||||||
entrypoint: /docker-entrypoint.sh
|
|
||||||
configs:
|
configs:
|
||||||
- source: homeserver_yaml
|
|
||||||
target: /data/homeserver.yaml
|
|
||||||
- source: log_config
|
|
||||||
target: /data/log.config
|
|
||||||
- source: entrypoint_conf
|
- source: entrypoint_conf
|
||||||
target: /docker-entrypoint.sh
|
target: /docker-entrypoint.sh
|
||||||
mode: 0555
|
mode: 0555
|
||||||
|
entrypoint: /docker-entrypoint.sh
|
||||||
deploy:
|
deploy:
|
||||||
restart_policy:
|
restart_policy:
|
||||||
condition: on-failure
|
condition: on-failure
|
||||||
|
delay: "60s"
|
||||||
|
max_attempts: 3
|
||||||
|
window: 120s
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.services.${STACK_NAME}.loadbalancer.server.port=8008"
|
- "traefik.http.services.${STACK_NAME}.loadbalancer.server.port=8008"
|
||||||
- "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`)"
|
- "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`${EXTRA_DOMAINS})"
|
||||||
- "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure"
|
|
||||||
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
||||||
- "coop-cloud.${STACK_NAME}.version=1.3.0+v1.55.2"
|
- "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
||||||
db:
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
||||||
image: postgres:13-alpine
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
secrets:
|
|
||||||
- db_password
|
|
||||||
environment:
|
|
||||||
- LC_COLLATE=C
|
|
||||||
- LC_CTYPE=C
|
|
||||||
- POSTGRES_DB=synapse
|
|
||||||
- POSTGRES_INITDB_ARGS="-E \"UTF8\""
|
|
||||||
- POSTGRES_PASSWORD_FILE=/run/secrets/db_password
|
|
||||||
- POSTGRES_USER=synapse
|
|
||||||
networks:
|
|
||||||
- internal
|
|
||||||
healthcheck:
|
|
||||||
test: ["CMD", "pg_isready", "-U", "synapse"]
|
|
||||||
volumes:
|
|
||||||
- postgres:/var/lib/postgresql/data
|
|
||||||
deploy:
|
|
||||||
labels:
|
|
||||||
backupbot.backup: "true"
|
|
||||||
backupbot.backup.pre-hook: "mkdir -p /tmp/backup/ && PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /tmp/backup/backup.sql"
|
|
||||||
backupbot.backup.post-hook: "rm -rf /tmp/backup"
|
|
||||||
backupbot.backup.path: "/tmp/backup/"
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
data:
|
synapse:
|
||||||
postgres:
|
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
proxy:
|
proxy:
|
||||||
external: true
|
external: true
|
||||||
internal:
|
|
||||||
|
|
||||||
configs:
|
configs:
|
||||||
entrypoint_conf:
|
entrypoint_conf:
|
||||||
name: ${STACK_NAME}_entrypoint_${ENTRYPOINT_CONF_VERSION}
|
name: ${STACK_NAME}_entrypoint_${ENTRYPOINT_CONF_VERSION}
|
||||||
file: entrypoint.sh.tmpl
|
file: entrypoint.sh.tmpl
|
||||||
template_driver: golang
|
template_driver: golang
|
||||||
homeserver_yaml:
|
|
||||||
name: ${STACK_NAME}_homserver_yaml_${HOMESERVER_YAML_VERSION}
|
|
||||||
file: homeserver.yaml.tmpl
|
|
||||||
template_driver: golang
|
|
||||||
log_config:
|
|
||||||
name: ${STACK_NAME}_log_config_${LOG_CONFIG_VERSION}
|
|
||||||
file: log.config.tmpl
|
|
||||||
template_driver: golang
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
db_password:
|
|
||||||
external: true
|
|
||||||
name: ${STACK_NAME}_db_password_${SECRET_DB_PASSWORD_VERSION}
|
|
||||||
registration_shared_secret:
|
|
||||||
external: true
|
|
||||||
name: ${STACK_NAME}_db_password_${SECRET_REGISTRATION_SHARED_SECRET_VERSION}
|
|
||||||
macaroon_secret_key:
|
|
||||||
external: true
|
|
||||||
name: ${STACK_NAME}_db_password_${SECRET_MACAROON_SECRET_KEY_VERSION}
|
|
||||||
form_secret:
|
|
||||||
external: true
|
|
||||||
name: ${STACK_NAME}_db_password_${SECRET_FORM_SECRET_VERSION}
|
|
||||||
|
@ -1,11 +1,18 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
# https://github.com/matrix-org/synapse/tree/develop/docker#running-synapse
|
if [[ ! -f /data/homeserver.yaml ]]; then
|
||||||
# default user permissions for the synapse user
|
/start.py generate
|
||||||
chown 991:991 /data
|
|
||||||
|
|
||||||
if [[ ! -f /data/{{ env "DOMAIN" }}.signing.key ]]; then
|
apt update && apt install -y wget
|
||||||
/start.py generate
|
wget https://github.com/mikefarah/yq/releases/download/3.3.2/yq_linux_amd64 && \
|
||||||
|
chmod +x yq_linux_amd64 && \
|
||||||
|
mv yq_linux_amd64 /bin/yq
|
||||||
|
|
||||||
|
# turn (https://github.com/matrix-org/synapse/blob/master/docs/turn-howto.md#synapse-setup)
|
||||||
|
yq w -i /data/homeserver.yaml turn_uris "[]"
|
||||||
|
yq w -i /data/homeserver.yaml turn_uris\[0\] "turn:${TURN_SERVER}:${TURN_PORT}?transport=udp"
|
||||||
|
yq w -i /data/homeserver.yaml turn_uris\[1\] "turn:${TURN_SERVER}:${TURN_PORT}?transport=tcp"
|
||||||
|
yq w -i /data/homeserver.yaml coturn_shared_secret "$(tr -d \"\n\" < /run/secrets/coturn_shared_secret)"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
/start.py
|
/start.py
|
||||||
|
6
gen.sh
Executable file
6
gen.sh
Executable file
@ -0,0 +1,6 @@
|
|||||||
|
secret="screw\$naval5seem!herb" && \
|
||||||
|
time=$(date +%s) && \
|
||||||
|
expiry=8400 && \
|
||||||
|
username=$(( $time + $expiry )) &&\
|
||||||
|
echo username:$username && \
|
||||||
|
echo password : $(echo -n $username | openssl dgst -binary -sha1 -hmac $secret | openssl base64)
|
2632
homeserver.yaml.tmpl
2632
homeserver.yaml.tmpl
File diff suppressed because it is too large
Load Diff
@ -1,20 +0,0 @@
|
|||||||
version: 1
|
|
||||||
|
|
||||||
formatters:
|
|
||||||
precise:
|
|
||||||
format: '%(asctime)s - %(name)s - %(lineno)d - %(levelname)s - %(request)s - %(message)s'
|
|
||||||
|
|
||||||
handlers:
|
|
||||||
console:
|
|
||||||
class: logging.StreamHandler
|
|
||||||
formatter: precise
|
|
||||||
|
|
||||||
loggers:
|
|
||||||
synapse.storage.SQL:
|
|
||||||
level: {{ env "SQL_LOG_LEVEL" }}
|
|
||||||
|
|
||||||
root:
|
|
||||||
level: {{ env "ROOT_LOG_LEVEL" }}
|
|
||||||
handlers: [console]
|
|
||||||
|
|
||||||
disable_existing_loggers: false
|
|
@ -1,6 +0,0 @@
|
|||||||
The deployment failed due to the app/db getting confused. I think this is just
|
|
||||||
due to the recipe not having good healthcheck config. After the app container
|
|
||||||
flapped a bit, everything came up nicely. d1 @ autonomic co-op.
|
|
||||||
|
|
||||||
Same thing happened to me when deploying this for another instance. Also d1 @
|
|
||||||
autonomic co-op.
|
|
15
turnserver.conf.tmpl
Normal file
15
turnserver.conf.tmpl
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
use-auth-secret
|
||||||
|
static-auth-secret={{ secret "coturn_shared_secret" }}
|
||||||
|
realm=turn.{{ env "DOMAIN" }}
|
||||||
|
|
||||||
|
log-file=stdout
|
||||||
|
pidfile=/var/tmp/turnserver.pid
|
||||||
|
userdb=/var/tmp/turnserver.db
|
||||||
|
|
||||||
|
no-cli
|
||||||
|
|
||||||
|
no-tls
|
||||||
|
no-dtls
|
||||||
|
|
||||||
|
prod
|
||||||
|
no-tcp-relay
|
Reference in New Issue
Block a user