Compare commits
74 Commits
5f7701c288
...
feature/23
| Author | SHA1 | Date | |
|---|---|---|---|
|
6607474370
|
|||
| ec9b912e45 | |||
|
d53ba42a1d
|
|||
|
a99f7f7574
|
|||
|
1c8ee14bb3
|
|||
| cdedf49be3 | |||
|
5e727ec279
|
|||
|
9d928298d2
|
|||
|
1174661b46
|
|||
| 2dff7cf850 | |||
|
232360efba
|
|||
|
8b8e8f3438
|
|||
|
522c213b09
|
|||
|
80eddfbf56
|
|||
|
7e664723a1
|
|||
|
f5961af7fe
|
|||
|
d1301dad3e
|
|||
|
42c46a5645
|
|||
|
5be9081613
|
|||
|
1649d03665
|
|||
|
b9a3910364
|
|||
|
9835b85181
|
|||
|
dbccd9d2bf
|
|||
|
1a5f312699
|
|||
| f843a31e03 | |||
|
ff313525c8
|
|||
|
cfb379741e
|
|||
|
0c29fad404
|
|||
| 416935d8b5 | |||
|
2b6f81c5d6
|
|||
| 18496bb0da | |||
|
d878b4208e
|
|||
|
d31440d235
|
|||
|
6f287f14ef
|
|||
|
b77df3d0db
|
|||
| f7f5a0069d | |||
|
989185f951
|
|||
|
4cbda69a6b
|
|||
|
6931fe05d0
|
|||
|
b248ef70db
|
|||
|
45159ad4e7
|
|||
| 612cd0c55e | |||
|
83380047bb
|
|||
|
8aebb386a4
|
|||
| a8c4f0bd0e | |||
|
12b4fb37fa
|
|||
|
263eb88b72
|
|||
|
25ee38fe27
|
|||
| e701938442 | |||
| 309bc45791 | |||
|
82a4af05ef
|
|||
|
4a8ab3abe3
|
|||
|
21de964e1b
|
|||
|
b4ddfd19e3
|
|||
|
08c604962c
|
|||
| 089574d0de | |||
|
d19a8eebfb
|
|||
|
c0487d0e13
|
|||
|
023a4261cd
|
|||
|
fea65404cf
|
|||
| 5139f242a4 | |||
|
9c2aa9faaa
|
|||
|
164b974eb8
|
|||
|
6e4cc48068
|
|||
|
c2bd03dc23
|
|||
|
210a83a686
|
|||
| 49db14869d | |||
| 000a13cec4 | |||
|
e1007f7886
|
|||
|
292366a77f
|
|||
|
ed998fc1d3
|
|||
|
8a97ebf4f8
|
|||
|
ca3f06f831
|
|||
|
1576a8e731
|
6
.gitmodules
vendored
6
.gitmodules
vendored
@@ -4,3 +4,9 @@
|
|||||||
[submodule "site-cookbooks/openresty"]
|
[submodule "site-cookbooks/openresty"]
|
||||||
path = site-cookbooks/openresty
|
path = site-cookbooks/openresty
|
||||||
url = https://github.com/67P/chef-openresty.git
|
url = https://github.com/67P/chef-openresty.git
|
||||||
|
[submodule "site-cookbooks/strfry"]
|
||||||
|
path = site-cookbooks/strfry
|
||||||
|
url = git@gitea.kosmos.org:kosmos/strfry-cookbook.git
|
||||||
|
[submodule "site-cookbooks/deno"]
|
||||||
|
path = site-cookbooks/deno
|
||||||
|
url = git@gitea.kosmos.org:kosmos/deno-cookbook.git
|
||||||
|
|||||||
@@ -21,6 +21,7 @@ cookbook 'composer', '~> 2.7.0'
|
|||||||
cookbook 'fail2ban', '~> 7.0.4'
|
cookbook 'fail2ban', '~> 7.0.4'
|
||||||
cookbook 'git', '~> 10.0.0'
|
cookbook 'git', '~> 10.0.0'
|
||||||
cookbook 'golang', '~> 5.3.1'
|
cookbook 'golang', '~> 5.3.1'
|
||||||
|
cookbook 'gpg', '~> 2.0.13'
|
||||||
cookbook 'hostname', '= 0.4.2'
|
cookbook 'hostname', '= 0.4.2'
|
||||||
cookbook 'hostsfile', '~> 3.0.1'
|
cookbook 'hostsfile', '~> 3.0.1'
|
||||||
cookbook 'java', '~> 4.3.0'
|
cookbook 'java', '~> 4.3.0'
|
||||||
|
|||||||
@@ -8,6 +8,7 @@ DEPENDENCIES
|
|||||||
firewall (~> 6.2.16)
|
firewall (~> 6.2.16)
|
||||||
git (~> 10.0.0)
|
git (~> 10.0.0)
|
||||||
golang (~> 5.3.1)
|
golang (~> 5.3.1)
|
||||||
|
gpg (~> 2.0.13)
|
||||||
hostname (= 0.4.2)
|
hostname (= 0.4.2)
|
||||||
hostsfile (~> 3.0.1)
|
hostsfile (~> 3.0.1)
|
||||||
ipfs
|
ipfs
|
||||||
@@ -59,6 +60,8 @@ GRAPH
|
|||||||
git (10.0.0)
|
git (10.0.0)
|
||||||
golang (5.3.1)
|
golang (5.3.1)
|
||||||
ark (>= 6.0)
|
ark (>= 6.0)
|
||||||
|
gpg (2.0.13)
|
||||||
|
yum-epel (>= 0.0.0)
|
||||||
homebrew (5.4.1)
|
homebrew (5.4.1)
|
||||||
hostname (0.4.2)
|
hostname (0.4.2)
|
||||||
hostsfile (>= 0.0.0)
|
hostsfile (>= 0.0.0)
|
||||||
|
|||||||
@@ -1,4 +0,0 @@
|
|||||||
{
|
|
||||||
"name": "garage-3",
|
|
||||||
"public_key": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtRSB8/ObjvQq6WuOVS/f\nypdX/2fLsUlt5tQ8GNuSY9rSM8gdvcXUvnPlxthZO4yvcPX85wmtBZX8fRJFdkJg\nYRCJbuVKO9sLTq8OUWXYpfU1q10FUhl034zxOMslpxVB6toirnk025vyq9jbuKP+\nYO+c40KZr67mgm0hveJfylayfiKP1HGm4HrV0maFivCgC8D+MPDDv75CsqRe5WSc\nh2CoauDJwVlhKZ92yq87ugGBhJJRUGOQZcfEvkUGj/HNAS6tuHl8YmVmhO8hBdee\nNto6RF54E1zB80R9oT/qitw23miEyUcHHVxhTR4tTWflZgd8l4wDOhX3Nf20xknu\nFQIDAQAB\n-----END PUBLIC KEY-----\n"
|
|
||||||
}
|
|
||||||
4
clients/garage-8.json
Normal file
4
clients/garage-8.json
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
{
|
||||||
|
"name": "garage-8",
|
||||||
|
"public_key": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt4hXODzgHsIeWxXJm/F6\nSTFJ8JC89mWru7pOFzPWenOVMHgp4UpUB4rDTwQqojsWTDiq0x3ckUyOPw3Nj0jv\nxP4MMGS4SI0oRSJKzrYYss0hgUDTOBBd+Wxn0UiNEpN/PfQo9VZj9v/jak57cz7z\n5+rpl5v27fhgUIChjsHxdy+EamvCrYc+1JhyrLOlwlt8JxkZ8UPhoeZLWAbDgGLS\nEzHWSSVtBUPK+KYmVb2OK4lB56zPfek0U3gKN+04a1650jzOit8LzE6NaT180QDv\nX+gG6tk53vSXDmkBXsQ1mtB8aF+HaEG2Pra5HyihlweCPYdJT+e28wpq6+P5l3YR\ndQIDAQAB\n-----END PUBLIC KEY-----\n"
|
||||||
|
}
|
||||||
@@ -1,4 +0,0 @@
|
|||||||
{
|
|
||||||
"name": "postgres-4",
|
|
||||||
"public_key": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAu6fPxOZeKloF/EgYvU0k\nOwv8bJjsCQcWaMTPle5//mRTszA6PM2z9RI+Mfr45qxTlsL9pQY8WJOWF6QOK31x\nszuqcr7oOjtAhrLI8f/oNDEDjcx325FqG9gNKQEAD7d4zodh+PhDe6x7GIyIS7lG\nIcD5Zre9iDwv8FGLR+5GLqS8SJOPL/wJkQ8w+N0f8YDFw81kiTta5NLhAx3fMDs0\n2kmoNlbmKlNZTtLjCfCV+/pa9oY6wycjck3GvobiFE/4cWaNkeGlPc+uAwlfmrOv\nHy0tq1XBX/BCvE5kMXmhnMT23JXjm2s2PgCLgEVGAXilXk/T597KDm+z4oBpAQma\nnQIDAQAB\n-----END PUBLIC KEY-----\n"
|
|
||||||
}
|
|
||||||
4
clients/postgres-6.json
Normal file
4
clients/postgres-6.json
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
{
|
||||||
|
"name": "postgres-6",
|
||||||
|
"public_key": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtVzM0fwlimmq11jTGTko\nK87LRYSar61tNF3qVWp9axNSMa6BSxVark9eYOqY4eLh/5vJVDqXDFq30/IUWg40\nH8hHWaOEvQrP2dm/XFw1RmunfbfN9gN07TuhaT3xFD5t+jFBuOSoJ4cPnFIABuVt\nFLrjgtYYjtZe5hGE9ZPmS7o2ATM5EU9mxeQ+TkgDbr8StvSPGdZ1ykhagf1pegGU\nRIfZ+4ZKzyDUAq+fYNhIbmlm5h2gP+XdtakPy43j7n0iN1vwDgBqJ2pdaVs/GcFf\nvaztoltguoknI2NPSez1N217asTTLuth0nHxVXiKCVXnqwDjxgWmuP6X2B7VYjyc\nxQIDAQAB\n-----END PUBLIC KEY-----\n"
|
||||||
|
}
|
||||||
4
clients/strfry-1.json
Normal file
4
clients/strfry-1.json
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
{
|
||||||
|
"name": "strfry-1",
|
||||||
|
"public_key": "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzDV/RMGMXVDbvoA6PNh8\nQzhtHwYDCFcUSkbrwP6tzh6GpVunGEOdOdhj2V63T2tF1H+lujxQXh5pK7C0D6VZ\niO04ftJlo7/svyxUcwWr+znyN5sFdQRh3cBZiGSBYolizwoqgtPFlbNhmWAzV0Du\n9t8mhz70IK3B+UdwWyHtoK0NNsJGnQ9YzAvcjyDmEO/3sCjAhNnxVpmXftpcSmd9\nMonzFtIDBbRRll4AHZYRbmXCzx63+VmelvdnufnbY82liol0zzBwJaBD1wyNlG0y\ni96p3Kx03bLNlIaYVGbjZeJi+6oo2VDWJ4OloLLAYoHDSipeHT9qWfUdnE6ge4Lm\nywIDAQAB\n-----END PUBLIC KEY-----\n"
|
||||||
|
}
|
||||||
5
cookbooks/gpg/.markdownlint-cli2.yaml
Normal file
5
cookbooks/gpg/.markdownlint-cli2.yaml
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
config:
|
||||||
|
ul-indent: false # MD007
|
||||||
|
line-length: false # MD013
|
||||||
|
no-duplicate-heading: false # MD024
|
||||||
|
reference-links-images: false # MD052
|
||||||
89
cookbooks/gpg/CHANGELOG.md
Normal file
89
cookbooks/gpg/CHANGELOG.md
Normal file
@@ -0,0 +1,89 @@
|
|||||||
|
# gpg Cookbook CHANGELOG
|
||||||
|
|
||||||
|
This file is used to list changes made in each version of the gpg cookbook.
|
||||||
|
|
||||||
|
## 2.0.13 - *2024-05-02*
|
||||||
|
|
||||||
|
## 2.0.12 - *2024-05-02*
|
||||||
|
|
||||||
|
## 2.0.11 - *2023-09-28*
|
||||||
|
|
||||||
|
## 2.0.10 - *2023-09-04*
|
||||||
|
|
||||||
|
## 2.0.9 - *2023-07-10*
|
||||||
|
|
||||||
|
## 2.0.8 - *2023-05-16*
|
||||||
|
|
||||||
|
- Fix markdown formatting in the changelog
|
||||||
|
- Standardise files with files in sous-chefs/repo-management
|
||||||
|
|
||||||
|
## 2.0.7 - *2023-05-16*
|
||||||
|
|
||||||
|
- Standardise files with files in sous-chefs/repo-management
|
||||||
|
|
||||||
|
## 2.0.6 - *2023-05-03*
|
||||||
|
|
||||||
|
- Standardise files with files in sous-chefs/repo-management
|
||||||
|
|
||||||
|
## 2.0.5 - *2023-04-01*
|
||||||
|
|
||||||
|
- Standardise files with files in sous-chefs/repo-management
|
||||||
|
|
||||||
|
## 2.0.4 - *2023-03-02*
|
||||||
|
|
||||||
|
- Standardise files with files in sous-chefs/repo-management
|
||||||
|
|
||||||
|
## 2.0.3 - *2023-02-14*
|
||||||
|
|
||||||
|
- Remove delivery folder
|
||||||
|
|
||||||
|
## 2.0.2 - *2021-08-31*
|
||||||
|
|
||||||
|
- Standardise files with files in sous-chefs/repo-management
|
||||||
|
|
||||||
|
## 2.0.1 - *2021-06-01*
|
||||||
|
|
||||||
|
- Standardise files with files in sous-chefs/repo-management
|
||||||
|
|
||||||
|
## 2.0.0 - *2021-05-07*
|
||||||
|
|
||||||
|
- Update tested platforms
|
||||||
|
- Set minimum Chef version to 15.3 for unified_mode support
|
||||||
|
|
||||||
|
## 1.3.0 - *2020-12-14*
|
||||||
|
|
||||||
|
- Added support for SUSE and OpenSUSE
|
||||||
|
|
||||||
|
## 1.2.0 (2020-08-26)
|
||||||
|
|
||||||
|
- Comment out enforce_idempotency in kitchen.dokken.yml so tests work
|
||||||
|
- Update/Remove the platforms we test against
|
||||||
|
- Fix support for pinentry_mode on Ubuntu 16.04
|
||||||
|
|
||||||
|
## 1.1.0 (2020-05-14)
|
||||||
|
|
||||||
|
- resolved cookstyle error: resources/install.rb:1:36 convention: `Layout/TrailingWhitespace`
|
||||||
|
- resolved cookstyle error: resources/install.rb:1:37 refactor: `ChefModernize/FoodcriticComments`
|
||||||
|
|
||||||
|
## 1.0.1 (2020-01-26)
|
||||||
|
|
||||||
|
- Use Github Actions for testing
|
||||||
|
- Fix Ubuntu platform checks in the `gpg_key` resource
|
||||||
|
- Use true/false in the resource to simplify the types
|
||||||
|
|
||||||
|
## 1.0.0 (2019-01-26)
|
||||||
|
|
||||||
|
- Adds two new resources `gpg_install` and `gpg_key`
|
||||||
|
- Use CircleCI for testing
|
||||||
|
|
||||||
|
## 0.3.0 (2018-05-08)
|
||||||
|
|
||||||
|
- Sous Chefs will now be maintaining this cookbook. For more information on Sous Chefs see <http://sous-chefs.org/>
|
||||||
|
- This cookbook now requires Chef 12 or later
|
||||||
|
- Added a chefignore file
|
||||||
|
- Added local testing with delivery local mode
|
||||||
|
- Added Code of conduct, testing, contributing, license, and changelog files
|
||||||
|
- Added `chef_version`, `source_url`, and `issues_url` to the metadata
|
||||||
|
- Added ubuntu/debian to the metadata as supported platforms
|
||||||
|
- Updated the kitchen config to use Vagrant on common platforms
|
||||||
|
- Resolved all cookstyle / foodcritic warnings
|
||||||
202
cookbooks/gpg/LICENSE
Normal file
202
cookbooks/gpg/LICENSE
Normal file
@@ -0,0 +1,202 @@
|
|||||||
|
Apache License
|
||||||
|
Version 2.0, January 2004
|
||||||
|
http://www.apache.org/licenses/
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||||
|
|
||||||
|
1. Definitions.
|
||||||
|
|
||||||
|
"License" shall mean the terms and conditions for use, reproduction,
|
||||||
|
and distribution as defined by Sections 1 through 9 of this document.
|
||||||
|
|
||||||
|
"Licensor" shall mean the copyright owner or entity authorized by
|
||||||
|
the copyright owner that is granting the License.
|
||||||
|
|
||||||
|
"Legal Entity" shall mean the union of the acting entity and all
|
||||||
|
other entities that control, are controlled by, or are under common
|
||||||
|
control with that entity. For the purposes of this definition,
|
||||||
|
"control" means (i) the power, direct or indirect, to cause the
|
||||||
|
direction or management of such entity, whether by contract or
|
||||||
|
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
||||||
|
outstanding shares, or (iii) beneficial ownership of such entity.
|
||||||
|
|
||||||
|
"You" (or "Your") shall mean an individual or Legal Entity
|
||||||
|
exercising permissions granted by this License.
|
||||||
|
|
||||||
|
"Source" form shall mean the preferred form for making modifications,
|
||||||
|
including but not limited to software source code, documentation
|
||||||
|
source, and configuration files.
|
||||||
|
|
||||||
|
"Object" form shall mean any form resulting from mechanical
|
||||||
|
transformation or translation of a Source form, including but
|
||||||
|
not limited to compiled object code, generated documentation,
|
||||||
|
and conversions to other media types.
|
||||||
|
|
||||||
|
"Work" shall mean the work of authorship, whether in Source or
|
||||||
|
Object form, made available under the License, as indicated by a
|
||||||
|
copyright notice that is included in or attached to the work
|
||||||
|
(an example is provided in the Appendix below).
|
||||||
|
|
||||||
|
"Derivative Works" shall mean any work, whether in Source or Object
|
||||||
|
form, that is based on (or derived from) the Work and for which the
|
||||||
|
editorial revisions, annotations, elaborations, or other modifications
|
||||||
|
represent, as a whole, an original work of authorship. For the purposes
|
||||||
|
of this License, Derivative Works shall not include works that remain
|
||||||
|
separable from, or merely link (or bind by name) to the interfaces of,
|
||||||
|
the Work and Derivative Works thereof.
|
||||||
|
|
||||||
|
"Contribution" shall mean any work of authorship, including
|
||||||
|
the original version of the Work and any modifications or additions
|
||||||
|
to that Work or Derivative Works thereof, that is intentionally
|
||||||
|
submitted to Licensor for inclusion in the Work by the copyright owner
|
||||||
|
or by an individual or Legal Entity authorized to submit on behalf of
|
||||||
|
the copyright owner. For the purposes of this definition, "submitted"
|
||||||
|
means any form of electronic, verbal, or written communication sent
|
||||||
|
to the Licensor or its representatives, including but not limited to
|
||||||
|
communication on electronic mailing lists, source code control systems,
|
||||||
|
and issue tracking systems that are managed by, or on behalf of, the
|
||||||
|
Licensor for the purpose of discussing and improving the Work, but
|
||||||
|
excluding communication that is conspicuously marked or otherwise
|
||||||
|
designated in writing by the copyright owner as "Not a Contribution."
|
||||||
|
|
||||||
|
"Contributor" shall mean Licensor and any individual or Legal Entity
|
||||||
|
on behalf of whom a Contribution has been received by Licensor and
|
||||||
|
subsequently incorporated within the Work.
|
||||||
|
|
||||||
|
2. Grant of Copyright License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
copyright license to reproduce, prepare Derivative Works of,
|
||||||
|
publicly display, publicly perform, sublicense, and distribute the
|
||||||
|
Work and such Derivative Works in Source or Object form.
|
||||||
|
|
||||||
|
3. Grant of Patent License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
(except as stated in this section) patent license to make, have made,
|
||||||
|
use, offer to sell, sell, import, and otherwise transfer the Work,
|
||||||
|
where such license applies only to those patent claims licensable
|
||||||
|
by such Contributor that are necessarily infringed by their
|
||||||
|
Contribution(s) alone or by combination of their Contribution(s)
|
||||||
|
with the Work to which such Contribution(s) was submitted. If You
|
||||||
|
institute patent litigation against any entity (including a
|
||||||
|
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
||||||
|
or a Contribution incorporated within the Work constitutes direct
|
||||||
|
or contributory patent infringement, then any patent licenses
|
||||||
|
granted to You under this License for that Work shall terminate
|
||||||
|
as of the date such litigation is filed.
|
||||||
|
|
||||||
|
4. Redistribution. You may reproduce and distribute copies of the
|
||||||
|
Work or Derivative Works thereof in any medium, with or without
|
||||||
|
modifications, and in Source or Object form, provided that You
|
||||||
|
meet the following conditions:
|
||||||
|
|
||||||
|
(a) You must give any other recipients of the Work or
|
||||||
|
Derivative Works a copy of this License; and
|
||||||
|
|
||||||
|
(b) You must cause any modified files to carry prominent notices
|
||||||
|
stating that You changed the files; and
|
||||||
|
|
||||||
|
(c) You must retain, in the Source form of any Derivative Works
|
||||||
|
that You distribute, all copyright, patent, trademark, and
|
||||||
|
attribution notices from the Source form of the Work,
|
||||||
|
excluding those notices that do not pertain to any part of
|
||||||
|
the Derivative Works; and
|
||||||
|
|
||||||
|
(d) If the Work includes a "NOTICE" text file as part of its
|
||||||
|
distribution, then any Derivative Works that You distribute must
|
||||||
|
include a readable copy of the attribution notices contained
|
||||||
|
within such NOTICE file, excluding those notices that do not
|
||||||
|
pertain to any part of the Derivative Works, in at least one
|
||||||
|
of the following places: within a NOTICE text file distributed
|
||||||
|
as part of the Derivative Works; within the Source form or
|
||||||
|
documentation, if provided along with the Derivative Works; or,
|
||||||
|
within a display generated by the Derivative Works, if and
|
||||||
|
wherever such third-party notices normally appear. The contents
|
||||||
|
of the NOTICE file are for informational purposes only and
|
||||||
|
do not modify the License. You may add Your own attribution
|
||||||
|
notices within Derivative Works that You distribute, alongside
|
||||||
|
or as an addendum to the NOTICE text from the Work, provided
|
||||||
|
that such additional attribution notices cannot be construed
|
||||||
|
as modifying the License.
|
||||||
|
|
||||||
|
You may add Your own copyright statement to Your modifications and
|
||||||
|
may provide additional or different license terms and conditions
|
||||||
|
for use, reproduction, or distribution of Your modifications, or
|
||||||
|
for any such Derivative Works as a whole, provided Your use,
|
||||||
|
reproduction, and distribution of the Work otherwise complies with
|
||||||
|
the conditions stated in this License.
|
||||||
|
|
||||||
|
5. Submission of Contributions. Unless You explicitly state otherwise,
|
||||||
|
any Contribution intentionally submitted for inclusion in the Work
|
||||||
|
by You to the Licensor shall be under the terms and conditions of
|
||||||
|
this License, without any additional terms or conditions.
|
||||||
|
Notwithstanding the above, nothing herein shall supersede or modify
|
||||||
|
the terms of any separate license agreement you may have executed
|
||||||
|
with Licensor regarding such Contributions.
|
||||||
|
|
||||||
|
6. Trademarks. This License does not grant permission to use the trade
|
||||||
|
names, trademarks, service marks, or product names of the Licensor,
|
||||||
|
except as required for reasonable and customary use in describing the
|
||||||
|
origin of the Work and reproducing the content of the NOTICE file.
|
||||||
|
|
||||||
|
7. Disclaimer of Warranty. Unless required by applicable law or
|
||||||
|
agreed to in writing, Licensor provides the Work (and each
|
||||||
|
Contributor provides its Contributions) on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
||||||
|
implied, including, without limitation, any warranties or conditions
|
||||||
|
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
||||||
|
PARTICULAR PURPOSE. You are solely responsible for determining the
|
||||||
|
appropriateness of using or redistributing the Work and assume any
|
||||||
|
risks associated with Your exercise of permissions under this License.
|
||||||
|
|
||||||
|
8. Limitation of Liability. In no event and under no legal theory,
|
||||||
|
whether in tort (including negligence), contract, or otherwise,
|
||||||
|
unless required by applicable law (such as deliberate and grossly
|
||||||
|
negligent acts) or agreed to in writing, shall any Contributor be
|
||||||
|
liable to You for damages, including any direct, indirect, special,
|
||||||
|
incidental, or consequential damages of any character arising as a
|
||||||
|
result of this License or out of the use or inability to use the
|
||||||
|
Work (including but not limited to damages for loss of goodwill,
|
||||||
|
work stoppage, computer failure or malfunction, or any and all
|
||||||
|
other commercial damages or losses), even if such Contributor
|
||||||
|
has been advised of the possibility of such damages.
|
||||||
|
|
||||||
|
9. Accepting Warranty or Additional Liability. While redistributing
|
||||||
|
the Work or Derivative Works thereof, You may choose to offer,
|
||||||
|
and charge a fee for, acceptance of support, warranty, indemnity,
|
||||||
|
or other liability obligations and/or rights consistent with this
|
||||||
|
License. However, in accepting such obligations, You may act only
|
||||||
|
on Your own behalf and on Your sole responsibility, not on behalf
|
||||||
|
of any other Contributor, and only if You agree to indemnify,
|
||||||
|
defend, and hold each Contributor harmless for any liability
|
||||||
|
incurred by, or claims asserted against, such Contributor by reason
|
||||||
|
of your accepting any such warranty or additional liability.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
APPENDIX: How to apply the Apache License to your work.
|
||||||
|
|
||||||
|
To apply the Apache License to your work, attach the following
|
||||||
|
boilerplate notice, with the fields enclosed by brackets "{}"
|
||||||
|
replaced with your own identifying information. (Don't include
|
||||||
|
the brackets!) The text should be enclosed in the appropriate
|
||||||
|
comment syntax for the file format. We also recommend that a
|
||||||
|
file or class name and description of purpose be included on the
|
||||||
|
same "printed page" as the copyright notice for easier
|
||||||
|
identification within third-party archives.
|
||||||
|
|
||||||
|
Copyright {yyyy} {name of copyright owner}
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
|
||||||
63
cookbooks/gpg/README.md
Normal file
63
cookbooks/gpg/README.md
Normal file
@@ -0,0 +1,63 @@
|
|||||||
|
# GPG cookbook
|
||||||
|
|
||||||
|
[](https://supermarket.chef.io/cookbooks/gpg)
|
||||||
|
[](https://circleci.com/gh/sous-chefs/gpg)
|
||||||
|
[](#backers)
|
||||||
|
[](#sponsors)
|
||||||
|
[](https://opensource.org/licenses/Apache-2.0)
|
||||||
|
|
||||||
|
Installs and configures GPG on a system
|
||||||
|
|
||||||
|
## Maintainers
|
||||||
|
|
||||||
|
This cookbook is maintained by the Sous Chefs. The Sous Chefs are a community of Chef cookbook maintainers working together to maintain important cookbooks. If you’d like to know more please visit [sous-chefs.org](https://sous-chefs.org/) or come chat with us on the Chef Community Slack in [#sous-chefs](https://chefcommunity.slack.com/messages/C2V7B88SF).
|
||||||
|
|
||||||
|
## Custom resources
|
||||||
|
|
||||||
|
This cookboks uses custom resources to control GPG2.
|
||||||
|
|
||||||
|
Install GPG2 and haveged
|
||||||
|
|
||||||
|
```ruby
|
||||||
|
gpg_install
|
||||||
|
```
|
||||||
|
|
||||||
|
Generate a GPG key for a user
|
||||||
|
|
||||||
|
```ruby
|
||||||
|
gpg_key 'foo' do
|
||||||
|
user 'foo'
|
||||||
|
passphrase 'this-is-not-secure'
|
||||||
|
end
|
||||||
|
```
|
||||||
|
|
||||||
|
For further detail please see the documentation for each resource, or the test cookbook for example usage.
|
||||||
|
|
||||||
|
- [gpg_install](https://github.com/sous-chefs/gpg/blob/master/documentation/resource/install.md)
|
||||||
|
- [gpg_key](https://github.com/sous-chefs/gpg/blob/master/documentation/resource/key.md)
|
||||||
|
- [Test Cookbook](https://github.com/sous-chefs/gpg/blob/master/test/fixtures/cookbooks/test/recipes)
|
||||||
|
|
||||||
|
## Contributors
|
||||||
|
|
||||||
|
This project exists thanks to all the people who [contribute.](https://opencollective.com/sous-chefs/contributors.svg?width=890&button=false)
|
||||||
|
|
||||||
|
### Backers
|
||||||
|
|
||||||
|
Thank you to all our backers!
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Sponsors
|
||||||
|
|
||||||
|
Support this project by becoming a sponsor. Your logo will show up here with a link to your website.
|
||||||
|
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
115
cookbooks/gpg/chefignore
Normal file
115
cookbooks/gpg/chefignore
Normal file
@@ -0,0 +1,115 @@
|
|||||||
|
# Put files/directories that should be ignored in this file when uploading
|
||||||
|
# to a Chef Infra Server or Supermarket.
|
||||||
|
# Lines that start with '# ' are comments.
|
||||||
|
|
||||||
|
# OS generated files #
|
||||||
|
######################
|
||||||
|
.DS_Store
|
||||||
|
ehthumbs.db
|
||||||
|
Icon?
|
||||||
|
nohup.out
|
||||||
|
Thumbs.db
|
||||||
|
.envrc
|
||||||
|
|
||||||
|
# EDITORS #
|
||||||
|
###########
|
||||||
|
.#*
|
||||||
|
.project
|
||||||
|
.settings
|
||||||
|
*_flymake
|
||||||
|
*_flymake.*
|
||||||
|
*.bak
|
||||||
|
*.sw[a-z]
|
||||||
|
*.tmproj
|
||||||
|
*~
|
||||||
|
\#*
|
||||||
|
REVISION
|
||||||
|
TAGS*
|
||||||
|
tmtags
|
||||||
|
.vscode
|
||||||
|
.editorconfig
|
||||||
|
|
||||||
|
## COMPILED ##
|
||||||
|
##############
|
||||||
|
*.class
|
||||||
|
*.com
|
||||||
|
*.dll
|
||||||
|
*.exe
|
||||||
|
*.o
|
||||||
|
*.pyc
|
||||||
|
*.so
|
||||||
|
*/rdoc/
|
||||||
|
a.out
|
||||||
|
mkmf.log
|
||||||
|
|
||||||
|
# Testing #
|
||||||
|
###########
|
||||||
|
.circleci/*
|
||||||
|
.codeclimate.yml
|
||||||
|
.delivery/*
|
||||||
|
.foodcritic
|
||||||
|
.kitchen*
|
||||||
|
.mdlrc
|
||||||
|
.overcommit.yml
|
||||||
|
.rspec
|
||||||
|
.rubocop.yml
|
||||||
|
.travis.yml
|
||||||
|
.watchr
|
||||||
|
.yamllint
|
||||||
|
azure-pipelines.yml
|
||||||
|
Dangerfile
|
||||||
|
examples/*
|
||||||
|
features/*
|
||||||
|
Guardfile
|
||||||
|
kitchen*.yml
|
||||||
|
mlc_config.json
|
||||||
|
Procfile
|
||||||
|
Rakefile
|
||||||
|
spec/*
|
||||||
|
test/*
|
||||||
|
|
||||||
|
# SCM #
|
||||||
|
#######
|
||||||
|
.git
|
||||||
|
.gitattributes
|
||||||
|
.gitconfig
|
||||||
|
.github/*
|
||||||
|
.gitignore
|
||||||
|
.gitkeep
|
||||||
|
.gitmodules
|
||||||
|
.svn
|
||||||
|
*/.bzr/*
|
||||||
|
*/.git
|
||||||
|
*/.hg/*
|
||||||
|
*/.svn/*
|
||||||
|
|
||||||
|
# Berkshelf #
|
||||||
|
#############
|
||||||
|
Berksfile
|
||||||
|
Berksfile.lock
|
||||||
|
cookbooks/*
|
||||||
|
tmp
|
||||||
|
|
||||||
|
# Bundler #
|
||||||
|
###########
|
||||||
|
vendor/*
|
||||||
|
Gemfile
|
||||||
|
Gemfile.lock
|
||||||
|
|
||||||
|
# Policyfile #
|
||||||
|
##############
|
||||||
|
Policyfile.rb
|
||||||
|
Policyfile.lock.json
|
||||||
|
|
||||||
|
# Documentation #
|
||||||
|
#############
|
||||||
|
CODE_OF_CONDUCT*
|
||||||
|
CONTRIBUTING*
|
||||||
|
documentation/*
|
||||||
|
TESTING*
|
||||||
|
UPGRADING*
|
||||||
|
|
||||||
|
# Vagrant #
|
||||||
|
###########
|
||||||
|
.vagrant
|
||||||
|
Vagrantfile
|
||||||
43
cookbooks/gpg/libraries/helpers.rb
Normal file
43
cookbooks/gpg/libraries/helpers.rb
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
module Gpg
|
||||||
|
module Helpers
|
||||||
|
include Chef::Mixin::ShellOut
|
||||||
|
|
||||||
|
def key_exists(new_resource)
|
||||||
|
gpg_check = gpg_cmd
|
||||||
|
gpg_check << gpg_opts if new_resource.override_default_keyring
|
||||||
|
gpg_check << "--list-keys | grep '#{new_resource.name_real}'"
|
||||||
|
|
||||||
|
cmd = Mixlib::ShellOut.new(
|
||||||
|
gpg_check,
|
||||||
|
user: new_resource.user,
|
||||||
|
group: new_resource.group
|
||||||
|
)
|
||||||
|
|
||||||
|
cmd.run_command
|
||||||
|
|
||||||
|
cmd.exitstatus == 0
|
||||||
|
end
|
||||||
|
|
||||||
|
def gpg_opts(new_resource)
|
||||||
|
if new_resource.override_default_keyring
|
||||||
|
"--no-default-keyring --secret-keyring #{new_resource.secring_file} --keyring #{new_resource.pubring_file}"
|
||||||
|
else
|
||||||
|
false
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def gpg_cmd
|
||||||
|
"gpg2 --homedir #{new_resource.home_dir} "
|
||||||
|
end
|
||||||
|
|
||||||
|
def gpg2_packages
|
||||||
|
packages = %w(haveged)
|
||||||
|
if platform_family?('suse')
|
||||||
|
packages.push('gpg2')
|
||||||
|
else
|
||||||
|
packages.push('gnupg2')
|
||||||
|
end
|
||||||
|
packages
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
43
cookbooks/gpg/metadata.json
Normal file
43
cookbooks/gpg/metadata.json
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
{
|
||||||
|
"name": "gpg",
|
||||||
|
"description": "Installs/Configures gpg",
|
||||||
|
"long_description": "",
|
||||||
|
"maintainer": "Sous Chefs",
|
||||||
|
"maintainer_email": "help@sous-chefs.org",
|
||||||
|
"license": "Apache-2.0",
|
||||||
|
"platforms": {
|
||||||
|
"debian": ">= 0.0.0",
|
||||||
|
"ubuntu": ">= 0.0.0",
|
||||||
|
"centos": ">= 0.0.0",
|
||||||
|
"redhat": ">= 0.0.0",
|
||||||
|
"oracle": ">= 0.0.0",
|
||||||
|
"amazon": ">= 0.0.0",
|
||||||
|
"opensuse": ">= 0.0.0",
|
||||||
|
"suse": ">= 0.0.0"
|
||||||
|
},
|
||||||
|
"dependencies": {
|
||||||
|
"yum-epel": ">= 0.0.0"
|
||||||
|
},
|
||||||
|
"providing": {
|
||||||
|
|
||||||
|
},
|
||||||
|
"recipes": {
|
||||||
|
|
||||||
|
},
|
||||||
|
"version": "2.0.13",
|
||||||
|
"source_url": "https://github.com/sous-chefs/gpg",
|
||||||
|
"issues_url": "https://github.com/sous-chefs/gpg/issues",
|
||||||
|
"privacy": false,
|
||||||
|
"chef_versions": [
|
||||||
|
[
|
||||||
|
">= 15.3"
|
||||||
|
]
|
||||||
|
],
|
||||||
|
"ohai_versions": [
|
||||||
|
|
||||||
|
],
|
||||||
|
"gems": [
|
||||||
|
|
||||||
|
],
|
||||||
|
"eager_load_libraries": true
|
||||||
|
}
|
||||||
20
cookbooks/gpg/metadata.rb
Normal file
20
cookbooks/gpg/metadata.rb
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
name 'gpg'
|
||||||
|
maintainer 'Sous Chefs'
|
||||||
|
maintainer_email 'help@sous-chefs.org'
|
||||||
|
license 'Apache-2.0'
|
||||||
|
description 'Installs/Configures gpg'
|
||||||
|
source_url 'https://github.com/sous-chefs/gpg'
|
||||||
|
issues_url 'https://github.com/sous-chefs/gpg/issues'
|
||||||
|
version '2.0.13'
|
||||||
|
chef_version '>= 15.3'
|
||||||
|
|
||||||
|
depends 'yum-epel'
|
||||||
|
|
||||||
|
supports 'debian'
|
||||||
|
supports 'ubuntu'
|
||||||
|
supports 'centos'
|
||||||
|
supports 'redhat'
|
||||||
|
supports 'oracle'
|
||||||
|
supports 'amazon'
|
||||||
|
supports 'opensuse'
|
||||||
|
supports 'suse'
|
||||||
18
cookbooks/gpg/renovate.json
Normal file
18
cookbooks/gpg/renovate.json
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"$schema": "https://docs.renovatebot.com/renovate-schema.json",
|
||||||
|
"extends": ["config:base"],
|
||||||
|
"packageRules": [
|
||||||
|
{
|
||||||
|
"groupName": "Actions",
|
||||||
|
"matchUpdateTypes": ["minor", "patch", "pin"],
|
||||||
|
"automerge": true,
|
||||||
|
"addLabels": ["Release: Patch", "Skip: Announcements"]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"groupName": "Actions",
|
||||||
|
"matchUpdateTypes": ["major"],
|
||||||
|
"automerge": false,
|
||||||
|
"addLabels": ["Release: Patch", "Skip: Announcements"]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
18
cookbooks/gpg/resources/install.rb
Normal file
18
cookbooks/gpg/resources/install.rb
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
unified_mode true
|
||||||
|
|
||||||
|
property :name, String, default: ''
|
||||||
|
|
||||||
|
action :install do
|
||||||
|
include_recipe 'yum-epel' if platform_family?('rhel', 'amazon')
|
||||||
|
|
||||||
|
package gpg2_packages
|
||||||
|
|
||||||
|
service 'haveged' do
|
||||||
|
supports [:status, :restart]
|
||||||
|
action :start
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
action_class do
|
||||||
|
include Gpg::Helpers
|
||||||
|
end
|
||||||
166
cookbooks/gpg/resources/key.rb
Normal file
166
cookbooks/gpg/resources/key.rb
Normal file
@@ -0,0 +1,166 @@
|
|||||||
|
unified_mode true
|
||||||
|
|
||||||
|
property :batch_name, String,
|
||||||
|
name_property: true,
|
||||||
|
description: 'Name of the key/batch to generate.'
|
||||||
|
|
||||||
|
property :override_default_keyring, [true, false],
|
||||||
|
default: false,
|
||||||
|
description: 'Set to true if you want to override the pubring_file and secring_file locations.'
|
||||||
|
|
||||||
|
property :pubring_file, String,
|
||||||
|
description: 'Public keyring file location (override_default_keyring must be set to true or this option will be ignored)'
|
||||||
|
|
||||||
|
property :secring_file, String,
|
||||||
|
description: 'Secret keyring file location (override_default_keyring must be set to true or this option will be ignored)'
|
||||||
|
|
||||||
|
property :user, String,
|
||||||
|
default: 'root',
|
||||||
|
description: 'User to generate the key for'
|
||||||
|
|
||||||
|
property :group, String,
|
||||||
|
default: lazy { user },
|
||||||
|
description: 'Group to run the generate command as'
|
||||||
|
|
||||||
|
property :key_type, String,
|
||||||
|
default: '1', equal_to: %w(RSA 1 DSA 17 ),
|
||||||
|
description: 'Corresponds to GPG option: Key-Type (RSA or DSA)'
|
||||||
|
|
||||||
|
property :key_length, String,
|
||||||
|
default: '2048', equal_to: %w( 2048 4096 ),
|
||||||
|
description: 'Corresponds to GPG option: Key-Length (2048 or 4096)'
|
||||||
|
|
||||||
|
property :name_real, String,
|
||||||
|
default: lazy { "Chef Generated Default (#{batch_name})" },
|
||||||
|
description: 'Corresponds to GPG option: Name-Real'
|
||||||
|
|
||||||
|
property :name_comment, String,
|
||||||
|
default: 'generated by Chef',
|
||||||
|
description: 'Corresponds to GPG option: Name-Comment'
|
||||||
|
|
||||||
|
property :name_email, String,
|
||||||
|
default: lazy { "#{node.name}@example.com" },
|
||||||
|
description: 'Corresponds to GPG option: Name-Email'
|
||||||
|
|
||||||
|
property :expire_date, String,
|
||||||
|
default: '0',
|
||||||
|
description: 'Corresponds to GPG option: Expire-Date. Defaults to 0 (no expiry)'
|
||||||
|
|
||||||
|
property :home_dir, String,
|
||||||
|
default: lazy { ::File.expand_path("~#{user}/.gnupg") },
|
||||||
|
description: 'Location to store the keyring. Defaults to ~/.gnupg'
|
||||||
|
|
||||||
|
property :batch_config_file, String,
|
||||||
|
default: lazy { ::File.join(home_dir, "gpg_batch_config_#{batch_name}") },
|
||||||
|
description: 'Batch config file name'
|
||||||
|
|
||||||
|
property :passphrase, String,
|
||||||
|
sensitive: true,
|
||||||
|
description: 'Passphrase for key'
|
||||||
|
|
||||||
|
property :key_file, String,
|
||||||
|
description: 'Keyfile name'
|
||||||
|
|
||||||
|
property :key_fingerprint, String,
|
||||||
|
description: 'Key finger print. Used to identify when deleting keys using the :delete action'
|
||||||
|
|
||||||
|
# Only Ubuntu > 16.04 supports the pinetree_mode. And requires it
|
||||||
|
property :pinentry_mode, [String, FalseClass],
|
||||||
|
default: platform?('ubuntu') && node['platform_version'].to_f > 16.04 ? 'loopback' : false,
|
||||||
|
description: 'Pinentry mode. Set to loopback on Ubuntu and False (off) for all other platforms.'
|
||||||
|
|
||||||
|
property :batch, [true, false],
|
||||||
|
default: true,
|
||||||
|
description: 'Turn batch mode on or off when genrating keys'
|
||||||
|
|
||||||
|
action :generate do
|
||||||
|
unless key_exists(new_resource)
|
||||||
|
|
||||||
|
config_dir = ::File.dirname(new_resource.batch_config_file)
|
||||||
|
|
||||||
|
directory config_dir do
|
||||||
|
owner new_resource.user
|
||||||
|
mode '0700'
|
||||||
|
recursive true
|
||||||
|
not_if { ::Dir.exist?(config_dir) }
|
||||||
|
end
|
||||||
|
|
||||||
|
file new_resource.batch_config_file do
|
||||||
|
content <<~EOS
|
||||||
|
Key-Type: #{new_resource.key_type}
|
||||||
|
Key-Length: #{new_resource.key_length}
|
||||||
|
Name-Real: #{new_resource.name_real}
|
||||||
|
Name-Comment: #{new_resource.name_comment}
|
||||||
|
Name-Email: #{new_resource.name_email}
|
||||||
|
Expire-Date: #{new_resource.expire_date}
|
||||||
|
EOS
|
||||||
|
|
||||||
|
if new_resource.override_default_keyring
|
||||||
|
content << "%pubring #{new_resource.pubring_file}\n"
|
||||||
|
content << "%secring #{new_resource.secring_file}\n"
|
||||||
|
end
|
||||||
|
|
||||||
|
content << "Passphrase: #{new_resource.passphrase}" if new_resource.passphrase
|
||||||
|
content << "%commit\n"
|
||||||
|
mode '0600'
|
||||||
|
owner new_resource.user
|
||||||
|
sensitive true
|
||||||
|
end
|
||||||
|
|
||||||
|
cmd = gpg_cmd
|
||||||
|
cmd << gpg_opts(new_resource) if new_resource.override_default_keyring
|
||||||
|
cmd << " --passphrase #{new_resource.passphrase}"
|
||||||
|
cmd << ' --yes'
|
||||||
|
cmd << ' --batch' if new_resource.batch
|
||||||
|
cmd << ' --pinentry-mode loopback' if new_resource.pinentry_mode
|
||||||
|
cmd << " --gen-key #{new_resource.batch_config_file}"
|
||||||
|
|
||||||
|
execute 'gpg2: generate' do
|
||||||
|
command cmd
|
||||||
|
live_stream true
|
||||||
|
user new_resource.user
|
||||||
|
group new_resource.group
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
action :import do
|
||||||
|
execute 'gpg2: import key' do
|
||||||
|
command "#{gpg_cmd} --import #{new_resource.key_file}"
|
||||||
|
user new_resource.user
|
||||||
|
group new_resource.group
|
||||||
|
not_if { key_exists(new_resource) }
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
action :export do
|
||||||
|
execute 'gpg2: export key' do
|
||||||
|
command "#{gpg_cmd} --export -a \"#{new_resource.name_real}\" > #{new_resource.key_file}"
|
||||||
|
user new_resource.user
|
||||||
|
group new_resource.group
|
||||||
|
not_if { ::File.exist?(new_resource.key_file) }
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
action :delete_public_key do
|
||||||
|
execute 'gpg2: delete key' do
|
||||||
|
command "#{gpg_cmd} --batch --yes --delete-key \"#{new_resource.key_fingerprint}\""
|
||||||
|
user new_resource.user
|
||||||
|
group new_resource.group
|
||||||
|
only_if { key_exists(new_resource) }
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
action :delete_secret_keys do
|
||||||
|
execute 'gpg2: delete key' do
|
||||||
|
command "#{gpg_cmd} --batch --yes --delete-secret-keys \"#{new_resource.key_fingerprint}\""
|
||||||
|
user new_resource.user
|
||||||
|
group new_resource.group
|
||||||
|
only_if { key_exists(new_resource) }
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
action_class do
|
||||||
|
include Gpg::Helpers
|
||||||
|
end
|
||||||
@@ -1,65 +1,72 @@
|
|||||||
{
|
{
|
||||||
"id": "akkounts",
|
"id": "akkounts",
|
||||||
"postgresql_username": {
|
"postgresql_username": {
|
||||||
"encrypted_data": "l00Lmdbl5xNq07XU4XmcnRxXsIJaYyMQQ6xI\n",
|
"encrypted_data": "bDlOkEmhvMgyVzPeTNUzYnzRLf3T9cc0cDxt\n",
|
||||||
"iv": "yxvL6hKwlVWmdMzl\n",
|
"iv": "GCCUoqU5pxQ7fGkv\n",
|
||||||
"auth_tag": "mMCV9ewJW/0TfVE76WBSZw==\n",
|
"auth_tag": "Q7mrSHIBluMe3CGVmoR86Q==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"postgresql_password": {
|
"postgresql_password": {
|
||||||
"encrypted_data": "Q6xWsH6bmI1GfMzme3mBRYrt3XmDwFJ7E4FjYg2Rrw==\n",
|
"encrypted_data": "wD0HtdsNe/hl4ZaOy8hyr2k4z8TXQrrSja3KNVE47w==\n",
|
||||||
"iv": "jcQmuT7Jz3g3XE8d\n",
|
"iv": "tb5yz8WDer0CsGvJ\n",
|
||||||
"auth_tag": "nNMvf9UmP6ikf1BW93QZIw==\n",
|
"auth_tag": "/+K2anuCff/6M7Pu70Smqw==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"sentry_dsn": {
|
"sentry_dsn": {
|
||||||
"encrypted_data": "V7cqlH2baN1Ix/ggQFeo9PY6dNKKpnDECaB1cO3XuCfy74oN2ot44nbpCQTA\nUl0+1LQv/qNn/L4gmJkqZfdIXZQqhR+iTc06UJxe3aTKJDw=\n",
|
"encrypted_data": "jCz681x0WVixHYZUb62TO+1cgyJMiJ2UMqWcaztx57yDBOIiKW3oSZjuXdhP\n9WCesfXQF/lgzITZno3IKDqzlKjWgbGLC75y8FLguxidCHI=\n",
|
||||||
"iv": "HJtdKYcApwaxhTXI\n",
|
"iv": "IRNOzN/hLwg1iqax\n",
|
||||||
"auth_tag": "qyIYK9h6nciJTFXBWOjVOA==\n",
|
"auth_tag": "eg9dWnEK04JDb94e4CFa9Q==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"rails_master_key": {
|
"rails_master_key": {
|
||||||
"encrypted_data": "KAl2Kgq1TXjOm4TNxGwZkPwJeOSNLbLLKiRdb4fTyBFfUhIGGeCS9VvV9kIb\n9sQZ6HLU\n",
|
"encrypted_data": "nUB77VLRp41rluH7hLBwQqPtnh/HsmfLr2VbcIZHWawL3o2TGuY+mj648f9L\n7XsEpgqY\n",
|
||||||
"iv": "BBPvDNs6nBXDti5I\n",
|
"iv": "fpdbDitqTRHxEKiv\n",
|
||||||
"auth_tag": "yjM/0nyUwt+5SSGuLC5qWA==\n",
|
"auth_tag": "I44fn8Ott3L/Y5LYr56U/Q==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"discourse_connect_secret": {
|
"discourse_connect_secret": {
|
||||||
"encrypted_data": "YHkZGzXeK3nDHaXt3JKmGtCcvMfgvv3yHbvS2C+CLKagOIOe+0+2/CiNuh4U\nxO1Pug==\n",
|
"encrypted_data": "ENtMn+1XTVFmdEZw7LU6WGoMbSZY654ggm3vPACGfFgqo6r0LhG60c5OTdqv\nZvT5/Q==\n",
|
||||||
"iv": "SnUxDpIMQum8ySfN\n",
|
"iv": "bL1BmvRhgxFqSM1P\n",
|
||||||
"auth_tag": "Ny6I+3EoCA1s74JLjjbbyQ==\n",
|
"auth_tag": "sEBZzGWwwYFHn+4B4SsyCA==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"lndhub_admin_token": {
|
"lndhub_admin_token": {
|
||||||
"encrypted_data": "dJHxB80Enwkm+2aNuIrp7lILAy2J5tQaChPJCl/BHwMo\n",
|
"encrypted_data": "4LPGFoARzI8UYnsJPIk8sax/rAA16pUULEZWn86e2C7L\n",
|
||||||
"iv": "zHLtD1jTIwvjMt1l\n",
|
"iv": "nvjXrOwgfgutwEVw\n",
|
||||||
"auth_tag": "IC0adEzsS5YF5YHqabWw2A==\n",
|
"auth_tag": "A89RUf1sdcS3FVscNPWYLg==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"btcpay_auth_token": {
|
"btcpay_auth_token": {
|
||||||
"encrypted_data": "YbM0HvgIijluKQBcgfKn6hmWvdbhr0ijR1xKc+BRZCZJsRaJBHTjCbwhH8T9\nVnBESruyjhxphtBetcc=\n",
|
"encrypted_data": "ky5iWYF06os0Ek6vIRzWqMTekqJhCOh/Q9DTDIeKhSyk8TnT3O71lCNEt1F5\nXCNq6ux3V6oyHVLWj0o=\n",
|
||||||
"iv": "3107v/c2Tonx6/cP\n",
|
"iv": "zk6WnxsY89oNW1F9\n",
|
||||||
"auth_tag": "jnO9fvoXJW5gbDMRjkdMPA==\n",
|
"auth_tag": "FAIMXKvQ1T7QKezVSNJbwQ==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"s3_access_key": {
|
"s3_access_key": {
|
||||||
"encrypted_data": "PFjQKe1us12SNHlReQ4f0qctulPp4d2F3t5t+AGocp87PS/kZx77rtHQtruK\n",
|
"encrypted_data": "KfhfEGwPjOonlz6rpnNTinXFPqX/sIbqQn/aby0UDi/G/7cvEcOiNcCkfuSz\n",
|
||||||
"iv": "BGD8+XchqwPmhhwi\n",
|
"iv": "Q3rg06v6K9pUDLDY\n",
|
||||||
"auth_tag": "XefaZKCVs8hotszALN+kxQ==\n",
|
"auth_tag": "G5ugdlJ896KtYtObKLclJA==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"s3_secret_key": {
|
"s3_secret_key": {
|
||||||
"encrypted_data": "ziO35x8P1YMaSeenMNQoTWug62b5ZVLFlkMlJEFGnYjHK5qTAn6ir06WnMJC\n0zErzTZsPpcr7KpE/ipWgWHRy7qVbGnd6iVO4t9tf5NjiU2OXfA=\n",
|
"encrypted_data": "N8s1OoDrYXHjqSydQA0kY7dd68Aelq4+/cgmJlYfP92u4YA17V4TR7fsvQZL\nkqjuUSClNYPc0XiCwf/5gxVirE9AO6OmmvSV7lUyu4hcEY6unrU=\n",
|
||||||
"iv": "S3syCCxh2m+mylLu\n",
|
"iv": "bXzIVWnX6V0P6PRb\n",
|
||||||
"auth_tag": "ZMkyBqXMXr3K3LGqxWvbtA==\n",
|
"auth_tag": "1EOjCfsX9P6ETjUsgBvBsA==\n",
|
||||||
|
"version": 3,
|
||||||
|
"cipher": "aes-256-gcm"
|
||||||
|
},
|
||||||
|
"nostr_private_key": {
|
||||||
|
"encrypted_data": "Sf8PEyQ0sqcgxddSlIDxLOVzPjOkTFObsYuTgcxkbEV7igrati4e8QVVUEBD\n1yoLJXelp8jlCr28Ectci29jc53gYSMTLSQsw97uYas2R0dGCqQ=\n",
|
||||||
|
"iv": "+1CIUyvIUOveLrY4\n",
|
||||||
|
"auth_tag": "GDqS+IuAIfMBmHIeFXaV7A==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,9 +1,30 @@
|
|||||||
{
|
{
|
||||||
"id": "dirsrv",
|
"id": "dirsrv",
|
||||||
|
"admin_dn": {
|
||||||
|
"encrypted_data": "zRtz6Scb9WtUXGyjc0xyvsre0YvqupuaFz+RPApj7DEQTmYyZPVb\n",
|
||||||
|
"iv": "xfIXMhEBHBWqa4Dz\n",
|
||||||
|
"auth_tag": "BcA32u1njcnCZ+yrBGSceQ==\n",
|
||||||
|
"version": 3,
|
||||||
|
"cipher": "aes-256-gcm"
|
||||||
|
},
|
||||||
"admin_password": {
|
"admin_password": {
|
||||||
"encrypted_data": "i71l5E129mXCcDAyME8sNMUkYUlQMgt7Eh6noyFcLNgbaMo=\n",
|
"encrypted_data": "7JpXl3JZDqKWDfYt/wuNbkbob+oRuONhkuAlpqUCCEIn+tY=\n",
|
||||||
"iv": "KNW2B8tpX7ywZwbg\n",
|
"iv": "Lcwc4NDzrfcBaIKQ\n",
|
||||||
"auth_tag": "GawQ+FSlA5v5YVyryeUxng==\n",
|
"auth_tag": "rrePS3Bhdnwbr2d/o8vMhg==\n",
|
||||||
|
"version": 3,
|
||||||
|
"cipher": "aes-256-gcm"
|
||||||
|
},
|
||||||
|
"service_dn": {
|
||||||
|
"encrypted_data": "sqRFiZreLeTPQljSfhAuV3DmsPxSC8tzWjCdu+WSSbO67sBQA+xhmGtzBhBD\nDZPGJw+jtAxzuVvPdAjxgAVgxXO6C6WEo87L1tdJewE=\n",
|
||||||
|
"iv": "GUEGtyRJXrPhWcUs\n",
|
||||||
|
"auth_tag": "2USsrx//3V7RCyumGCbMkg==\n",
|
||||||
|
"version": 3,
|
||||||
|
"cipher": "aes-256-gcm"
|
||||||
|
},
|
||||||
|
"service_password": {
|
||||||
|
"encrypted_data": "f2wi8B8SEt6p5G0TF3dZ72j0vMFlvwcP1suxYnshBA==\n",
|
||||||
|
"iv": "rOnUoxbnkaJtodM+\n",
|
||||||
|
"auth_tag": "dVLCtBVMjxLfW2D8XjJBdQ==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
}
|
}
|
||||||
|
|||||||
24
data_bags/credentials/gandi_api.json
Normal file
24
data_bags/credentials/gandi_api.json
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "gandi_api",
|
||||||
|
"key": {
|
||||||
|
"encrypted_data": "d3/rJMX6B9GuzUt0/mIk/lgQ3qGyQdbNXH6UEm3ZX7DeSl+rbW9FPJCRWg==\n",
|
||||||
|
"iv": "15YVAYla7PqqVOab\n",
|
||||||
|
"auth_tag": "xQSq+ld6SDOAER07N4ZkUQ==\n",
|
||||||
|
"version": 3,
|
||||||
|
"cipher": "aes-256-gcm"
|
||||||
|
},
|
||||||
|
"access_token": {
|
||||||
|
"encrypted_data": "geQwcNosiJZmqbbMpD/I+a2yueBzpV6C8Rb7vrCD8kR161ZRjvqLe+g/1XpT\n2/65wKYDMTrdto1I030=\n",
|
||||||
|
"iv": "1sj58eyooOZ8FTYn\n",
|
||||||
|
"auth_tag": "yBNfgWXaToc06VDLly/HUw==\n",
|
||||||
|
"version": 3,
|
||||||
|
"cipher": "aes-256-gcm"
|
||||||
|
},
|
||||||
|
"domains": {
|
||||||
|
"encrypted_data": "p5rIQTyCE+0d4HIuA4GKEAFekh7qEC4xe9Rm/kP0DyzY83FO0/4uKIvYoZRB\n",
|
||||||
|
"iv": "LWlx98NSS1/ngCH1\n",
|
||||||
|
"auth_tag": "FID+x/LjTZ3cgQV5U2xZLA==\n",
|
||||||
|
"version": 3,
|
||||||
|
"cipher": "aes-256-gcm"
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
{
|
|
||||||
"id": "gandi_api_5apps",
|
|
||||||
"key": {
|
|
||||||
"encrypted_data": "+tcD9x5MkNpf2Za5iLM7oTGrmAXxuWFEbyg4xrcWypSkSTjdIncOfD1UoIoS\nGzy1\n",
|
|
||||||
"iv": "ymls2idI/PdiRZCgsulwrA==\n",
|
|
||||||
"version": 1,
|
|
||||||
"cipher": "aes-256-cbc"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,58 +1,58 @@
|
|||||||
{
|
{
|
||||||
"id": "gitea",
|
"id": "gitea",
|
||||||
"jwt_secret": {
|
"jwt_secret": {
|
||||||
"encrypted_data": "HHKq1HcxV9uC0aBdkn2AAA9C3dn2o8DnL2uDtZBf+epGC8sOko6/BSvsm8wV\nuG7yVmeFajgyCePSv4M8Or8=\n",
|
"encrypted_data": "wMxs1Ec4vKRSzFtL2KuU1XfmR1t5KDx/7XBbI7V0QfgK+JwYbxU5w6feQCBE\nxOMepAXVUwU7RxPZ+hwQgPg=\n",
|
||||||
"iv": "raypiojdRL+DkiDa\n",
|
"iv": "F4vtuOL2B9e9LQnb\n",
|
||||||
"auth_tag": "JZmWJyLTHNHAHNufRizL+w==\n",
|
"auth_tag": "NHATxHbr+3Y3Kxa68NwnjQ==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"internal_token": {
|
"internal_token": {
|
||||||
"encrypted_data": "VFez8gOv5hnpBkURlufdPHvfQsL+lFlL8M9vywgKEi4XrXcNlDvoKKqdtSMv\nxGuoKqF/4NFcl2X3JRwp1j5iut+Jdg5CpnVVQLWKHc022LjD7K9nRsdmiD9Q\nLsLnU1Trzqg8VZS2ryqdjI4elkgoc15lmXwJvTNgRUzDqw==\n",
|
"encrypted_data": "mlvUtIjs6kcv7XcYCUOgOE/kDSE4Ts5G+CZuPrJapW9XwkebmyOnHJvXdihY\np/chUtar0pNB5Q16LeeZF9KrzOiDo/OXb40TPUzpsB0/607zV1z829STd4l7\nu5g4Zur13nxC9jT0zQL9QgDEobYdjgf/xu1BXxFT+Ue3lQ==\n",
|
||||||
"iv": "q7H4q7kBfRt4floS\n",
|
"iv": "25+1a2OJYFNxdf1N\n",
|
||||||
"auth_tag": "vyd4ZwVxeFTTfvjI4k5irQ==\n",
|
"auth_tag": "aF8Gn6Mm7AwLjbR8cDnitg==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"secret_key": {
|
"secret_key": {
|
||||||
"encrypted_data": "7tD4E/5AuxxmNdu4arWj/BBNTUv6JX+m2ITbcLfE+VE2WacsCZUEyi1d1v0B\nyujQ9bljJn3z0zV4PxKFJILKjQb35PSiA8b86X/75Y1B9Gl64ds=\n",
|
"encrypted_data": "xQuHuijNHoo2WicM2UvSGpwPHd0UilxlIl4BM2Rgyih5bdhjxB6UtUcY9uJQ\nYgxEd7y7R5+XhUAu87CEs4qAGtguDDxGtSGwgTSopvAYZewPFLw=\n",
|
||||||
"iv": "gE2O5aN+Nea6VXi7\n",
|
"iv": "Kxwqagjps8kP7Dhz\n",
|
||||||
"auth_tag": "3+EmAUgBBDyChRBHsUtLig==\n",
|
"auth_tag": "WGz5TzBzksf36hKPzBZTQQ==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"postgresql_password": {
|
"postgresql_password": {
|
||||||
"encrypted_data": "mWN2sTOjZ1EPUH/KAJ8owoPM7v/+IfIHEPACN7gFDrqG8dWGjfiu+fvILw==\n",
|
"encrypted_data": "ZziPtXhQM/TQBE+077smnjEPzfJOSo9Cj/CUnG/Be1AN0UAfielf68EhLg==\n",
|
||||||
"iv": "ldm57dVSdiPnk5l3\n",
|
"iv": "iBdSrY15vOc3eycF\n",
|
||||||
"auth_tag": "D+r/0obCYWx53vIeUDPGMQ==\n",
|
"auth_tag": "km2CkraKlpOygaz7Xy548Q==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"s3_key_id": {
|
"s3_key_id": {
|
||||||
"encrypted_data": "AvlsAInGyPMvHle5YZT3EHMTG89PggqmFaddvHSQLEkvI2EycktxJ/btjGOP\n",
|
"encrypted_data": "1j0znqBgNbHMyJIf51MmfkjkpU3SPv+EL8F30mrfQ44vsGziyeiWfp91hGUM\n",
|
||||||
"iv": "qGkILPp5EWc21wwa\n",
|
"iv": "dzJM1EX/X8Qy5KbR\n",
|
||||||
"auth_tag": "eIpCgZAnWZR7nlllj+IXMQ==\n",
|
"auth_tag": "2YUCCFG/oTph3svFYhhYzg==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"s3_secret_key": {
|
"s3_secret_key": {
|
||||||
"encrypted_data": "TAo4ViF7cL+ibIuHM77irZW08ilD46S8N5BV91gc2wegvHpHqLHw5zrsDxfu\nDiJHGUfjge/NBOGN5VSKKC0nFfMJ4sLPxVSiKyON4RMBSuzSqmo=\n",
|
"encrypted_data": "7P3JUyl0LsGuGi8GhSYdXHm4bQhnkGfSrbEMGyfzjSYB5hqm17kYZwNbNA0O\nIUmJ6Kq9Nby7IFTd1qFo7aA+dXuvxJD5QXO8T5E+D0xIaWMHPco=\n",
|
||||||
"iv": "tjK8XdaCZOdLUHyo\n",
|
"iv": "+ivHjYpQG/3gQWAi\n",
|
||||||
"auth_tag": "Qu1z6e1/4gPIyaCwBjaWsw==\n",
|
"auth_tag": "fftxN0Z/Kfrn+oFk07jKYQ==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"s3_bucket": {
|
"s3_bucket": {
|
||||||
"encrypted_data": "NTp9+KyzlblporEwM7SEwoClXu5cI10SfVrJ/uywcf/x2l8=\n",
|
"encrypted_data": "98UnmjwIlLjNFQojZlQRMZAWpI/7s9xJkgvh4sU5I2jWmYk=\n",
|
||||||
"iv": "TFTeQ8yKUhblmrFK\n",
|
"iv": "zLck9Dp6OP+L3BwX\n",
|
||||||
"auth_tag": "L9nrXEeJhxcLO4YgGk4zpg==\n",
|
"auth_tag": "Zc5G6bd7CbZfDCZ31YWxMg==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"runners": {
|
"runners": {
|
||||||
"encrypted_data": "yTCk4/hqw/4vEaXobdYU4vZRxErNp0GX4qDMuHwdr7UOQk2qQ8O8j44njPv2\ncKcIm6CQiip+GRuvl6+zETd8gctC0W14n5Rfep4zQbMp/BW3ypGambVk6z1m\nRnT4dMEl32rwcXG8c3w+vAFpx8smrK5iyy4ca0ZijC+eeysk4OAwn0XkvQuV\nB1Jy9CmVm9xiZ6sXaiU13tTry8A=\n",
|
"encrypted_data": "f0RRLCrGT7LDUEXcM6m2dJ7C95UPqVZz9dfNLsYa/3SZLDcm1p4FDIy0Su6R\nrXMoAI9IdLBN7/BDMMvqkULEq3Bx5vXn+oTUsUYuKxWmvKEUhC4virOApxh6\n5GbuqcOEPKaf9lHByL+2HKdAmJMzVRGD0t78ePS2pU4H6IFnS9V1p6opOEPr\nzTJ+0PM98eQ/voFKDHGNHUqgDs2qu9wUYNmcHe1eSimFdJiOCN0Mlszu3HL0\nXkHfrGbLrcW+8Ol7dTXdDJB7WAd3R3vddoZQ+mrwzGGDeSMm+ezeMzAX\n",
|
||||||
"iv": "+biM/42g5doJNOax\n",
|
"iv": "NtZ9SbbscX47BXGH\n",
|
||||||
"auth_tag": "WwNgd6aqm26GcekYVOeBDQ==\n",
|
"auth_tag": "ZGBzxjNFB5WPnJCpdFwtAQ==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,79 +1,93 @@
|
|||||||
{
|
{
|
||||||
"id": "mastodon",
|
"id": "mastodon",
|
||||||
"paperclip_secret": {
|
"paperclip_secret": {
|
||||||
"encrypted_data": "orOIbqFANPCkd4sUTCyyoh4z1o6SBudgH4wKJudTo9dANaHGhWcBUFKrhZi1\nMJTBQx/d0hiDI1P2XN3h+hROCg3JJ8OClUSJH9CfN5GlbWvXh0Nhq7hqy8L3\nLAPL+uigiXI6ObrnKQoD8LeJIB46233uwaCA/7zB6gah0ExJ2DXGH6qq9JSS\nqmTFiy+hT+VHGrUo\n",
|
"encrypted_data": "VJn4Yd2N7qFV+nWXPjPA8Y2KEXL/gZs2gK5E3DZZc9ogFXV7RtpDtq+NKGJU\ndpR8ohtEZvkyC+iBkMAlnS1sSVKiLdQ1xXvbzkj04mYgjnLvwsZ19uVpBGwR\nt/DON7Bhe5Fw+OyrBQksqNcZQSpB9sMBfgA1IgCpdVGHQ8PmkMbFTaZZYcoF\n7gg3yUw5/0t3vRdL\n",
|
||||||
"iv": "U4E4NLYLkP0/tTTs\n",
|
"iv": "X5atp/KaIurfln/u\n",
|
||||||
"auth_tag": "WKQ+pDPZp7B791lhC5j3iQ==\n",
|
"auth_tag": "mVnBoUb5HwhXNYUddJbq8Q==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"secret_key_base": {
|
"secret_key_base": {
|
||||||
"encrypted_data": "vweClhdY8SqQkK+p0OYUL2B6Fsz5eQDpEYWCtd/eRJfwwYAObbLcMWRC6MwE\neQVMw59bOqYc3RBuv/+WPLtENazA1bYCXBXQr1J6xqjJAz0Mo6KbRyxy5n78\nv8q6RSiao1VVIUXohtFlQgWeV6x5sz34bJxjlHinKvKsgiGXiuVBxYUUfzWQ\nuzrGug09cpZBqfpc\n",
|
"encrypted_data": "d0sNREFhzQEJhkRzielbCNBJOVAdfThv7zcYTZ1vFZ20i/mzB9GWW2nb+1yn\nNFjAq8wCLpLXn9n3FClE+WOqnAw0jwTlyScRM5lzjKI5SxHKkBQHGyFs2AF8\nqFjEvpiqxhjsc4kNOJGO8DdcyHuulXyaO9fJg8HDnU1ov1vSSuTc0ABKgycY\nMq/Xt10UXnhP8cPw\n",
|
||||||
"iv": "Z0/csEBH5/X1+MR+\n",
|
"iv": "HFT7fdGQ2KRJ2NFy\n",
|
||||||
"auth_tag": "fTvBN6eovi3JVEK0ZX97Nw==\n",
|
"auth_tag": "C55JT2msLQCoI+09VKf+Jw==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"otp_secret": {
|
"otp_secret": {
|
||||||
"encrypted_data": "o1ts1bUgPIzFQXjJ2MpBMLntWkyPxDaJAaU1K3WzmNMXnw5MVlkKKCEFVccd\nPss/MwDuBkbNPhri3ZkH48m9SiayWETVYvw5GZzcVsw4TeMu915O44lfl9tX\nW3XHU+DBps1BVH9535R4X9M1aFW4W4XfwHtS5wcrZqtVhNhS3NSgE4JpN/Dz\nFdcFAOhflnt8fIAN\n",
|
"encrypted_data": "1iH7mUkaUzyn9dfDwMdiJ8X059qWSUO3DqivsOFfI1f44nMnzllaYPu6nh8O\nNLNCOzvsSAonhhaq1X+foOdyPIG2mGhE/juKveDD57/AdZAayHWsbsQlPC4l\nwdShz/ANrq0YZ/zOhpT2sZj1TZavW+S+JlxJFX2kP24D4dUzwG0vNj7522+Q\n9NAApJdUte1ZYF/b\n",
|
||||||
"iv": "QLsxmIlX1NpxMyHz\n",
|
"iv": "00/vs5zTdoC19+pS\n",
|
||||||
"auth_tag": "j1h/PvIoqshTBN5c5IaAsA==\n",
|
"auth_tag": "3cjYqebMshnmWkQ3SdRcCQ==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"aws_access_key_id": {
|
"aws_access_key_id": {
|
||||||
"encrypted_data": "YQHUx0GugKu0AtlbGLRGocFEhTGAghWA0DUs1Nxs4Hd3bTIp4lyM\n",
|
"encrypted_data": "krcfpxOrAkwZR2GP4glTaFg2dw/COw8BO8I+KICqyl4bvpL5NrB9\n",
|
||||||
"iv": "54zt2tkQhHtpY7sO\n",
|
"iv": "paoDKp6EIU8bjxzF\n",
|
||||||
"auth_tag": "ofBJx3QDsjHe66ga3nji8g==\n",
|
"auth_tag": "p6Pt/tz5dgGXzW5cO06nBg==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"aws_secret_access_key": {
|
"aws_secret_access_key": {
|
||||||
"encrypted_data": "FAz6xZ+wsCz/KFA+DK6f4V04rxJt+9U/yXUGF9tvce0VqB3scH+T0KDDn1/n\nZ/0G0Tbxt2urRPbPUdI=\n",
|
"encrypted_data": "aQySCT7gxeNiMMocq81KtIi+YzrZwMBeTd4LrRSN8iNEikWReJrrfagBwozy\n+Gfdw4bMGzY1dhF1Sl4=\n",
|
||||||
"iv": "iapSpeM6lfDMIfNk\n",
|
"iv": "R/hvvOvmqq/uoKbx\n",
|
||||||
"auth_tag": "HlkwUnNeJlOUrZ3ieN5xAQ==\n",
|
"auth_tag": "QBJY/3+OprBXO/FSNwv2OQ==\n",
|
||||||
|
"version": 3,
|
||||||
|
"cipher": "aes-256-gcm"
|
||||||
|
},
|
||||||
|
"ldap_bind_dn": {
|
||||||
|
"encrypted_data": "wDPABdL+DlXz2WWV4XwW20kM4EWPSwc/ajBmbdYMnjFau6c76CIBpbFhrFoj\n3mwDbHz8cgOnLNvozXSV4w6N7URCN/mWWTBHNhd3ppw=\n",
|
||||||
|
"iv": "8rQ0M4LT1HbCNpq9\n",
|
||||||
|
"auth_tag": "AuO5R6WCtd75TGJNfgFSCg==\n",
|
||||||
|
"version": 3,
|
||||||
|
"cipher": "aes-256-gcm"
|
||||||
|
},
|
||||||
|
"ldap_password": {
|
||||||
|
"encrypted_data": "y0t8RuptVYiTKmUhaAWsC4c2ZzhQsYeVLeMPiQBn+Q==\n",
|
||||||
|
"iv": "mixYzDKkPSIDQ/l+\n",
|
||||||
|
"auth_tag": "DbLlZG7rlgBmyCdJ3nhSYA==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"smtp_user_name": {
|
"smtp_user_name": {
|
||||||
"encrypted_data": "ivB09/mCRrUaz9X4NFRBiqytjgy/vxN5Nha7gopFq5eSu9v4K9MkaLRqHh1I\nYw==\n",
|
"encrypted_data": "Ugc29HUFcirv6jOOlYNs9uvmhfwa2rG41im/MusCx0Vu0AZKcdy0krGi/kCZ\nKg==\n",
|
||||||
"iv": "a8WKhRKsUjqBtfmn\n",
|
"iv": "ZlDK854w+vTNmeJe\n",
|
||||||
"auth_tag": "ib5WJNNaO7bRIspdACmOLw==\n",
|
"auth_tag": "Nj95g0JMxrT419OLQIX26g==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"smtp_password": {
|
"smtp_password": {
|
||||||
"encrypted_data": "FxPz2e7fUNqcAu+DDJKlqn8rcSBLmnzigTFf5moZlQ1zz4YVl6pqHisa22Qz\nbfUx9rjU\n",
|
"encrypted_data": "D1TGjRfmM1ZeUmzwewlKXfQvvqTSzpzNlK5MKIU8dxbAH175UKn5qiemDEWe\nRYPe1LWT\n",
|
||||||
"iv": "GvRlNDV/b1WawtOP\n",
|
"iv": "D1OVfD5bMcefM5DP\n",
|
||||||
"auth_tag": "kyRCGfSJQelIwThDT4iQQQ==\n",
|
"auth_tag": "2E/q2gTbdXiLVnOMDeJv9w==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"vapid_private_key": {
|
"vapid_private_key": {
|
||||||
"encrypted_data": "DlbEAhd+SkSJoOSuwGhd5bdFlJADnT0w4u0+6m8AJoWJjoSCGAnzzmdHWT/k\nVUDkwiBCkqmEPK0oTvxnl/a8\n",
|
"encrypted_data": "+87bVrbd/XvWhZH1IYusc4Hla7ZZmylptAyJf48CMG/F3SMEO33OqW2I+UWh\nSkqbxai5+GaMhvZHB8U2Clod\n",
|
||||||
"iv": "6e0Gay7GVrQad1rI\n",
|
"iv": "HVhNdFQl0TvCcjsa\n",
|
||||||
"auth_tag": "jjVundJ/ITxP/oYgEgzElg==\n",
|
"auth_tag": "EEQXuQ5keOHXmchhBh+Ixw==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"vapid_public_key": {
|
"vapid_public_key": {
|
||||||
"encrypted_data": "+m37w/eWYqdEjsEYQw27FvQC+37ucruOFjZAjo0OgCwA0SoVz4VHX2eSA2AK\njX4CnM91cY4e/WG/ZHKlOMN1PftyQn2bdGaw35nXDanep8z0ROa01JEEi5DE\nUFRKvBmPInTeR6xvemuj7GM=\n",
|
"encrypted_data": "nBm1lXbn1+Kzol95+QSEjsUI/n7ObhdEqEyfYcVSP/LiLy57KOBQDu6CjSMz\n+PN9yEP4lOjtscqHS29jTC2vi3PSui9XpOFHRxFBnDuyKxczrnID2KlLCNRQ\n228G3VRgFIMAWMYKACgzUk0=\n",
|
||||||
"iv": "loYbGrAsWGLUZ+BK\n",
|
"iv": "xHrVl+4JGkQbfUW3\n",
|
||||||
"auth_tag": "lAfpEEVQq+n7MLLm/kpmIA==\n",
|
"auth_tag": "rfFoBMocq17YiDSlOCvWqw==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"s3_key_id": {
|
"s3_key_id": {
|
||||||
"encrypted_data": "4B8OQ0iVCCna4FvC+EuS5prEUWaHRm1+tzXGmFoCQ4WZfhUA1HwT3x651e/R\n",
|
"encrypted_data": "pq0+VZhjoxzLuyY34f23wOmuks9Wevt8Wu6muKZAsZMSuU0iJvlRoK/65Qa0\n",
|
||||||
"iv": "1/zGwcQPQQQCiXIs\n",
|
"iv": "QTxO+IfYcpI170ON\n",
|
||||||
"auth_tag": "siK9ph1q3/VVEycy91wkqQ==\n",
|
"auth_tag": "4ZHva2iBYgDv6DyhMRRXzA==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
},
|
},
|
||||||
"s3_secret_key": {
|
"s3_secret_key": {
|
||||||
"encrypted_data": "BSAc8dE/rQUiVvTGV6Ee/ZUDpq4HZlpoaCZ+lbQAbcnxui4ib0OTLPFwhVJ9\n4OQWahtSzkqxMc6MKWpadLT1a3oTnvnae9b3u40X5b2P3VyZYCM=\n",
|
"encrypted_data": "YMZqKtOXDPAME8IWWC+lO8TsxHMzawlbTju9z/Hcb5DnQAOy82QufTN90m73\n/xikUboAdKcA5YGn0mkm+Rt/ygVR6DFirYV3kwi2M3qyGVJifug=\n",
|
||||||
"iv": "bqw8GTqLMTs5vD5n\n",
|
"iv": "9AwabheRFOgC8IKR\n",
|
||||||
"auth_tag": "+e48L1lYVNda7VE3uLOAHA==\n",
|
"auth_tag": "iU2kkA1q8OsblN5jaZrWGQ==\n",
|
||||||
"version": 3,
|
"version": 3,
|
||||||
"cipher": "aes-256-gcm"
|
"cipher": "aes-256-gcm"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,6 +3,7 @@
|
|||||||
"override_attributes": {
|
"override_attributes": {
|
||||||
"akkounts": {
|
"akkounts": {
|
||||||
"btcpay": {
|
"btcpay": {
|
||||||
|
"public_url": "https://btcpay.kosmos.org",
|
||||||
"store_id": "FNJVVsrVkKaduPDAkRVchdegjwzsNhpceAdonCaXAwBX"
|
"store_id": "FNJVVsrVkKaduPDAkRVchdegjwzsNhpceAdonCaXAwBX"
|
||||||
},
|
},
|
||||||
"ejabberd": {
|
"ejabberd": {
|
||||||
@@ -11,6 +12,10 @@
|
|||||||
"lndhub": {
|
"lndhub": {
|
||||||
"public_url": "https://lndhub.kosmos.org",
|
"public_url": "https://lndhub.kosmos.org",
|
||||||
"public_key": "024cd3be18617f39cf645851e3ba63f51fc13f0bb09e3bb25e6fd4de556486d946"
|
"public_key": "024cd3be18617f39cf645851e3ba63f51fc13f0bb09e3bb25e6fd4de556486d946"
|
||||||
|
},
|
||||||
|
"nostr": {
|
||||||
|
"public_key": "b3e1b7c1660b7db0ecb93ec55c09e67961171a5c4e9e2602f1b47477ea61c50a",
|
||||||
|
"relay_url": "wss://nostr.kosmos.org"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"discourse": {
|
"discourse": {
|
||||||
@@ -20,7 +25,7 @@
|
|||||||
"public_url": "https://drone.kosmos.org"
|
"public_url": "https://drone.kosmos.org"
|
||||||
},
|
},
|
||||||
"ejabberd": {
|
"ejabberd": {
|
||||||
"turn_ip_address": "148.251.83.201"
|
"turn_domain": "turn.kosmos.org"
|
||||||
},
|
},
|
||||||
"email": {
|
"email": {
|
||||||
"domain": "kosmos.org",
|
"domain": "kosmos.org",
|
||||||
@@ -33,8 +38,7 @@
|
|||||||
"hostmaster@kosmos.org": "mail@kosmos.org",
|
"hostmaster@kosmos.org": "mail@kosmos.org",
|
||||||
"postmaster@kosmos.org": "mail@kosmos.org",
|
"postmaster@kosmos.org": "mail@kosmos.org",
|
||||||
"abuse@kosmos.org": "mail@kosmos.org",
|
"abuse@kosmos.org": "mail@kosmos.org",
|
||||||
"mail@kosmos.org": "foundation@kosmos.org",
|
"mail@kosmos.org": "foundation@kosmos.org"
|
||||||
"hackerhouse@kosmos.org": "mail@lagrange6.com"
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"garage": {
|
"garage": {
|
||||||
@@ -65,13 +69,15 @@
|
|||||||
"backup": {
|
"backup": {
|
||||||
"nodes_excluded": [
|
"nodes_excluded": [
|
||||||
"garage-",
|
"garage-",
|
||||||
|
"lq-",
|
||||||
"rsk-",
|
"rsk-",
|
||||||
"postgres-5"
|
"postgres-6"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"kosmos-mastodon": {
|
"kosmos-mastodon": {
|
||||||
"domain": "kosmos.social",
|
"domain": "kosmos.social",
|
||||||
|
"user_address_domain": "kosmos.social",
|
||||||
"s3_endpoint": "http://localhost:3900",
|
"s3_endpoint": "http://localhost:3900",
|
||||||
"s3_region": "garage",
|
"s3_region": "garage",
|
||||||
"s3_bucket": "kosmos-social",
|
"s3_bucket": "kosmos-social",
|
||||||
@@ -96,6 +102,20 @@
|
|||||||
},
|
},
|
||||||
"sentry": {
|
"sentry": {
|
||||||
"allowed_ips": "10.1.1.0/24"
|
"allowed_ips": "10.1.1.0/24"
|
||||||
|
},
|
||||||
|
"strfry": {
|
||||||
|
"domain": "nostr.kosmos.org",
|
||||||
|
"real_ip_header": "x-real-ip",
|
||||||
|
"policy_path": "/opt/strfry/strfry-policy.ts",
|
||||||
|
"whitelist_pubkeys": [
|
||||||
|
"b3e1b7c1660b7db0ecb93ec55c09e67961171a5c4e9e2602f1b47477ea61c50a"
|
||||||
|
],
|
||||||
|
"info": {
|
||||||
|
"name": "Kosmos Relay",
|
||||||
|
"description": "Members-only nostr relay for kosmos.org users",
|
||||||
|
"pubkey": "1f79058c77a224e5be226c8f024cacdad4d741855d75ed9f11473ba8eb86e1cb",
|
||||||
|
"contact": "ops@kosmos.org"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -47,7 +47,6 @@
|
|||||||
"kosmos_assets::nginx_site",
|
"kosmos_assets::nginx_site",
|
||||||
"kosmos_discourse::nginx",
|
"kosmos_discourse::nginx",
|
||||||
"kosmos_drone::nginx",
|
"kosmos_drone::nginx",
|
||||||
"kosmos-ejabberd::nginx",
|
|
||||||
"kosmos_garage::nginx_web",
|
"kosmos_garage::nginx_web",
|
||||||
"kosmos_garage::nginx_s3",
|
"kosmos_garage::nginx_s3",
|
||||||
"kosmos_gitea::nginx",
|
"kosmos_gitea::nginx",
|
||||||
@@ -55,8 +54,10 @@
|
|||||||
"kosmos_liquor-cabinet::nginx",
|
"kosmos_liquor-cabinet::nginx",
|
||||||
"kosmos_rsk::nginx_testnet",
|
"kosmos_rsk::nginx_testnet",
|
||||||
"kosmos_rsk::nginx_mainnet",
|
"kosmos_rsk::nginx_mainnet",
|
||||||
|
"kosmos_strfry::nginx",
|
||||||
"kosmos_website",
|
"kosmos_website",
|
||||||
"kosmos_website::default",
|
"kosmos_website::default",
|
||||||
|
"kosmos_website::redirects",
|
||||||
"kosmos-akkounts::nginx",
|
"kosmos-akkounts::nginx",
|
||||||
"kosmos-akkounts::nginx_api",
|
"kosmos-akkounts::nginx_api",
|
||||||
"kosmos-bitcoin::nginx_lndhub",
|
"kosmos-bitcoin::nginx_lndhub",
|
||||||
|
|||||||
@@ -24,7 +24,8 @@
|
|||||||
"openresty",
|
"openresty",
|
||||||
"garage_gateway",
|
"garage_gateway",
|
||||||
"tor_proxy",
|
"tor_proxy",
|
||||||
"zerotier_controller"
|
"zerotier_controller",
|
||||||
|
"turn_server"
|
||||||
],
|
],
|
||||||
"recipes": [
|
"recipes": [
|
||||||
"kosmos-base",
|
"kosmos-base",
|
||||||
@@ -40,7 +41,6 @@
|
|||||||
"kosmos_assets::nginx_site",
|
"kosmos_assets::nginx_site",
|
||||||
"kosmos_discourse::nginx",
|
"kosmos_discourse::nginx",
|
||||||
"kosmos_drone::nginx",
|
"kosmos_drone::nginx",
|
||||||
"kosmos-ejabberd::nginx",
|
|
||||||
"kosmos_garage::nginx_web",
|
"kosmos_garage::nginx_web",
|
||||||
"kosmos_garage::nginx_s3",
|
"kosmos_garage::nginx_s3",
|
||||||
"kosmos_gitea::nginx",
|
"kosmos_gitea::nginx",
|
||||||
@@ -48,8 +48,10 @@
|
|||||||
"kosmos_liquor-cabinet::nginx",
|
"kosmos_liquor-cabinet::nginx",
|
||||||
"kosmos_rsk::nginx_testnet",
|
"kosmos_rsk::nginx_testnet",
|
||||||
"kosmos_rsk::nginx_mainnet",
|
"kosmos_rsk::nginx_mainnet",
|
||||||
|
"kosmos_strfry::nginx",
|
||||||
"kosmos_website",
|
"kosmos_website",
|
||||||
"kosmos_website::default",
|
"kosmos_website::default",
|
||||||
|
"kosmos_website::redirects",
|
||||||
"kosmos-akkounts::nginx",
|
"kosmos-akkounts::nginx",
|
||||||
"kosmos-akkounts::nginx_api",
|
"kosmos-akkounts::nginx_api",
|
||||||
"kosmos-bitcoin::nginx_lndhub",
|
"kosmos-bitcoin::nginx_lndhub",
|
||||||
@@ -64,6 +66,7 @@
|
|||||||
"kosmos_zerotier::controller",
|
"kosmos_zerotier::controller",
|
||||||
"kosmos_zerotier::firewall",
|
"kosmos_zerotier::firewall",
|
||||||
"kosmos_zerotier::zncui",
|
"kosmos_zerotier::zncui",
|
||||||
|
"kosmos-ejabberd::coturn",
|
||||||
"kosmos-ejabberd::firewall",
|
"kosmos-ejabberd::firewall",
|
||||||
"kosmos-ipfs::firewall_swarm",
|
"kosmos-ipfs::firewall_swarm",
|
||||||
"sockethub::firewall",
|
"sockethub::firewall",
|
||||||
@@ -116,6 +119,7 @@
|
|||||||
"role[kvm_host]",
|
"role[kvm_host]",
|
||||||
"role[openresty_proxy]",
|
"role[openresty_proxy]",
|
||||||
"role[zerotier_controller]",
|
"role[zerotier_controller]",
|
||||||
|
"role[turn_server]",
|
||||||
"recipe[kosmos-ejabberd::firewall]",
|
"recipe[kosmos-ejabberd::firewall]",
|
||||||
"recipe[kosmos-ipfs::firewall_swarm]",
|
"recipe[kosmos-ipfs::firewall_swarm]",
|
||||||
"recipe[kosmos_zerotier::firewall]",
|
"recipe[kosmos_zerotier::firewall]",
|
||||||
|
|||||||
@@ -1,17 +1,17 @@
|
|||||||
{
|
{
|
||||||
"name": "garage-3",
|
"name": "garage-8",
|
||||||
"chef_environment": "production",
|
"chef_environment": "production",
|
||||||
"normal": {
|
"normal": {
|
||||||
"knife_zero": {
|
"knife_zero": {
|
||||||
"host": "10.1.1.39"
|
"host": "10.1.1.61"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"automatic": {
|
"automatic": {
|
||||||
"fqdn": "garage-3",
|
"fqdn": "garage-8",
|
||||||
"os": "linux",
|
"os": "linux",
|
||||||
"os_version": "5.4.0-132-generic",
|
"os_version": "5.4.0-1090-kvm",
|
||||||
"hostname": "garage-3",
|
"hostname": "garage-8",
|
||||||
"ipaddress": "192.168.122.191",
|
"ipaddress": "192.168.122.207",
|
||||||
"roles": [
|
"roles": [
|
||||||
"base",
|
"base",
|
||||||
"kvm_guest",
|
"kvm_guest",
|
||||||
@@ -46,13 +46,13 @@
|
|||||||
"cloud": null,
|
"cloud": null,
|
||||||
"chef_packages": {
|
"chef_packages": {
|
||||||
"chef": {
|
"chef": {
|
||||||
"version": "18.3.0",
|
"version": "18.4.2",
|
||||||
"chef_root": "/opt/chef/embedded/lib/ruby/gems/3.1.0/gems/chef-18.3.0/lib",
|
"chef_root": "/opt/chef/embedded/lib/ruby/gems/3.1.0/gems/chef-18.4.2/lib",
|
||||||
"chef_effortless": null
|
"chef_effortless": null
|
||||||
},
|
},
|
||||||
"ohai": {
|
"ohai": {
|
||||||
"version": "18.1.4",
|
"version": "18.1.11",
|
||||||
"ohai_root": "/opt/chef/embedded/lib/ruby/gems/3.1.0/gems/ohai-18.1.4/lib/ohai"
|
"ohai_root": "/opt/chef/embedded/lib/ruby/gems/3.1.0/gems/ohai-18.1.11/lib/ohai"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -61,4 +61,4 @@
|
|||||||
"role[kvm_guest]",
|
"role[kvm_guest]",
|
||||||
"role[garage_node]"
|
"role[garage_node]"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@@ -25,8 +25,8 @@
|
|||||||
"kosmos_garage",
|
"kosmos_garage",
|
||||||
"kosmos_garage::default",
|
"kosmos_garage::default",
|
||||||
"kosmos_garage::firewall_rpc",
|
"kosmos_garage::firewall_rpc",
|
||||||
"liquor_cabinet",
|
"kosmos_liquor-cabinet",
|
||||||
"liquor_cabinet::default",
|
"kosmos_liquor-cabinet::default",
|
||||||
"apt::default",
|
"apt::default",
|
||||||
"timezone_iii::default",
|
"timezone_iii::default",
|
||||||
"timezone_iii::debian",
|
"timezone_iii::debian",
|
||||||
@@ -41,7 +41,8 @@
|
|||||||
"postfix::_attributes",
|
"postfix::_attributes",
|
||||||
"postfix::sasl_auth",
|
"postfix::sasl_auth",
|
||||||
"hostname::default",
|
"hostname::default",
|
||||||
"firewall::default"
|
"firewall::default",
|
||||||
|
"liquor_cabinet::default"
|
||||||
],
|
],
|
||||||
"platform": "ubuntu",
|
"platform": "ubuntu",
|
||||||
"platform_version": "20.04",
|
"platform_version": "20.04",
|
||||||
|
|||||||
@@ -14,6 +14,7 @@
|
|||||||
"ipaddress": "192.168.122.161",
|
"ipaddress": "192.168.122.161",
|
||||||
"roles": [
|
"roles": [
|
||||||
"kvm_guest",
|
"kvm_guest",
|
||||||
|
"ldap_client",
|
||||||
"garage_gateway",
|
"garage_gateway",
|
||||||
"mastodon",
|
"mastodon",
|
||||||
"postgresql_client"
|
"postgresql_client"
|
||||||
@@ -22,6 +23,7 @@
|
|||||||
"kosmos-base",
|
"kosmos-base",
|
||||||
"kosmos-base::default",
|
"kosmos-base::default",
|
||||||
"kosmos_kvm::guest",
|
"kosmos_kvm::guest",
|
||||||
|
"kosmos-dirsrv::hostsfile",
|
||||||
"kosmos_garage",
|
"kosmos_garage",
|
||||||
"kosmos_garage::default",
|
"kosmos_garage::default",
|
||||||
"kosmos_garage::firewall_rpc",
|
"kosmos_garage::firewall_rpc",
|
||||||
@@ -84,6 +86,7 @@
|
|||||||
"run_list": [
|
"run_list": [
|
||||||
"recipe[kosmos-base]",
|
"recipe[kosmos-base]",
|
||||||
"role[kvm_guest]",
|
"role[kvm_guest]",
|
||||||
|
"role[ldap_client]",
|
||||||
"role[garage_gateway]",
|
"role[garage_gateway]",
|
||||||
"role[mastodon]"
|
"role[mastodon]"
|
||||||
]
|
]
|
||||||
|
|||||||
@@ -13,12 +13,20 @@
|
|||||||
"ipaddress": "192.168.122.211",
|
"ipaddress": "192.168.122.211",
|
||||||
"roles": [
|
"roles": [
|
||||||
"base",
|
"base",
|
||||||
"kvm_guest"
|
"kvm_guest",
|
||||||
|
"postgresql_primary"
|
||||||
],
|
],
|
||||||
"recipes": [
|
"recipes": [
|
||||||
"kosmos-base",
|
"kosmos-base",
|
||||||
"kosmos-base::default",
|
"kosmos-base::default",
|
||||||
"kosmos_kvm::guest",
|
"kosmos_kvm::guest",
|
||||||
|
"kosmos_postgresql::primary",
|
||||||
|
"kosmos_postgresql::firewall",
|
||||||
|
"kosmos-bitcoin::lndhub-go_pg_db",
|
||||||
|
"kosmos-bitcoin::nbxplorer_pg_db",
|
||||||
|
"kosmos_drone::pg_db",
|
||||||
|
"kosmos_gitea::pg_db",
|
||||||
|
"kosmos-mastodon::pg_db",
|
||||||
"apt::default",
|
"apt::default",
|
||||||
"timezone_iii::default",
|
"timezone_iii::default",
|
||||||
"timezone_iii::debian",
|
"timezone_iii::debian",
|
||||||
@@ -52,6 +60,6 @@
|
|||||||
"run_list": [
|
"run_list": [
|
||||||
"role[base]",
|
"role[base]",
|
||||||
"role[kvm_guest]",
|
"role[kvm_guest]",
|
||||||
"role[postgresql_replica]"
|
"role[postgresql_primary]"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,32 +1,24 @@
|
|||||||
{
|
{
|
||||||
"name": "postgres-4",
|
"name": "postgres-6",
|
||||||
"normal": {
|
"normal": {
|
||||||
"knife_zero": {
|
"knife_zero": {
|
||||||
"host": "10.1.1.107"
|
"host": "10.1.1.196"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"automatic": {
|
"automatic": {
|
||||||
"fqdn": "postgres-4",
|
"fqdn": "postgres-6",
|
||||||
"os": "linux",
|
"os": "linux",
|
||||||
"os_version": "5.4.0-122-generic",
|
"os_version": "5.4.0-173-generic",
|
||||||
"hostname": "postgres-4",
|
"hostname": "postgres-6",
|
||||||
"ipaddress": "192.168.122.3",
|
"ipaddress": "192.168.122.60",
|
||||||
"roles": [
|
"roles": [
|
||||||
"base",
|
"base",
|
||||||
"kvm_guest",
|
"kvm_guest"
|
||||||
"postgresql_primary"
|
|
||||||
],
|
],
|
||||||
"recipes": [
|
"recipes": [
|
||||||
"kosmos-base",
|
"kosmos-base",
|
||||||
"kosmos-base::default",
|
"kosmos-base::default",
|
||||||
"kosmos_kvm::guest",
|
"kosmos_kvm::guest",
|
||||||
"kosmos_postgresql::primary",
|
|
||||||
"kosmos_postgresql::firewall",
|
|
||||||
"kosmos-bitcoin::lndhub-go_pg_db",
|
|
||||||
"kosmos-bitcoin::nbxplorer_pg_db",
|
|
||||||
"kosmos_drone::pg_db",
|
|
||||||
"kosmos_gitea::pg_db",
|
|
||||||
"kosmos-mastodon::pg_db",
|
|
||||||
"apt::default",
|
"apt::default",
|
||||||
"timezone_iii::default",
|
"timezone_iii::default",
|
||||||
"timezone_iii::debian",
|
"timezone_iii::debian",
|
||||||
@@ -47,19 +39,19 @@
|
|||||||
"cloud": null,
|
"cloud": null,
|
||||||
"chef_packages": {
|
"chef_packages": {
|
||||||
"chef": {
|
"chef": {
|
||||||
"version": "18.3.0",
|
"version": "18.4.2",
|
||||||
"chef_root": "/opt/chef/embedded/lib/ruby/gems/3.1.0/gems/chef-18.3.0/lib",
|
"chef_root": "/opt/chef/embedded/lib/ruby/gems/3.1.0/gems/chef-18.4.2/lib",
|
||||||
"chef_effortless": null
|
"chef_effortless": null
|
||||||
},
|
},
|
||||||
"ohai": {
|
"ohai": {
|
||||||
"version": "18.1.4",
|
"version": "18.1.11",
|
||||||
"ohai_root": "/opt/chef/embedded/lib/ruby/gems/3.1.0/gems/ohai-18.1.4/lib/ohai"
|
"ohai_root": "/opt/chef/embedded/lib/ruby/gems/3.1.0/gems/ohai-18.1.11/lib/ohai"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"run_list": [
|
"run_list": [
|
||||||
"role[base]",
|
"role[base]",
|
||||||
"role[kvm_guest]",
|
"role[kvm_guest]",
|
||||||
"role[postgresql_primary]"
|
"role[postgresql_replica]"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
66
nodes/strfry-1.json
Normal file
66
nodes/strfry-1.json
Normal file
@@ -0,0 +1,66 @@
|
|||||||
|
{
|
||||||
|
"name": "strfry-1",
|
||||||
|
"chef_environment": "production",
|
||||||
|
"normal": {
|
||||||
|
"knife_zero": {
|
||||||
|
"host": "10.1.1.164"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"automatic": {
|
||||||
|
"fqdn": "strfry-1",
|
||||||
|
"os": "linux",
|
||||||
|
"os_version": "5.15.0-1060-kvm",
|
||||||
|
"hostname": "strfry-1",
|
||||||
|
"ipaddress": "192.168.122.54",
|
||||||
|
"roles": [
|
||||||
|
"base",
|
||||||
|
"kvm_guest",
|
||||||
|
"strfry",
|
||||||
|
"ldap_client"
|
||||||
|
],
|
||||||
|
"recipes": [
|
||||||
|
"kosmos-base",
|
||||||
|
"kosmos-base::default",
|
||||||
|
"kosmos_kvm::guest",
|
||||||
|
"kosmos-dirsrv::hostsfile",
|
||||||
|
"strfry",
|
||||||
|
"strfry::default",
|
||||||
|
"kosmos_strfry::policies",
|
||||||
|
"kosmos_strfry::firewall",
|
||||||
|
"apt::default",
|
||||||
|
"timezone_iii::default",
|
||||||
|
"timezone_iii::debian",
|
||||||
|
"ntp::default",
|
||||||
|
"ntp::apparmor",
|
||||||
|
"kosmos-base::systemd_emails",
|
||||||
|
"apt::unattended-upgrades",
|
||||||
|
"kosmos-base::firewall",
|
||||||
|
"kosmos-postfix::default",
|
||||||
|
"postfix::default",
|
||||||
|
"postfix::_common",
|
||||||
|
"postfix::_attributes",
|
||||||
|
"postfix::sasl_auth",
|
||||||
|
"hostname::default",
|
||||||
|
"deno::default"
|
||||||
|
],
|
||||||
|
"platform": "ubuntu",
|
||||||
|
"platform_version": "22.04",
|
||||||
|
"cloud": null,
|
||||||
|
"chef_packages": {
|
||||||
|
"chef": {
|
||||||
|
"version": "18.4.12",
|
||||||
|
"chef_root": "/opt/chef/embedded/lib/ruby/gems/3.1.0/gems/chef-18.4.12/lib",
|
||||||
|
"chef_effortless": null
|
||||||
|
},
|
||||||
|
"ohai": {
|
||||||
|
"version": "18.1.11",
|
||||||
|
"ohai_root": "/opt/chef/embedded/lib/ruby/gems/3.1.0/gems/ohai-18.1.11/lib/ohai"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"run_list": [
|
||||||
|
"role[base]",
|
||||||
|
"role[kvm_guest]",
|
||||||
|
"role[strfry]"
|
||||||
|
]
|
||||||
|
}
|
||||||
@@ -21,7 +21,6 @@ production_run_list = %w(
|
|||||||
kosmos_assets::nginx_site
|
kosmos_assets::nginx_site
|
||||||
kosmos_discourse::nginx
|
kosmos_discourse::nginx
|
||||||
kosmos_drone::nginx
|
kosmos_drone::nginx
|
||||||
kosmos-ejabberd::nginx
|
|
||||||
kosmos_garage::nginx_web
|
kosmos_garage::nginx_web
|
||||||
kosmos_garage::nginx_s3
|
kosmos_garage::nginx_s3
|
||||||
kosmos_gitea::nginx
|
kosmos_gitea::nginx
|
||||||
@@ -29,7 +28,9 @@ production_run_list = %w(
|
|||||||
kosmos_liquor-cabinet::nginx
|
kosmos_liquor-cabinet::nginx
|
||||||
kosmos_rsk::nginx_testnet
|
kosmos_rsk::nginx_testnet
|
||||||
kosmos_rsk::nginx_mainnet
|
kosmos_rsk::nginx_mainnet
|
||||||
|
kosmos_strfry::nginx
|
||||||
kosmos_website::default
|
kosmos_website::default
|
||||||
|
kosmos_website::redirects
|
||||||
kosmos-akkounts::nginx
|
kosmos-akkounts::nginx
|
||||||
kosmos-akkounts::nginx_api
|
kosmos-akkounts::nginx_api
|
||||||
kosmos-bitcoin::nginx_lndhub
|
kosmos-bitcoin::nginx_lndhub
|
||||||
|
|||||||
8
roles/strfry.rb
Normal file
8
roles/strfry.rb
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
name "strfry"
|
||||||
|
|
||||||
|
run_list %w(
|
||||||
|
role[ldap_client]
|
||||||
|
strfry::default
|
||||||
|
kosmos_strfry::policies
|
||||||
|
kosmos_strfry::firewall
|
||||||
|
)
|
||||||
5
roles/turn_server.rb
Normal file
5
roles/turn_server.rb
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
name "turn_server"
|
||||||
|
|
||||||
|
run_list %w(
|
||||||
|
kosmos-ejabberd::coturn
|
||||||
|
)
|
||||||
@@ -21,3 +21,4 @@ bundle exec knife ssh roles:postgresql_client -a knife_zero.host "sudo sed -r \"
|
|||||||
# TODO
|
# TODO
|
||||||
# 1. Change roles in node configs
|
# 1. Change roles in node configs
|
||||||
# 2. Converge new primary
|
# 2. Converge new primary
|
||||||
|
echo "You need to update the role in the '$new_primary_hostname' node config to 'postgres_primary' and converge it now."
|
||||||
|
|||||||
1
site-cookbooks/deno
Submodule
1
site-cookbooks/deno
Submodule
Submodule site-cookbooks/deno added at 617f7959ab
@@ -1,5 +1,5 @@
|
|||||||
node.default['akkounts']['repo'] = 'https://gitea.kosmos.org/kosmos/akkounts.git'
|
node.default['akkounts']['repo'] = 'https://gitea.kosmos.org/kosmos/akkounts.git'
|
||||||
node.default['akkounts']['revision'] = 'master'
|
node.default['akkounts']['revision'] = 'live'
|
||||||
node.default['akkounts']['port'] = 3000
|
node.default['akkounts']['port'] = 3000
|
||||||
node.default['akkounts']['domain'] = 'accounts.kosmos.org'
|
node.default['akkounts']['domain'] = 'accounts.kosmos.org'
|
||||||
node.default['akkounts']['primary_domain'] = 'kosmos.org'
|
node.default['akkounts']['primary_domain'] = 'kosmos.org'
|
||||||
@@ -11,6 +11,7 @@ node.default['akkounts']['smtp']['domain'] = 'kosmos.org'
|
|||||||
node.default['akkounts']['smtp']['auth_method'] = 'plain'
|
node.default['akkounts']['smtp']['auth_method'] = 'plain'
|
||||||
node.default['akkounts']['smtp']['enable_starttls'] = 'auto'
|
node.default['akkounts']['smtp']['enable_starttls'] = 'auto'
|
||||||
|
|
||||||
|
node.default['akkounts']['btcpay']['public_url'] = nil
|
||||||
node.default['akkounts']['btcpay']['store_id'] = nil
|
node.default['akkounts']['btcpay']['store_id'] = nil
|
||||||
|
|
||||||
node.default['akkounts']['ejabberd']['admin_url'] = nil
|
node.default['akkounts']['ejabberd']['admin_url'] = nil
|
||||||
@@ -20,6 +21,9 @@ node.default['akkounts']['lndhub']['public_url'] = nil
|
|||||||
node.default['akkounts']['lndhub']['public_key'] = nil
|
node.default['akkounts']['lndhub']['public_key'] = nil
|
||||||
node.default['akkounts']['lndhub']['postgres_db'] = 'lndhub'
|
node.default['akkounts']['lndhub']['postgres_db'] = 'lndhub'
|
||||||
|
|
||||||
|
node.default['akkounts']['nostr']['public_key'] = nil
|
||||||
|
node.default['akkounts']['nostr']['relay_url'] = nil
|
||||||
|
|
||||||
node.default['akkounts']['s3_enabled'] = true
|
node.default['akkounts']['s3_enabled'] = true
|
||||||
node.default['akkounts']['s3_endpoint'] = "https://s3.kosmos.org"
|
node.default['akkounts']['s3_endpoint'] = "https://s3.kosmos.org"
|
||||||
node.default['akkounts']['s3_region'] = "garage"
|
node.default['akkounts']['s3_region'] = "garage"
|
||||||
|
|||||||
@@ -30,12 +30,12 @@ npm_package "yarn" do
|
|||||||
version "1.22.4"
|
version "1.22.4"
|
||||||
end
|
end
|
||||||
|
|
||||||
ruby_version = "2.7.5"
|
ruby_version = "3.3.0"
|
||||||
ruby_path = "/opt/ruby_build/builds/#{ruby_version}"
|
ruby_path = "/opt/ruby_build/builds/#{ruby_version}"
|
||||||
bundle_path = "#{ruby_path}/bin/bundle"
|
bundle_path = "#{ruby_path}/bin/bundle"
|
||||||
rails_env = node.chef_environment == "development" ? "development" : "production"
|
rails_env = node.chef_environment == "development" ? "development" : "production"
|
||||||
|
|
||||||
ruby_build_install 'v20230615'
|
ruby_build_install 'v20240221'
|
||||||
ruby_build_definition ruby_version do
|
ruby_build_definition ruby_version do
|
||||||
prefix_path ruby_path
|
prefix_path ruby_path
|
||||||
end
|
end
|
||||||
@@ -75,6 +75,7 @@ end
|
|||||||
|
|
||||||
if btcpay_host
|
if btcpay_host
|
||||||
env[:btcpay_api_url] = "http://#{btcpay_host}:23001/api/v1"
|
env[:btcpay_api_url] = "http://#{btcpay_host}:23001/api/v1"
|
||||||
|
env[:btcpay_public_url] = node['akkounts']['btcpay']['public_url']
|
||||||
env[:btcpay_store_id] = node['akkounts']['btcpay']['store_id']
|
env[:btcpay_store_id] = node['akkounts']['btcpay']['store_id']
|
||||||
env[:btcpay_auth_token] = credentials["btcpay_auth_token"]
|
env[:btcpay_auth_token] = credentials["btcpay_auth_token"]
|
||||||
end
|
end
|
||||||
@@ -148,6 +149,7 @@ end
|
|||||||
#
|
#
|
||||||
|
|
||||||
env[:mastodon_public_url] = "https://#{node['kosmos-mastodon']['domain']}"
|
env[:mastodon_public_url] = "https://#{node['kosmos-mastodon']['domain']}"
|
||||||
|
env[:mastodon_address_domain] = node['kosmos-mastodon']['user_address_domain']
|
||||||
|
|
||||||
#
|
#
|
||||||
# MediaWiki
|
# MediaWiki
|
||||||
@@ -155,6 +157,14 @@ env[:mastodon_public_url] = "https://#{node['kosmos-mastodon']['domain']}"
|
|||||||
|
|
||||||
env[:mediawiki_public_url] = node['mediawiki']['url']
|
env[:mediawiki_public_url] = node['mediawiki']['url']
|
||||||
|
|
||||||
|
#
|
||||||
|
# Nostr
|
||||||
|
#
|
||||||
|
|
||||||
|
env[:nostr_private_key] = credentials['nostr_private_key']
|
||||||
|
env[:nostr_public_key] = node['akkounts']['nostr']['public_key']
|
||||||
|
env[:nostr_relay_url] = node['akkounts']['nostr']['relay_url']
|
||||||
|
|
||||||
#
|
#
|
||||||
# remoteStorage / Liquor Cabinet
|
# remoteStorage / Liquor Cabinet
|
||||||
#
|
#
|
||||||
|
|||||||
@@ -2,27 +2,6 @@
|
|||||||
# Cookbook Name:: kosmos-base
|
# Cookbook Name:: kosmos-base
|
||||||
# Recipe:: letsencrypt
|
# Recipe:: letsencrypt
|
||||||
#
|
#
|
||||||
# The MIT License (MIT)
|
|
||||||
#
|
|
||||||
# Copyright:: 2019, Kosmos Developers
|
|
||||||
#
|
|
||||||
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
||||||
# of this software and associated documentation files (the "Software"), to deal
|
|
||||||
# in the Software without restriction, including without limitation the rights
|
|
||||||
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
||||||
# copies of the Software, and to permit persons to whom the Software is
|
|
||||||
# furnished to do so, subject to the following conditions:
|
|
||||||
#
|
|
||||||
# The above copyright notice and this permission notice shall be included in
|
|
||||||
# all copies or substantial portions of the Software.
|
|
||||||
#
|
|
||||||
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
||||||
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
||||||
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
||||||
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
||||||
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
||||||
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
||||||
# THE SOFTWARE.
|
|
||||||
|
|
||||||
unless platform?('ubuntu')
|
unless platform?('ubuntu')
|
||||||
raise "This recipe only supports Ubuntu installs"
|
raise "This recipe only supports Ubuntu installs"
|
||||||
|
|||||||
@@ -3,6 +3,8 @@ provides :tls_cert_for
|
|||||||
|
|
||||||
property :domain, [String, Array], name_property: true
|
property :domain, [String, Array], name_property: true
|
||||||
property :auth, [String, NilClass], default: nil
|
property :auth, [String, NilClass], default: nil
|
||||||
|
property :deploy_hook, [String, NilClass], default: nil
|
||||||
|
property :acme_domain, [String, NilClass], default: nil
|
||||||
|
|
||||||
default_action :create
|
default_action :create
|
||||||
|
|
||||||
@@ -17,13 +19,35 @@ action :create do
|
|||||||
|
|
||||||
case new_resource.auth
|
case new_resource.auth
|
||||||
when "gandi_dns"
|
when "gandi_dns"
|
||||||
gandi_api_data_bag_item = data_bag_item('credentials', 'gandi_api_5apps')
|
gandi_api_credentials = data_bag_item('credentials', 'gandi_api')
|
||||||
|
|
||||||
hook_path = "/root/gandi_dns_certbot_hook.sh"
|
hook_path = "/root/gandi_dns_certbot_hook.sh"
|
||||||
|
hook_auth_command = "#{hook_path} auth"
|
||||||
|
hook_cleanup_command = "#{hook_path} cleanup"
|
||||||
|
|
||||||
|
if new_resource.acme_domain
|
||||||
|
hook_auth_command += " #{new_resource.acme_domain}"
|
||||||
|
hook_cleanup_command += " #{new_resource.acme_domain}"
|
||||||
|
end
|
||||||
|
|
||||||
template hook_path do
|
template hook_path do
|
||||||
cookbook "kosmos-base"
|
cookbook "kosmos-base"
|
||||||
variables gandi_api_key: gandi_api_data_bag_item["key"]
|
variables access_token: gandi_api_credentials["access_token"]
|
||||||
mode 0770
|
mode 0700
|
||||||
|
sensitive true
|
||||||
|
end
|
||||||
|
|
||||||
|
if new_resource.deploy_hook
|
||||||
|
deploy_hook_path = "/etc/letsencrypt/renewal-hooks/#{domains.first}"
|
||||||
|
|
||||||
|
file deploy_hook_path do
|
||||||
|
content new_resource.deploy_hook
|
||||||
|
mode 0755
|
||||||
|
owner "root"
|
||||||
|
group "root"
|
||||||
|
end
|
||||||
|
elsif node.run_list.roles.include?("openresty_proxy")
|
||||||
|
deploy_hook_path = "/etc/letsencrypt/renewal-hooks/post/openresty"
|
||||||
end
|
end
|
||||||
|
|
||||||
# Generate a Let's Encrypt cert (only if no cert has been generated before).
|
# Generate a Let's Encrypt cert (only if no cert has been generated before).
|
||||||
@@ -34,10 +58,10 @@ action :create do
|
|||||||
--preferred-challenges dns \
|
--preferred-challenges dns \
|
||||||
--manual-public-ip-logging-ok \
|
--manual-public-ip-logging-ok \
|
||||||
--agree-tos \
|
--agree-tos \
|
||||||
--manual-auth-hook '#{hook_path} auth' \
|
--manual-auth-hook '#{hook_auth_command}' \
|
||||||
--manual-cleanup-hook '#{hook_path} cleanup' \
|
--manual-cleanup-hook '#{hook_cleanup_command}' \
|
||||||
--email ops@kosmos.org \
|
--email ops@kosmos.org \
|
||||||
#{node.run_list.roles.include?("openresty_proxy") ? '--deploy-hook /etc/letsencrypt/renewal-hooks/post/openresty' : nil } \
|
#{"--deploy-hook #{deploy_hook_path}" if defined?(deploy_hook_path)} \
|
||||||
#{domains.map {|d| "-d #{d}" }.join(" ")}
|
#{domains.map {|d| "-d #{d}" }.join(" ")}
|
||||||
CMD
|
CMD
|
||||||
not_if do
|
not_if do
|
||||||
|
|||||||
@@ -1,21 +1,16 @@
|
|||||||
#!/usr/bin/env bash
|
#!/usr/bin/env bash
|
||||||
#
|
|
||||||
|
|
||||||
set -euf -o pipefail
|
set -euf -o pipefail
|
||||||
|
|
||||||
# ************** USAGE **************
|
# ************** USAGE **************
|
||||||
#
|
#
|
||||||
# Example usage (with this hook file saved in /root/):
|
# Example usage:
|
||||||
#
|
#
|
||||||
# sudo su -
|
|
||||||
# certbot certonly --manual --preferred-challenges dns --manual-public-ip-logging-ok --agree-tos -d "5apps.com" -d muc.5apps.com -d "xmpp.5apps.com" \
|
# certbot certonly --manual --preferred-challenges dns --manual-public-ip-logging-ok --agree-tos -d "5apps.com" -d muc.5apps.com -d "xmpp.5apps.com" \
|
||||||
# --manual-auth-hook "/root/letsencrypt_hook.sh auth" --manual-cleanup-hook "/root/letsencrypt_hook.sh cleanup"
|
# --manual-auth-hook "/root/letsencrypt_hook.sh auth" --manual-cleanup-hook "/root/letsencrypt_hook.sh cleanup"
|
||||||
#
|
#
|
||||||
# This hook requires configuration, continue reading.
|
|
||||||
#
|
|
||||||
# ************** CONFIGURATION **************
|
# ************** CONFIGURATION **************
|
||||||
#
|
#
|
||||||
# GANDI_API_KEY: Your Gandi Live API key
|
# ACCESS_TOKEN: Your Gandi Live API key
|
||||||
#
|
#
|
||||||
# PROVIDER_UPDATE_DELAY:
|
# PROVIDER_UPDATE_DELAY:
|
||||||
# How many seconds to wait after updating your DNS records. This may be required,
|
# How many seconds to wait after updating your DNS records. This may be required,
|
||||||
@@ -25,10 +20,16 @@ set -euf -o pipefail
|
|||||||
#
|
#
|
||||||
# Defaults to 30 seconds.
|
# Defaults to 30 seconds.
|
||||||
#
|
#
|
||||||
GANDI_API_KEY="<%= @gandi_api_key %>"
|
# VALIDATION_DOMAIN:
|
||||||
|
# Domain to create ACME DNS entries on. Use this when redirecting ACME subdomains
|
||||||
|
# from the original domain to a proxy validation domain that we control.
|
||||||
|
#
|
||||||
|
ACCESS_TOKEN="<%= @access_token %>"
|
||||||
PROVIDER_UPDATE_DELAY=10
|
PROVIDER_UPDATE_DELAY=10
|
||||||
|
VALIDATION_DOMAIN="${2:-}"
|
||||||
|
|
||||||
regex='.*\.(.*\..*)'
|
regex='.*\.(.*\..*)'
|
||||||
|
|
||||||
if [[ $CERTBOT_DOMAIN =~ $regex ]]
|
if [[ $CERTBOT_DOMAIN =~ $regex ]]
|
||||||
then
|
then
|
||||||
DOMAIN="${BASH_REMATCH[1]}"
|
DOMAIN="${BASH_REMATCH[1]}"
|
||||||
@@ -36,25 +37,41 @@ else
|
|||||||
DOMAIN="${CERTBOT_DOMAIN}"
|
DOMAIN="${CERTBOT_DOMAIN}"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
if [[ -n "$VALIDATION_DOMAIN" ]]
|
||||||
|
then
|
||||||
|
if [[ $VALIDATION_DOMAIN =~ $regex ]]
|
||||||
|
then
|
||||||
|
ACME_BASE_DOMAIN="${BASH_REMATCH[1]}"
|
||||||
|
else
|
||||||
|
echo "Validation domain has to be a subdomain, but it is not: \"${VALIDATION_DOMAIN}\""
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
ACME_DOMAIN="${CERTBOT_DOMAIN}.${VALIDATION_DOMAIN}"
|
||||||
|
else
|
||||||
|
ACME_BASE_DOMAIN="${DOMAIN}"
|
||||||
|
ACME_DOMAIN="_acme-challenge.${CERTBOT_DOMAIN}"
|
||||||
|
fi
|
||||||
|
|
||||||
# To be invoked via Certbot's --manual-auth-hook
|
# To be invoked via Certbot's --manual-auth-hook
|
||||||
function auth {
|
function auth {
|
||||||
curl -s -D- -H "Content-Type: application/json" \
|
curl -s -D- \
|
||||||
-H "X-Api-Key: ${GANDI_API_KEY}" \
|
-H "Content-Type: application/json" \
|
||||||
-d "{\"rrset_name\": \"_acme-challenge.${CERTBOT_DOMAIN}.\",
|
-H "Authorization: Bearer ${ACCESS_TOKEN}" \
|
||||||
\"rrset_type\": \"TXT\",
|
-d "{\"rrset_name\": \"${ACME_DOMAIN}.\",
|
||||||
\"rrset_ttl\": 3600,
|
\"rrset_type\": \"TXT\",
|
||||||
\"rrset_values\": [\"${CERTBOT_VALIDATION}\"]}" \
|
\"rrset_ttl\": 300,
|
||||||
"https://dns.api.gandi.net/api/v5/domains/${DOMAIN}/records"
|
\"rrset_values\": [\"${CERTBOT_VALIDATION}\"]}" \
|
||||||
|
"https://api.gandi.net/v5/livedns/domains/${ACME_BASE_DOMAIN}/records"
|
||||||
|
|
||||||
|
sleep ${PROVIDER_UPDATE_DELAY}
|
||||||
sleep ${PROVIDER_UPDATE_DELAY}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
# To be invoked via Certbot's --manual-cleanup-hook
|
# To be invoked via Certbot's --manual-cleanup-hook
|
||||||
function cleanup {
|
function cleanup {
|
||||||
curl -s -X DELETE -H "Content-Type: application/json" \
|
curl -s -X DELETE \
|
||||||
-H "X-Api-Key: ${GANDI_API_KEY}" \
|
-H "Content-Type: application/json" \
|
||||||
https://dns.api.gandi.net/api/v5/domains/${DOMAIN}/records/_acme-challenge.${CERTBOT_DOMAIN}./TXT
|
-H "Authorization: Bearer ${ACCESS_TOKEN}" \
|
||||||
|
"https://api.gandi.net/v5/livedns/domains/${ACME_BASE_DOMAIN}/records/${ACME_DOMAIN}./TXT"
|
||||||
}
|
}
|
||||||
|
|
||||||
HANDLER=$1; shift;
|
HANDLER=$1; shift;
|
||||||
|
|||||||
@@ -98,7 +98,7 @@ node.default['dotnet']['ms_packages_src_url'] = "https://packages.microsoft.com/
|
|||||||
node.default['dotnet']['ms_packages_src_checksum'] = "4df5811c41fdded83eb9e2da9336a8dfa5594a79dc8a80133bd815f4f85b9991"
|
node.default['dotnet']['ms_packages_src_checksum'] = "4df5811c41fdded83eb9e2da9336a8dfa5594a79dc8a80133bd815f4f85b9991"
|
||||||
|
|
||||||
node.default['nbxplorer']['repo'] = 'https://github.com/dgarage/NBXplorer'
|
node.default['nbxplorer']['repo'] = 'https://github.com/dgarage/NBXplorer'
|
||||||
node.default['nbxplorer']['revision'] = 'v2.4.3'
|
node.default['nbxplorer']['revision'] = 'v2.5.0'
|
||||||
node.default['nbxplorer']['source_dir'] = '/opt/nbxplorer'
|
node.default['nbxplorer']['source_dir'] = '/opt/nbxplorer'
|
||||||
node.default['nbxplorer']['config_path'] = "/home/#{node['bitcoin']['username']}/.nbxplorer/Main/settings.config"
|
node.default['nbxplorer']['config_path'] = "/home/#{node['bitcoin']['username']}/.nbxplorer/Main/settings.config"
|
||||||
node.default['nbxplorer']['port'] = '24445'
|
node.default['nbxplorer']['port'] = '24445'
|
||||||
@@ -106,7 +106,7 @@ node.default['nbxplorer']['postgres']['database'] = 'nbxplorer'
|
|||||||
node.default['nbxplorer']['postgres']['user'] = 'nbxplorer'
|
node.default['nbxplorer']['postgres']['user'] = 'nbxplorer'
|
||||||
|
|
||||||
node.default['btcpay']['repo'] = 'https://github.com/btcpayserver/btcpayserver'
|
node.default['btcpay']['repo'] = 'https://github.com/btcpayserver/btcpayserver'
|
||||||
node.default['btcpay']['revision'] = 'v1.11.7'
|
node.default['btcpay']['revision'] = 'v1.12.5'
|
||||||
node.default['btcpay']['source_dir'] = '/opt/btcpay'
|
node.default['btcpay']['source_dir'] = '/opt/btcpay'
|
||||||
node.default['btcpay']['config_path'] = "/home/#{node['bitcoin']['username']}/.btcpayserver/Main/settings.config"
|
node.default['btcpay']['config_path'] = "/home/#{node['bitcoin']['username']}/.btcpayserver/Main/settings.config"
|
||||||
node.default['btcpay']['log_path'] = "/home/#{node['bitcoin']['username']}/.btcpayserver/debug.log"
|
node.default['btcpay']['log_path'] = "/home/#{node['bitcoin']['username']}/.btcpayserver/debug.log"
|
||||||
|
|||||||
@@ -1,7 +1,9 @@
|
|||||||
node.default["ejabberd"]["version"] = "23.10"
|
node.default["ejabberd"]["version"] = "23.10"
|
||||||
node.default["ejabberd"]["package_version"] = "1"
|
node.default["ejabberd"]["package_version"] = "1"
|
||||||
node.default["ejabberd"]["checksum"] = "1b02108c81e22ab28be84630d54061f0584b76d5c2702e598352269736b05e77"
|
node.default["ejabberd"]["checksum"] = "1b02108c81e22ab28be84630d54061f0584b76d5c2702e598352269736b05e77"
|
||||||
node.default["ejabberd"]["turn_ip_address"] = nil
|
node.default["ejabberd"]["turn_domain"] = "turn.kosmos.org"
|
||||||
|
node.default["ejabberd"]["stun_auth_realm"] = "kosmos.org"
|
||||||
node.default["ejabberd"]["stun_turn_port"] = 3478
|
node.default["ejabberd"]["stun_turn_port"] = 3478
|
||||||
|
node.default["ejabberd"]["stun_turn_port_tls"] = 5349
|
||||||
node.default["ejabberd"]["turn_min_port"] = 50000
|
node.default["ejabberd"]["turn_min_port"] = 50000
|
||||||
node.default["ejabberd"]["turn_max_port"] = 50050
|
node.default["ejabberd"]["turn_max_port"] = 50999
|
||||||
|
|||||||
52
site-cookbooks/kosmos-ejabberd/recipes/coturn.rb
Normal file
52
site-cookbooks/kosmos-ejabberd/recipes/coturn.rb
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
#
|
||||||
|
# Cookbook:: kosmos-ejabberd
|
||||||
|
# Recipe:: coturn
|
||||||
|
#
|
||||||
|
|
||||||
|
apt_package 'coturn'
|
||||||
|
|
||||||
|
domain = node["ejabberd"]["turn_domain"]
|
||||||
|
credentials = data_bag_item("credentials", "ejabberd")
|
||||||
|
|
||||||
|
tls_cert_for domain do
|
||||||
|
auth "gandi_dns"
|
||||||
|
action :create
|
||||||
|
end
|
||||||
|
|
||||||
|
template "/etc/turnserver.conf" do
|
||||||
|
source "turnserver.conf.erb"
|
||||||
|
mode 0644
|
||||||
|
variables listening_port: node["ejabberd"]["stun_turn_port"],
|
||||||
|
tls_listening_port: node["ejabberd"]["stun_turn_port_tls"],
|
||||||
|
listening_ip: node["ipaddress"],
|
||||||
|
relay_ip: node["ipaddress"],
|
||||||
|
min_port: node["ejabberd"]["turn_min_port"],
|
||||||
|
max_port: node["ejabberd"]["turn_max_port"],
|
||||||
|
realm: node["ejabberd"]["stun_auth_realm"],
|
||||||
|
static_auth_secret: credentials["stun_secret"],
|
||||||
|
cert: "/etc/letsencrypt/live/#{domain}/fullchain.pem",
|
||||||
|
pkey: "/etc/letsencrypt/live/#{domain}/privkey.pem"
|
||||||
|
notifies :restart, "service[coturn]", :delayed
|
||||||
|
end
|
||||||
|
|
||||||
|
firewall_rule 'ejabberd_stun_turn' do
|
||||||
|
port node["ejabberd"]["stun_turn_port"]
|
||||||
|
protocol :udp
|
||||||
|
command :allow
|
||||||
|
end
|
||||||
|
|
||||||
|
firewall_rule 'ejabberd_stun_turn_tls' do
|
||||||
|
port node["ejabberd"]["stun_turn_port_tls"]
|
||||||
|
protocol :tcp
|
||||||
|
command :allow
|
||||||
|
end
|
||||||
|
|
||||||
|
firewall_rule 'ejabberd_turn' do
|
||||||
|
port node["ejabberd"]["turn_min_port"]..node["ejabberd"]["turn_max_port"]
|
||||||
|
protocol :udp
|
||||||
|
command :allow
|
||||||
|
end
|
||||||
|
|
||||||
|
service "coturn" do
|
||||||
|
action [:enable, :start]
|
||||||
|
end
|
||||||
@@ -154,6 +154,11 @@ admin_users = ejabberd_credentials['admins']
|
|||||||
|
|
||||||
hosts.each do |host|
|
hosts.each do |host|
|
||||||
ldap_rootdn = "uid=service,ou=#{host[:name]},cn=applications,dc=kosmos,dc=org"
|
ldap_rootdn = "uid=service,ou=#{host[:name]},cn=applications,dc=kosmos,dc=org"
|
||||||
|
if host[:name] == "kosmos.org"
|
||||||
|
ldap_filter = "(&(objectClass=person)(serviceEnabled=xmpp))"
|
||||||
|
else
|
||||||
|
ldap_filter = "(objectClass=person)"
|
||||||
|
end
|
||||||
|
|
||||||
template "/opt/ejabberd/conf/#{host[:name]}.yml" do
|
template "/opt/ejabberd/conf/#{host[:name]}.yml" do
|
||||||
source "vhost.yml.erb"
|
source "vhost.yml.erb"
|
||||||
@@ -167,7 +172,8 @@ hosts.each do |host|
|
|||||||
ldap_base: ldap_base,
|
ldap_base: ldap_base,
|
||||||
ldap_server: ldap_domain,
|
ldap_server: ldap_domain,
|
||||||
ldap_rootdn: ldap_rootdn,
|
ldap_rootdn: ldap_rootdn,
|
||||||
ldap_encryption_type: ldap_encryption_type
|
ldap_encryption_type: ldap_encryption_type,
|
||||||
|
ldap_filter: ldap_filter
|
||||||
notifies :reload, "service[ejabberd]", :delayed
|
notifies :reload, "service[ejabberd]", :delayed
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
@@ -183,10 +189,10 @@ template "/opt/ejabberd/conf/ejabberd.yml" do
|
|||||||
sensitive true
|
sensitive true
|
||||||
variables hosts: hosts,
|
variables hosts: hosts,
|
||||||
admin_users: admin_users,
|
admin_users: admin_users,
|
||||||
stun_auth_realm: "kosmos.org",
|
turn_domain: node["ejabberd"]["turn_domain"],
|
||||||
stun_secret: ejabberd_credentials['stun_secret'],
|
stun_secret: ejabberd_credentials['stun_secret'],
|
||||||
turn_ip_address: node["ejabberd"]["turn_ip_address"],
|
|
||||||
stun_turn_port: node["ejabberd"]["stun_turn_port"],
|
stun_turn_port: node["ejabberd"]["stun_turn_port"],
|
||||||
|
stun_turn_port_tls: node["ejabberd"]["stun_turn_port_tls"],
|
||||||
turn_min_port: node["ejabberd"]["turn_min_port"],
|
turn_min_port: node["ejabberd"]["turn_min_port"],
|
||||||
turn_max_port: node["ejabberd"]["turn_max_port"],
|
turn_max_port: node["ejabberd"]["turn_max_port"],
|
||||||
private_ip_address: node["knife_zero"]["host"],
|
private_ip_address: node["knife_zero"]["host"],
|
||||||
|
|||||||
@@ -33,11 +33,11 @@ file "/etc/letsencrypt/renewal-hooks/post/ejabberd" do
|
|||||||
group "root"
|
group "root"
|
||||||
end
|
end
|
||||||
|
|
||||||
gandi_api_data_bag_item = data_bag_item('credentials', 'gandi_api_5apps')
|
gandi_api_credentials = data_bag_item('credentials', 'gandi_api')
|
||||||
|
|
||||||
template "/root/gandi_dns_certbot_hook.sh" do
|
template "/root/gandi_dns_certbot_hook.sh" do
|
||||||
variables gandi_api_key: gandi_api_data_bag_item["key"]
|
variables access_token: gandi_api_credentials["access_token"]
|
||||||
mode 0770
|
mode 0700
|
||||||
end
|
end
|
||||||
|
|
||||||
# Generate a Let's Encrypt cert (only if no cert has been generated before).
|
# Generate a Let's Encrypt cert (only if no cert has been generated before).
|
||||||
@@ -52,7 +52,7 @@ end
|
|||||||
# Generate a Let's Encrypt cert (only if no cert has been generated before).
|
# Generate a Let's Encrypt cert (only if no cert has been generated before).
|
||||||
# The systemd timer will take care of renewing
|
# The systemd timer will take care of renewing
|
||||||
execute "letsencrypt cert for 5apps xmpp" do
|
execute "letsencrypt cert for 5apps xmpp" do
|
||||||
command "certbot certonly --manual --preferred-challenges dns --manual-public-ip-logging-ok --agree-tos --manual-auth-hook \"/root/gandi_dns_certbot_hook.sh auth\" --manual-cleanup-hook \"/root/gandi_dns_certbot_hook.sh cleanup\" --deploy-hook \"/etc/letsencrypt/renewal-hooks/post/ejabberd\" --email ops@5apps.com -d 5apps.com -d muc.5apps.com -d xmpp.5apps.com -d uploads.xmpp.5apps.com -n"
|
command "certbot certonly --manual --preferred-challenges dns --manual-public-ip-logging-ok --agree-tos --manual-auth-hook \"/root/gandi_dns_certbot_hook.sh auth letsencrypt.kosmos.chat\" --manual-cleanup-hook \"/root/gandi_dns_certbot_hook.sh cleanup letsencrypt.kosmos.chat\" --deploy-hook \"/etc/letsencrypt/renewal-hooks/post/ejabberd\" --email ops@5apps.com -d 5apps.com -d muc.5apps.com -d xmpp.5apps.com -d uploads.xmpp.5apps.com -n"
|
||||||
not_if do
|
not_if do
|
||||||
File.exist?("/etc/letsencrypt/live/5apps.com/fullchain.pem")
|
File.exist?("/etc/letsencrypt/live/5apps.com/fullchain.pem")
|
||||||
end
|
end
|
||||||
|
|||||||
@@ -87,16 +87,6 @@ listen:
|
|||||||
## "/pub/archive": mod_http_fileserver
|
## "/pub/archive": mod_http_fileserver
|
||||||
## register: true
|
## register: true
|
||||||
captcha: false
|
captcha: false
|
||||||
-
|
|
||||||
port: <%= @stun_turn_port %>
|
|
||||||
transport: udp
|
|
||||||
module: ejabberd_stun
|
|
||||||
auth_realm: <%= @stun_auth_realm %>
|
|
||||||
use_turn: true
|
|
||||||
tls: false
|
|
||||||
turn_ipv4_address: <%= @turn_ip_address %>
|
|
||||||
turn_min_port: <%= @turn_min_port %>
|
|
||||||
turn_max_port: <%= @turn_max_port %>
|
|
||||||
|
|
||||||
s2s_use_starttls: optional
|
s2s_use_starttls: optional
|
||||||
|
|
||||||
@@ -133,7 +123,7 @@ shaper_rules:
|
|||||||
max_user_sessions: 10
|
max_user_sessions: 10
|
||||||
max_user_offline_messages:
|
max_user_offline_messages:
|
||||||
- 5000: admin
|
- 5000: admin
|
||||||
- 100
|
- 1000
|
||||||
c2s_shaper:
|
c2s_shaper:
|
||||||
- none: admin
|
- none: admin
|
||||||
- normal
|
- normal
|
||||||
@@ -240,20 +230,34 @@ modules:
|
|||||||
store_current_id: true
|
store_current_id: true
|
||||||
mod_shared_roster: {}
|
mod_shared_roster: {}
|
||||||
mod_stun_disco:
|
mod_stun_disco:
|
||||||
|
offer_local_services: false
|
||||||
|
credentials_lifetime: 300
|
||||||
secret: <%= @stun_secret %>
|
secret: <%= @stun_secret %>
|
||||||
services:
|
services:
|
||||||
-
|
-
|
||||||
host: <%= @turn_ip_address %>
|
host: <%= @turn_domain %>
|
||||||
port: <%= @stun_turn_port %>
|
port: <%= @stun_turn_port %>
|
||||||
type: stun
|
type: stun
|
||||||
transport: udp
|
transport: udp
|
||||||
restricted: false
|
restricted: false
|
||||||
-
|
-
|
||||||
host: <%= @turn_ip_address %>
|
host: <%= @turn_domain %>
|
||||||
|
port: <%= @stun_turn_port_tls %>
|
||||||
|
type: stuns
|
||||||
|
transport: tcp
|
||||||
|
restricted: false
|
||||||
|
-
|
||||||
|
host: <%= @turn_domain %>
|
||||||
port: <%= @stun_turn_port %>
|
port: <%= @stun_turn_port %>
|
||||||
type: turn
|
type: turn
|
||||||
transport: udp
|
transport: udp
|
||||||
restricted: true
|
restricted: true
|
||||||
|
-
|
||||||
|
host: <%= @turn_domain %>
|
||||||
|
port: <%= @stun_turn_port_tls %>
|
||||||
|
type: turns
|
||||||
|
transport: tcp
|
||||||
|
restricted: true
|
||||||
mod_vcard:
|
mod_vcard:
|
||||||
search: false
|
search: false
|
||||||
mod_vcard_xupdate: {}
|
mod_vcard_xupdate: {}
|
||||||
|
|||||||
@@ -1,21 +1,16 @@
|
|||||||
#!/usr/bin/env bash
|
#!/usr/bin/env bash
|
||||||
#
|
|
||||||
|
|
||||||
set -euf -o pipefail
|
set -euf -o pipefail
|
||||||
|
|
||||||
# ************** USAGE **************
|
# ************** USAGE **************
|
||||||
#
|
#
|
||||||
# Example usage (with this hook file saved in /root/):
|
# Example usage:
|
||||||
#
|
#
|
||||||
# sudo su -
|
|
||||||
# certbot certonly --manual --preferred-challenges dns --manual-public-ip-logging-ok --agree-tos -d "5apps.com" -d muc.5apps.com -d "xmpp.5apps.com" \
|
# certbot certonly --manual --preferred-challenges dns --manual-public-ip-logging-ok --agree-tos -d "5apps.com" -d muc.5apps.com -d "xmpp.5apps.com" \
|
||||||
# --manual-auth-hook "/root/letsencrypt_hook.sh auth" --manual-cleanup-hook "/root/letsencrypt_hook.sh cleanup"
|
# --manual-auth-hook "/root/letsencrypt_hook.sh auth" --manual-cleanup-hook "/root/letsencrypt_hook.sh cleanup"
|
||||||
#
|
#
|
||||||
# This hook requires configuration, continue reading.
|
|
||||||
#
|
|
||||||
# ************** CONFIGURATION **************
|
# ************** CONFIGURATION **************
|
||||||
#
|
#
|
||||||
# GANDI_API_KEY: Your Gandi Live API key
|
# ACCESS_TOKEN: Your Gandi Live API key
|
||||||
#
|
#
|
||||||
# PROVIDER_UPDATE_DELAY:
|
# PROVIDER_UPDATE_DELAY:
|
||||||
# How many seconds to wait after updating your DNS records. This may be required,
|
# How many seconds to wait after updating your DNS records. This may be required,
|
||||||
@@ -25,10 +20,16 @@ set -euf -o pipefail
|
|||||||
#
|
#
|
||||||
# Defaults to 30 seconds.
|
# Defaults to 30 seconds.
|
||||||
#
|
#
|
||||||
GANDI_API_KEY="<%= @gandi_api_key %>"
|
# VALIDATION_DOMAIN:
|
||||||
PROVIDER_UPDATE_DELAY=30
|
# Domain to create ACME DNS entries on. Use this when redirecting ACME subdomains
|
||||||
|
# from the original domain to a proxy validation domain that we control.
|
||||||
|
#
|
||||||
|
ACCESS_TOKEN="<%= @access_token %>"
|
||||||
|
PROVIDER_UPDATE_DELAY=10
|
||||||
|
VALIDATION_DOMAIN="${2:-}"
|
||||||
|
|
||||||
regex='.*\.(.*\..*)'
|
regex='.*\.(.*\..*)'
|
||||||
|
|
||||||
if [[ $CERTBOT_DOMAIN =~ $regex ]]
|
if [[ $CERTBOT_DOMAIN =~ $regex ]]
|
||||||
then
|
then
|
||||||
DOMAIN="${BASH_REMATCH[1]}"
|
DOMAIN="${BASH_REMATCH[1]}"
|
||||||
@@ -36,25 +37,41 @@ else
|
|||||||
DOMAIN="${CERTBOT_DOMAIN}"
|
DOMAIN="${CERTBOT_DOMAIN}"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
if [[ -n "$VALIDATION_DOMAIN" ]]
|
||||||
|
then
|
||||||
|
if [[ $VALIDATION_DOMAIN =~ $regex ]]
|
||||||
|
then
|
||||||
|
ACME_BASE_DOMAIN="${BASH_REMATCH[1]}"
|
||||||
|
else
|
||||||
|
echo "Validation domain has to be a subdomain, but it is not: \"${VALIDATION_DOMAIN}\""
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
ACME_DOMAIN="${CERTBOT_DOMAIN}.${VALIDATION_DOMAIN}"
|
||||||
|
else
|
||||||
|
ACME_BASE_DOMAIN="${DOMAIN}"
|
||||||
|
ACME_DOMAIN="_acme-challenge.${CERTBOT_DOMAIN}"
|
||||||
|
fi
|
||||||
|
|
||||||
# To be invoked via Certbot's --manual-auth-hook
|
# To be invoked via Certbot's --manual-auth-hook
|
||||||
function auth {
|
function auth {
|
||||||
curl -s -D- -H "Content-Type: application/json" \
|
curl -s -D- \
|
||||||
-H "X-Api-Key: ${GANDI_API_KEY}" \
|
-H "Content-Type: application/json" \
|
||||||
-d "{\"rrset_name\": \"_acme-challenge.${CERTBOT_DOMAIN}.\",
|
-H "Authorization: Bearer ${ACCESS_TOKEN}" \
|
||||||
\"rrset_type\": \"TXT\",
|
-d "{\"rrset_name\": \"${ACME_DOMAIN}.\",
|
||||||
\"rrset_ttl\": 3600,
|
\"rrset_type\": \"TXT\",
|
||||||
\"rrset_values\": [\"${CERTBOT_VALIDATION}\"]}" \
|
\"rrset_ttl\": 300,
|
||||||
"https://dns.api.gandi.net/api/v5/domains/${DOMAIN}/records"
|
\"rrset_values\": [\"${CERTBOT_VALIDATION}\"]}" \
|
||||||
|
"https://api.gandi.net/v5/livedns/domains/${ACME_BASE_DOMAIN}/records"
|
||||||
|
|
||||||
|
sleep ${PROVIDER_UPDATE_DELAY}
|
||||||
sleep ${PROVIDER_UPDATE_DELAY}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
# To be invoked via Certbot's --manual-cleanup-hook
|
# To be invoked via Certbot's --manual-cleanup-hook
|
||||||
function cleanup {
|
function cleanup {
|
||||||
curl -s -X DELETE -H "Content-Type: application/json" \
|
curl -s -X DELETE \
|
||||||
-H "X-Api-Key: ${GANDI_API_KEY}" \
|
-H "Content-Type: application/json" \
|
||||||
https://dns.api.gandi.net/api/v5/domains/${DOMAIN}/records/_acme-challenge.${CERTBOT_DOMAIN}./TXT
|
-H "Authorization: Bearer ${ACCESS_TOKEN}" \
|
||||||
|
"https://api.gandi.net/v5/livedns/domains/${ACME_BASE_DOMAIN}/records/${ACME_DOMAIN}./TXT"
|
||||||
}
|
}
|
||||||
|
|
||||||
HANDLER=$1; shift;
|
HANDLER=$1; shift;
|
||||||
|
|||||||
708
site-cookbooks/kosmos-ejabberd/templates/turnserver.conf.erb
Normal file
708
site-cookbooks/kosmos-ejabberd/templates/turnserver.conf.erb
Normal file
@@ -0,0 +1,708 @@
|
|||||||
|
# Coturn TURN SERVER configuration file
|
||||||
|
#
|
||||||
|
# Boolean values note: where boolean value is supposed to be used,
|
||||||
|
# you can use '0', 'off', 'no', 'false', 'f' as 'false,
|
||||||
|
# and you can use '1', 'on', 'yes', 'true', 't' as 'true'
|
||||||
|
# If the value is missed, then it means 'true'.
|
||||||
|
#
|
||||||
|
|
||||||
|
# Listener interface device (optional, Linux only).
|
||||||
|
# NOT RECOMMENDED.
|
||||||
|
#
|
||||||
|
#listening-device=eth0
|
||||||
|
|
||||||
|
# TURN listener port for UDP and TCP (Default: 3478).
|
||||||
|
# Note: actually, TLS & DTLS sessions can connect to the
|
||||||
|
# "plain" TCP & UDP port(s), too - if allowed by configuration.
|
||||||
|
#
|
||||||
|
listening-port=<%= @listening_port %>
|
||||||
|
|
||||||
|
# TURN listener port for TLS (Default: 5349).
|
||||||
|
# Note: actually, "plain" TCP & UDP sessions can connect to the TLS & DTLS
|
||||||
|
# port(s), too - if allowed by configuration. The TURN server
|
||||||
|
# "automatically" recognizes the type of traffic. Actually, two listening
|
||||||
|
# endpoints (the "plain" one and the "tls" one) are equivalent in terms of
|
||||||
|
# functionality; but we keep both endpoints to satisfy the RFC 5766 specs.
|
||||||
|
# For secure TCP connections, we currently support SSL version 3 and
|
||||||
|
# TLS version 1.0, 1.1 and 1.2.
|
||||||
|
# For secure UDP connections, we support DTLS version 1.
|
||||||
|
#
|
||||||
|
tls-listening-port=<%= @tls_listening_port %>
|
||||||
|
|
||||||
|
# Alternative listening port for UDP and TCP listeners;
|
||||||
|
# default (or zero) value means "listening port plus one".
|
||||||
|
# This is needed for RFC 5780 support
|
||||||
|
# (STUN extension specs, NAT behavior discovery). The TURN Server
|
||||||
|
# supports RFC 5780 only if it is started with more than one
|
||||||
|
# listening IP address of the same family (IPv4 or IPv6).
|
||||||
|
# RFC 5780 is supported only by UDP protocol, other protocols
|
||||||
|
# are listening to that endpoint only for "symmetry".
|
||||||
|
#
|
||||||
|
#alt-listening-port=0
|
||||||
|
|
||||||
|
# Alternative listening port for TLS and DTLS protocols.
|
||||||
|
# Default (or zero) value means "TLS listening port plus one".
|
||||||
|
#
|
||||||
|
#alt-tls-listening-port=0
|
||||||
|
|
||||||
|
# Listener IP address of relay server. Multiple listeners can be specified.
|
||||||
|
# If no IP(s) specified in the config file or in the command line options,
|
||||||
|
# then all IPv4 and IPv6 system IPs will be used for listening.
|
||||||
|
#
|
||||||
|
listening-ip=<%= @listening_ip %>
|
||||||
|
#listening-ip=10.207.21.238
|
||||||
|
#listening-ip=2607:f0d0:1002:51::4
|
||||||
|
|
||||||
|
# Auxiliary STUN/TURN server listening endpoint.
|
||||||
|
# Aux servers have almost full TURN and STUN functionality.
|
||||||
|
# The (minor) limitations are:
|
||||||
|
#
|
||||||
|
# 1) Auxiliary servers do not have alternative ports and
|
||||||
|
# they do not support STUN RFC 5780 functionality (CHANGE REQUEST).
|
||||||
|
#
|
||||||
|
# 2) Auxiliary servers also are never returning ALTERNATIVE-SERVER reply.
|
||||||
|
#
|
||||||
|
# Valid formats are 1.2.3.4:5555 for IPv4 and [1:2::3:4]:5555 for IPv6.
|
||||||
|
#
|
||||||
|
# There may be multiple aux-server options, each will be used for listening
|
||||||
|
# to client requests.
|
||||||
|
#
|
||||||
|
#aux-server=172.17.19.110:33478
|
||||||
|
#aux-server=[2607:f0d0:1002:51::4]:33478
|
||||||
|
|
||||||
|
# (recommended for older Linuxes only)
|
||||||
|
# Automatically balance UDP traffic over auxiliary servers (if configured).
|
||||||
|
# The load balancing is using the ALTERNATE-SERVER mechanism.
|
||||||
|
# The TURN client must support 300 ALTERNATE-SERVER response for this
|
||||||
|
# functionality.
|
||||||
|
#
|
||||||
|
#udp-self-balance
|
||||||
|
|
||||||
|
# Relay interface device for relay sockets (optional, Linux only).
|
||||||
|
# NOT RECOMMENDED.
|
||||||
|
#
|
||||||
|
#relay-device=eth1
|
||||||
|
|
||||||
|
# Relay address (the local IP address that will be used to relay the
|
||||||
|
# packets to the peer).
|
||||||
|
# Multiple relay addresses may be used.
|
||||||
|
# The same IP(s) can be used as both listening IP(s) and relay IP(s).
|
||||||
|
#
|
||||||
|
# If no relay IP(s) specified, then the turnserver will apply the default
|
||||||
|
# policy: it will decide itself which relay addresses to be used, and it
|
||||||
|
# will always be using the client socket IP address as the relay IP address
|
||||||
|
# of the TURN session (if the requested relay address family is the same
|
||||||
|
# as the family of the client socket).
|
||||||
|
#
|
||||||
|
relay-ip=<%= @relay_ip %>
|
||||||
|
#relay-ip=2607:f0d0:1002:51::5
|
||||||
|
|
||||||
|
# For Amazon EC2 users:
|
||||||
|
#
|
||||||
|
# TURN Server public/private address mapping, if the server is behind NAT.
|
||||||
|
# In that situation, if a -X is used in form "-X <ip>" then that ip will be reported
|
||||||
|
# as relay IP address of all allocations. This scenario works only in a simple case
|
||||||
|
# when one single relay address is be used, and no RFC5780 functionality is required.
|
||||||
|
# That single relay address must be mapped by NAT to the 'external' IP.
|
||||||
|
# The "external-ip" value, if not empty, is returned in XOR-RELAYED-ADDRESS field.
|
||||||
|
# For that 'external' IP, NAT must forward ports directly (relayed port 12345
|
||||||
|
# must be always mapped to the same 'external' port 12345).
|
||||||
|
#
|
||||||
|
# In more complex case when more than one IP address is involved,
|
||||||
|
# that option must be used several times, each entry must
|
||||||
|
# have form "-X <public-ip/private-ip>", to map all involved addresses.
|
||||||
|
# RFC5780 NAT discovery STUN functionality will work correctly,
|
||||||
|
# if the addresses are mapped properly, even when the TURN server itself
|
||||||
|
# is behind A NAT.
|
||||||
|
#
|
||||||
|
# By default, this value is empty, and no address mapping is used.
|
||||||
|
#
|
||||||
|
#external-ip=60.70.80.91
|
||||||
|
#
|
||||||
|
#OR:
|
||||||
|
#
|
||||||
|
#external-ip=60.70.80.91/172.17.19.101
|
||||||
|
#external-ip=60.70.80.92/172.17.19.102
|
||||||
|
|
||||||
|
|
||||||
|
# Number of the relay threads to handle the established connections
|
||||||
|
# (in addition to authentication thread and the listener thread).
|
||||||
|
# If explicitly set to 0 then application runs relay process in a
|
||||||
|
# single thread, in the same thread with the listener process
|
||||||
|
# (the authentication thread will still be a separate thread).
|
||||||
|
#
|
||||||
|
# If this parameter is not set, then the default OS-dependent
|
||||||
|
# thread pattern algorithm will be employed. Usually the default
|
||||||
|
# algorithm is the most optimal, so you have to change this option
|
||||||
|
# only if you want to make some fine tweaks.
|
||||||
|
#
|
||||||
|
# In the older systems (Linux kernel before 3.9),
|
||||||
|
# the number of UDP threads is always one thread per network listening
|
||||||
|
# endpoint - including the auxiliary endpoints - unless 0 (zero) or
|
||||||
|
# 1 (one) value is set.
|
||||||
|
#
|
||||||
|
#relay-threads=0
|
||||||
|
|
||||||
|
# Lower and upper bounds of the UDP relay endpoints:
|
||||||
|
# (default values are 49152 and 65535)
|
||||||
|
#
|
||||||
|
min-port=<%= @min_port %>
|
||||||
|
max-port=<%= @max_port %>
|
||||||
|
|
||||||
|
# Uncomment to run TURN server in 'normal' 'moderate' verbose mode.
|
||||||
|
# By default the verbose mode is off.
|
||||||
|
verbose
|
||||||
|
|
||||||
|
# Uncomment to run TURN server in 'extra' verbose mode.
|
||||||
|
# This mode is very annoying and produces lots of output.
|
||||||
|
# Not recommended under any normal circumstances.
|
||||||
|
#
|
||||||
|
#Verbose
|
||||||
|
|
||||||
|
# Uncomment to use fingerprints in the TURN messages.
|
||||||
|
# By default the fingerprints are off.
|
||||||
|
#
|
||||||
|
#fingerprint
|
||||||
|
|
||||||
|
# Uncomment to use long-term credential mechanism.
|
||||||
|
# By default no credentials mechanism is used (any user allowed).
|
||||||
|
#
|
||||||
|
#lt-cred-mech
|
||||||
|
|
||||||
|
# This option is opposite to lt-cred-mech.
|
||||||
|
# (TURN Server with no-auth option allows anonymous access).
|
||||||
|
# If neither option is defined, and no users are defined,
|
||||||
|
# then no-auth is default. If at least one user is defined,
|
||||||
|
# in this file or in command line or in usersdb file, then
|
||||||
|
# lt-cred-mech is default.
|
||||||
|
#
|
||||||
|
#no-auth
|
||||||
|
|
||||||
|
# TURN REST API flag.
|
||||||
|
# (Time Limited Long Term Credential)
|
||||||
|
# Flag that sets a special authorization option that is based upon authentication secret.
|
||||||
|
#
|
||||||
|
# This feature's purpose is to support "TURN Server REST API", see
|
||||||
|
# "TURN REST API" link in the project's page
|
||||||
|
# https://github.com/coturn/coturn/
|
||||||
|
#
|
||||||
|
# This option is used with timestamp:
|
||||||
|
#
|
||||||
|
# usercombo -> "timestamp:userid"
|
||||||
|
# turn user -> usercombo
|
||||||
|
# turn password -> base64(hmac(secret key, usercombo))
|
||||||
|
#
|
||||||
|
# This allows TURN credentials to be accounted for a specific user id.
|
||||||
|
# If you don't have a suitable id, the timestamp alone can be used.
|
||||||
|
# This option is just turning on secret-based authentication.
|
||||||
|
# The actual value of the secret is defined either by option static-auth-secret,
|
||||||
|
# or can be found in the turn_secret table in the database (see below).
|
||||||
|
#
|
||||||
|
# Read more about it:
|
||||||
|
# - https://tools.ietf.org/html/draft-uberti-behave-turn-rest-00
|
||||||
|
# - https://www.ietf.org/proceedings/87/slides/slides-87-behave-10.pdf
|
||||||
|
#
|
||||||
|
# Be aware that use-auth-secret overrides some part of lt-cred-mech.
|
||||||
|
# Notice that this feature depends internally on lt-cred-mech, so if you set
|
||||||
|
# use-auth-secret then it enables internally automatically lt-cred-mech option
|
||||||
|
# like if you enable both.
|
||||||
|
#
|
||||||
|
# You can use only one of the to auth mechanisms in the same time because,
|
||||||
|
# both mechanism use the username and password validation in different way.
|
||||||
|
#
|
||||||
|
# This way be aware that you can't use both auth mechnaism in the same time!
|
||||||
|
# Use in config either the lt-cred-mech or the use-auth-secret
|
||||||
|
# to avoid any confusion.
|
||||||
|
#
|
||||||
|
use-auth-secret
|
||||||
|
|
||||||
|
# 'Static' authentication secret value (a string) for TURN REST API only.
|
||||||
|
# If not set, then the turn server
|
||||||
|
# will try to use the 'dynamic' value in turn_secret table
|
||||||
|
# in user database (if present). The database-stored value can be changed on-the-fly
|
||||||
|
# by a separate program, so this is why that other mode is 'dynamic'.
|
||||||
|
#
|
||||||
|
static-auth-secret=<%= @static_auth_secret %>
|
||||||
|
|
||||||
|
# Server name used for
|
||||||
|
# the oAuth authentication purposes.
|
||||||
|
# The default value is the realm name.
|
||||||
|
#
|
||||||
|
#server-name=blackdow.carleon.gov
|
||||||
|
|
||||||
|
# Flag that allows oAuth authentication.
|
||||||
|
#
|
||||||
|
#oauth
|
||||||
|
|
||||||
|
# 'Static' user accounts for long term credentials mechanism, only.
|
||||||
|
# This option cannot be used with TURN REST API.
|
||||||
|
# 'Static' user accounts are NOT dynamically checked by the turnserver process,
|
||||||
|
# so that they can NOT be changed while the turnserver is running.
|
||||||
|
#
|
||||||
|
#user=username1:key1
|
||||||
|
#user=username2:key2
|
||||||
|
# OR:
|
||||||
|
#user=username1:password1
|
||||||
|
#user=username2:password2
|
||||||
|
#
|
||||||
|
# Keys must be generated by turnadmin utility. The key value depends
|
||||||
|
# on user name, realm, and password:
|
||||||
|
#
|
||||||
|
# Example:
|
||||||
|
# $ turnadmin -k -u ninefingers -r north.gov -p youhavetoberealistic
|
||||||
|
# Output: 0xbc807ee29df3c9ffa736523fb2c4e8ee
|
||||||
|
# ('0x' in the beginning of the key is what differentiates the key from
|
||||||
|
# password. If it has 0x then it is a key, otherwise it is a password).
|
||||||
|
#
|
||||||
|
# The corresponding user account entry in the config file will be:
|
||||||
|
#
|
||||||
|
#user=ninefingers:0xbc807ee29df3c9ffa736523fb2c4e8ee
|
||||||
|
# Or, equivalently, with open clear password (less secure):
|
||||||
|
#user=ninefingers:youhavetoberealistic
|
||||||
|
#
|
||||||
|
|
||||||
|
# SQLite database file name.
|
||||||
|
#
|
||||||
|
# Default file name is /var/db/turndb or /usr/local/var/db/turndb or
|
||||||
|
# /var/lib/turn/turndb.
|
||||||
|
#
|
||||||
|
#userdb=/var/db/turndb
|
||||||
|
|
||||||
|
# PostgreSQL database connection string in the case that we are using PostgreSQL
|
||||||
|
# as the user database.
|
||||||
|
# This database can be used for long-term credential mechanism
|
||||||
|
# and it can store the secret value for secret-based timed authentication in TURN RESP API.
|
||||||
|
# See http://www.postgresql.org/docs/8.4/static/libpq-connect.html for 8.x PostgreSQL
|
||||||
|
# versions connection string format, see
|
||||||
|
# http://www.postgresql.org/docs/9.2/static/libpq-connect.html#LIBPQ-CONNSTRING
|
||||||
|
# for 9.x and newer connection string formats.
|
||||||
|
#
|
||||||
|
#psql-userdb="host=<host> dbname=<database-name> user=<database-user> password=<database-user-password> connect_timeout=30"
|
||||||
|
|
||||||
|
# MySQL database connection string in the case that we are using MySQL
|
||||||
|
# as the user database.
|
||||||
|
# This database can be used for long-term credential mechanism
|
||||||
|
# and it can store the secret value for secret-based timed authentication in TURN RESP API.
|
||||||
|
#
|
||||||
|
# Optional connection string parameters for the secure communications (SSL):
|
||||||
|
# ca, capath, cert, key, cipher
|
||||||
|
# (see http://dev.mysql.com/doc/refman/5.1/en/ssl-options.html for the
|
||||||
|
# command options description).
|
||||||
|
#
|
||||||
|
# Use string format as below (space separated parameters, all optional):
|
||||||
|
#
|
||||||
|
#mysql-userdb="host=<host> dbname=<database-name> user=<database-user> password=<database-user-password> port=<port> connect_timeout=<seconds> read_timeout=<seconds>"
|
||||||
|
|
||||||
|
# If you want to use in the MySQL connection string the password in encrypted format,
|
||||||
|
# then set in this option the MySQL password encryption secret key file.
|
||||||
|
#
|
||||||
|
# Warning: If this option is set, then mysql password must be set in "mysql-userdb" in encrypted format!
|
||||||
|
# If you want to use cleartext password then do not set this option!
|
||||||
|
#
|
||||||
|
# This is the file path which contain secret key of aes encryption while using password encryption.
|
||||||
|
#
|
||||||
|
#secret-key-file=/path/
|
||||||
|
|
||||||
|
# MongoDB database connection string in the case that we are using MongoDB
|
||||||
|
# as the user database.
|
||||||
|
# This database can be used for long-term credential mechanism
|
||||||
|
# and it can store the secret value for secret-based timed authentication in TURN RESP API.
|
||||||
|
# Use string format is described at http://hergert.me/docs/mongo-c-driver/mongoc_uri.html
|
||||||
|
#
|
||||||
|
#mongo-userdb="mongodb://[username:password@]host1[:port1][,host2[:port2],...[,hostN[:portN]]][/[database][?options]]"
|
||||||
|
|
||||||
|
# Redis database connection string in the case that we are using Redis
|
||||||
|
# as the user database.
|
||||||
|
# This database can be used for long-term credential mechanism
|
||||||
|
# and it can store the secret value for secret-based timed authentication in TURN RESP API.
|
||||||
|
# Use string format as below (space separated parameters, all optional):
|
||||||
|
#
|
||||||
|
#redis-userdb="ip=<ip-address> dbname=<database-number> password=<database-user-password> port=<port> connect_timeout=<seconds>"
|
||||||
|
|
||||||
|
# Redis status and statistics database connection string, if used (default - empty, no Redis stats DB used).
|
||||||
|
# This database keeps allocations status information, and it can be also used for publishing
|
||||||
|
# and delivering traffic and allocation event notifications.
|
||||||
|
# The connection string has the same parameters as redis-userdb connection string.
|
||||||
|
# Use string format as below (space separated parameters, all optional):
|
||||||
|
#
|
||||||
|
#redis-statsdb="ip=<ip-address> dbname=<database-number> password=<database-user-password> port=<port> connect_timeout=<seconds>"
|
||||||
|
|
||||||
|
# The default realm to be used for the users when no explicit
|
||||||
|
# origin/realm relationship was found in the database, or if the TURN
|
||||||
|
# server is not using any database (just the commands-line settings
|
||||||
|
# and the userdb file). Must be used with long-term credentials
|
||||||
|
# mechanism or with TURN REST API.
|
||||||
|
#
|
||||||
|
# Note: If default realm is not specified at all, then realm falls back to the host domain name.
|
||||||
|
# If domain name is empty string, or '(None)', then it is initialized to am empty string.
|
||||||
|
#
|
||||||
|
realm=<%= @realm %>
|
||||||
|
|
||||||
|
# The flag that sets the origin consistency
|
||||||
|
# check: across the session, all requests must have the same
|
||||||
|
# main ORIGIN attribute value (if the ORIGIN was
|
||||||
|
# initially used by the session).
|
||||||
|
#
|
||||||
|
#check-origin-consistency
|
||||||
|
|
||||||
|
# Per-user allocation quota.
|
||||||
|
# default value is 0 (no quota, unlimited number of sessions per user).
|
||||||
|
# This option can also be set through the database, for a particular realm.
|
||||||
|
#
|
||||||
|
#user-quota=0
|
||||||
|
|
||||||
|
# Total allocation quota.
|
||||||
|
# default value is 0 (no quota).
|
||||||
|
# This option can also be set through the database, for a particular realm.
|
||||||
|
#
|
||||||
|
#total-quota=0
|
||||||
|
|
||||||
|
# Max bytes-per-second bandwidth a TURN session is allowed to handle
|
||||||
|
# (input and output network streams are treated separately). Anything above
|
||||||
|
# that limit will be dropped or temporary suppressed (within
|
||||||
|
# the available buffer limits).
|
||||||
|
# This option can also be set through the database, for a particular realm.
|
||||||
|
#
|
||||||
|
#max-bps=0
|
||||||
|
|
||||||
|
#
|
||||||
|
# Maximum server capacity.
|
||||||
|
# Total bytes-per-second bandwidth the TURN server is allowed to allocate
|
||||||
|
# for the sessions, combined (input and output network streams are treated separately).
|
||||||
|
#
|
||||||
|
# bps-capacity=0
|
||||||
|
|
||||||
|
# Uncomment if no UDP client listener is desired.
|
||||||
|
# By default UDP client listener is always started.
|
||||||
|
#
|
||||||
|
#no-udp
|
||||||
|
|
||||||
|
# Uncomment if no TCP client listener is desired.
|
||||||
|
# By default TCP client listener is always started.
|
||||||
|
#
|
||||||
|
#no-tcp
|
||||||
|
|
||||||
|
# Uncomment if no TLS client listener is desired.
|
||||||
|
# By default TLS client listener is always started.
|
||||||
|
#
|
||||||
|
#no-tls
|
||||||
|
|
||||||
|
# Uncomment if no DTLS client listener is desired.
|
||||||
|
# By default DTLS client listener is always started.
|
||||||
|
#
|
||||||
|
#no-dtls
|
||||||
|
|
||||||
|
# Uncomment if no UDP relay endpoints are allowed.
|
||||||
|
# By default UDP relay endpoints are enabled (like in RFC 5766).
|
||||||
|
#
|
||||||
|
#no-udp-relay
|
||||||
|
|
||||||
|
# Uncomment if no TCP relay endpoints are allowed.
|
||||||
|
# By default TCP relay endpoints are enabled (like in RFC 6062).
|
||||||
|
#
|
||||||
|
#no-tcp-relay
|
||||||
|
|
||||||
|
# Uncomment if extra security is desired,
|
||||||
|
# with nonce value having limited lifetime.
|
||||||
|
# By default, the nonce value is unique for a session,
|
||||||
|
# and has unlimited lifetime.
|
||||||
|
# Set this option to limit the nonce lifetime.
|
||||||
|
# It defaults to 600 secs (10 min) if no value is provided. After that delay,
|
||||||
|
# the client will get 438 error and will have to re-authenticate itself.
|
||||||
|
#
|
||||||
|
#stale-nonce=600
|
||||||
|
|
||||||
|
# Uncomment if you want to set the maximum allocation
|
||||||
|
# time before it has to be refreshed.
|
||||||
|
# Default is 3600s.
|
||||||
|
#
|
||||||
|
#max-allocate-lifetime=3600
|
||||||
|
|
||||||
|
|
||||||
|
# Uncomment to set the lifetime for the channel.
|
||||||
|
# Default value is 600 secs (10 minutes).
|
||||||
|
# This value MUST not be changed for production purposes.
|
||||||
|
#
|
||||||
|
#channel-lifetime=600
|
||||||
|
|
||||||
|
# Uncomment to set the permission lifetime.
|
||||||
|
# Default to 300 secs (5 minutes).
|
||||||
|
# In production this value MUST not be changed,
|
||||||
|
# however it can be useful for test purposes.
|
||||||
|
#
|
||||||
|
#permission-lifetime=300
|
||||||
|
|
||||||
|
# Certificate file.
|
||||||
|
# Use an absolute path or path relative to the
|
||||||
|
# configuration file.
|
||||||
|
#
|
||||||
|
cert=<%= @cert %>
|
||||||
|
|
||||||
|
# Private key file.
|
||||||
|
# Use an absolute path or path relative to the
|
||||||
|
# configuration file.
|
||||||
|
# Use PEM file format.
|
||||||
|
#
|
||||||
|
pkey=<%= @pkey %>
|
||||||
|
|
||||||
|
# Private key file password, if it is in encoded format.
|
||||||
|
# This option has no default value.
|
||||||
|
#
|
||||||
|
#pkey-pwd=...
|
||||||
|
|
||||||
|
# Allowed OpenSSL cipher list for TLS/DTLS connections.
|
||||||
|
# Default value is "DEFAULT".
|
||||||
|
#
|
||||||
|
#cipher-list="DEFAULT"
|
||||||
|
|
||||||
|
# CA file in OpenSSL format.
|
||||||
|
# Forces TURN server to verify the client SSL certificates.
|
||||||
|
# By default it is not set: there is no default value and the client
|
||||||
|
# certificate is not checked.
|
||||||
|
#
|
||||||
|
# Example:
|
||||||
|
#CA-file=/etc/ssh/id_rsa.cert
|
||||||
|
|
||||||
|
# Curve name for EC ciphers, if supported by OpenSSL
|
||||||
|
# library (TLS and DTLS). The default value is prime256v1,
|
||||||
|
# if pre-OpenSSL 1.0.2 is used. With OpenSSL 1.0.2+,
|
||||||
|
# an optimal curve will be automatically calculated, if not defined
|
||||||
|
# by this option.
|
||||||
|
#
|
||||||
|
#ec-curve-name=prime256v1
|
||||||
|
|
||||||
|
# Use 566 bits predefined DH TLS key. Default size of the key is 1066.
|
||||||
|
#
|
||||||
|
#dh566
|
||||||
|
|
||||||
|
# Use 2066 bits predefined DH TLS key. Default size of the key is 1066.
|
||||||
|
#
|
||||||
|
#dh2066
|
||||||
|
|
||||||
|
# Use custom DH TLS key, stored in PEM format in the file.
|
||||||
|
# Flags --dh566 and --dh2066 are ignored when the DH key is taken from a file.
|
||||||
|
#
|
||||||
|
#dh-file=<DH-PEM-file-name>
|
||||||
|
|
||||||
|
# Flag to prevent stdout log messages.
|
||||||
|
# By default, all log messages are going to both stdout and to
|
||||||
|
# the configured log file. With this option everything will be
|
||||||
|
# going to the configured log only (unless the log file itself is stdout).
|
||||||
|
#
|
||||||
|
#no-stdout-log
|
||||||
|
|
||||||
|
# Option to set the log file name.
|
||||||
|
# By default, the turnserver tries to open a log file in
|
||||||
|
# /var/log, /var/tmp, /tmp and current directories directories
|
||||||
|
# (which open operation succeeds first that file will be used).
|
||||||
|
# With this option you can set the definite log file name.
|
||||||
|
# The special names are "stdout" and "-" - they will force everything
|
||||||
|
# to the stdout. Also, the "syslog" name will force everything to
|
||||||
|
# the system log (syslog).
|
||||||
|
# In the runtime, the logfile can be reset with the SIGHUP signal
|
||||||
|
# to the turnserver process.
|
||||||
|
#
|
||||||
|
#log-file=/var/tmp/turn.log
|
||||||
|
|
||||||
|
# Option to redirect all log output into system log (syslog).
|
||||||
|
#
|
||||||
|
syslog
|
||||||
|
|
||||||
|
# This flag means that no log file rollover will be used, and the log file
|
||||||
|
# name will be constructed as-is, without PID and date appendage.
|
||||||
|
# This option can be used, for example, together with the logrotate tool.
|
||||||
|
#
|
||||||
|
#simple-log
|
||||||
|
|
||||||
|
# Option to set the "redirection" mode. The value of this option
|
||||||
|
# will be the address of the alternate server for UDP & TCP service in form of
|
||||||
|
# <ip>[:<port>]. The server will send this value in the attribute
|
||||||
|
# ALTERNATE-SERVER, with error 300, on ALLOCATE request, to the client.
|
||||||
|
# Client will receive only values with the same address family
|
||||||
|
# as the client network endpoint address family.
|
||||||
|
# See RFC 5389 and RFC 5766 for ALTERNATE-SERVER functionality description.
|
||||||
|
# The client must use the obtained value for subsequent TURN communications.
|
||||||
|
# If more than one --alternate-server options are provided, then the functionality
|
||||||
|
# can be more accurately described as "load-balancing" than a mere "redirection".
|
||||||
|
# If the port number is omitted, then the default port
|
||||||
|
# number 3478 for the UDP/TCP protocols will be used.
|
||||||
|
# Colon (:) characters in IPv6 addresses may conflict with the syntax of
|
||||||
|
# the option. To alleviate this conflict, literal IPv6 addresses are enclosed
|
||||||
|
# in square brackets in such resource identifiers, for example:
|
||||||
|
# [2001:db8:85a3:8d3:1319:8a2e:370:7348]:3478 .
|
||||||
|
# Multiple alternate servers can be set. They will be used in the
|
||||||
|
# round-robin manner. All servers in the pool are considered of equal weight and
|
||||||
|
# the load will be distributed equally. For example, if we have 4 alternate servers,
|
||||||
|
# then each server will receive 25% of ALLOCATE requests. A alternate TURN server
|
||||||
|
# address can be used more than one time with the alternate-server option, so this
|
||||||
|
# can emulate "weighting" of the servers.
|
||||||
|
#
|
||||||
|
# Examples:
|
||||||
|
#alternate-server=1.2.3.4:5678
|
||||||
|
#alternate-server=11.22.33.44:56789
|
||||||
|
#alternate-server=5.6.7.8
|
||||||
|
#alternate-server=[2001:db8:85a3:8d3:1319:8a2e:370:7348]:3478
|
||||||
|
|
||||||
|
# Option to set alternative server for TLS & DTLS services in form of
|
||||||
|
# <ip>:<port>. If the port number is omitted, then the default port
|
||||||
|
# number 5349 for the TLS/DTLS protocols will be used. See the previous
|
||||||
|
# option for the functionality description.
|
||||||
|
#
|
||||||
|
# Examples:
|
||||||
|
#tls-alternate-server=1.2.3.4:5678
|
||||||
|
#tls-alternate-server=11.22.33.44:56789
|
||||||
|
#tls-alternate-server=[2001:db8:85a3:8d3:1319:8a2e:370:7348]:3478
|
||||||
|
|
||||||
|
# Option to suppress TURN functionality, only STUN requests will be processed.
|
||||||
|
# Run as STUN server only, all TURN requests will be ignored.
|
||||||
|
# By default, this option is NOT set.
|
||||||
|
#
|
||||||
|
#stun-only
|
||||||
|
|
||||||
|
# Option to suppress STUN functionality, only TURN requests will be processed.
|
||||||
|
# Run as TURN server only, all STUN requests will be ignored.
|
||||||
|
# By default, this option is NOT set.
|
||||||
|
#
|
||||||
|
#no-stun
|
||||||
|
|
||||||
|
# This is the timestamp/username separator symbol (character) in TURN REST API.
|
||||||
|
# The default value is ':'.
|
||||||
|
# rest-api-separator=:
|
||||||
|
|
||||||
|
# Flag that can be used to allow peers on the loopback addresses (127.x.x.x and ::1).
|
||||||
|
# This is an extra security measure.
|
||||||
|
#
|
||||||
|
# (To avoid any security issue that allowing loopback access may raise,
|
||||||
|
# the no-loopback-peers option is replaced by allow-loopback-peers.)
|
||||||
|
#
|
||||||
|
# Allow it only for testing in a development environment!
|
||||||
|
# In production it adds a possible security vulnerability, so for security reasons
|
||||||
|
# it is not allowed using it together with empty cli-password.
|
||||||
|
#
|
||||||
|
#allow-loopback-peers
|
||||||
|
|
||||||
|
# Flag that can be used to disallow peers on well-known broadcast addresses (224.0.0.0 and above, and FFXX:*).
|
||||||
|
# This is an extra security measure.
|
||||||
|
#
|
||||||
|
#no-multicast-peers
|
||||||
|
|
||||||
|
# Option to set the max time, in seconds, allowed for full allocation establishment.
|
||||||
|
# Default is 60 seconds.
|
||||||
|
#
|
||||||
|
#max-allocate-timeout=60
|
||||||
|
|
||||||
|
# Option to allow or ban specific ip addresses or ranges of ip addresses.
|
||||||
|
# If an ip address is specified as both allowed and denied, then the ip address is
|
||||||
|
# considered to be allowed. This is useful when you wish to ban a range of ip
|
||||||
|
# addresses, except for a few specific ips within that range.
|
||||||
|
#
|
||||||
|
# This can be used when you do not want users of the turn server to be able to access
|
||||||
|
# machines reachable by the turn server, but would otherwise be unreachable from the
|
||||||
|
# internet (e.g. when the turn server is sitting behind a NAT)
|
||||||
|
#
|
||||||
|
# Examples:
|
||||||
|
# denied-peer-ip=83.166.64.0-83.166.95.255
|
||||||
|
# allowed-peer-ip=83.166.68.45
|
||||||
|
|
||||||
|
# File name to store the pid of the process.
|
||||||
|
# Default is /var/run/turnserver.pid (if superuser account is used) or
|
||||||
|
# /var/tmp/turnserver.pid .
|
||||||
|
#
|
||||||
|
#pidfile="/var/run/turnserver.pid"
|
||||||
|
|
||||||
|
# Require authentication of the STUN Binding request.
|
||||||
|
# By default, the clients are allowed anonymous access to the STUN Binding functionality.
|
||||||
|
#
|
||||||
|
#secure-stun
|
||||||
|
|
||||||
|
# Mobility with ICE (MICE) specs support.
|
||||||
|
#
|
||||||
|
#mobility
|
||||||
|
|
||||||
|
# Allocate Address Family according
|
||||||
|
# If enabled then TURN server allocates address family according the TURN
|
||||||
|
# Client <=> Server communication address family.
|
||||||
|
# (By default coTURN works according RFC 6156.)
|
||||||
|
# !!Warning: Enabling this option breaks RFC6156 section-4.2 (violates use default IPv4)!!
|
||||||
|
#
|
||||||
|
#keep-address-family
|
||||||
|
|
||||||
|
|
||||||
|
# User name to run the process. After the initialization, the turnserver process
|
||||||
|
# will make an attempt to change the current user ID to that user.
|
||||||
|
#
|
||||||
|
#proc-user=<user-name>
|
||||||
|
|
||||||
|
# Group name to run the process. After the initialization, the turnserver process
|
||||||
|
# will make an attempt to change the current group ID to that group.
|
||||||
|
#
|
||||||
|
#proc-group=<group-name>
|
||||||
|
|
||||||
|
# Turn OFF the CLI support.
|
||||||
|
# By default it is always ON.
|
||||||
|
# See also options cli-ip and cli-port.
|
||||||
|
#
|
||||||
|
no-cli
|
||||||
|
|
||||||
|
#Local system IP address to be used for CLI server endpoint. Default value
|
||||||
|
# is 127.0.0.1.
|
||||||
|
#
|
||||||
|
#cli-ip=127.0.0.1
|
||||||
|
|
||||||
|
# CLI server port. Default is 5766.
|
||||||
|
#
|
||||||
|
#cli-port=5766
|
||||||
|
|
||||||
|
# CLI access password. Default is empty (no password).
|
||||||
|
# For the security reasons, it is recommended to use the encrypted
|
||||||
|
# for of the password (see the -P command in the turnadmin utility).
|
||||||
|
#
|
||||||
|
# Secure form for password 'qwerty':
|
||||||
|
#
|
||||||
|
#cli-password=$5$79a316b350311570$81df9cfb9af7f5e5a76eada31e7097b663a0670f99a3c07ded3f1c8e59c5658a
|
||||||
|
#
|
||||||
|
# Or unsecure form for the same password:
|
||||||
|
#
|
||||||
|
#cli-password=qwerty
|
||||||
|
|
||||||
|
# Enable Web-admin support on https. By default it is Disabled.
|
||||||
|
# If it is enabled it also enables a http a simple static banner page
|
||||||
|
# with a small reminder that the admin page is available only on https.
|
||||||
|
#
|
||||||
|
#web-admin
|
||||||
|
|
||||||
|
# Local system IP address to be used for Web-admin server endpoint. Default value is 127.0.0.1.
|
||||||
|
#
|
||||||
|
#web-admin-ip=127.0.0.1
|
||||||
|
|
||||||
|
# Web-admin server port. Default is 8080.
|
||||||
|
#
|
||||||
|
#web-admin-port=8080
|
||||||
|
|
||||||
|
# Web-admin server listen on STUN/TURN worker threads
|
||||||
|
# By default it is disabled for security resons! (Not recommended in any production environment!)
|
||||||
|
#
|
||||||
|
#web-admin-listen-on-workers
|
||||||
|
|
||||||
|
# Server relay. NON-STANDARD AND DANGEROUS OPTION.
|
||||||
|
# Only for those applications when we want to run
|
||||||
|
# server applications on the relay endpoints.
|
||||||
|
# This option eliminates the IP permissions check on
|
||||||
|
# the packets incoming to the relay endpoints.
|
||||||
|
#
|
||||||
|
#server-relay
|
||||||
|
|
||||||
|
# Maximum number of output sessions in ps CLI command.
|
||||||
|
# This value can be changed on-the-fly in CLI. The default value is 256.
|
||||||
|
#
|
||||||
|
#cli-max-output-sessions
|
||||||
|
|
||||||
|
# Set network engine type for the process (for internal purposes).
|
||||||
|
#
|
||||||
|
#ne=[1|2|3]
|
||||||
|
|
||||||
|
# Do not allow an TLS/DTLS version of protocol
|
||||||
|
#
|
||||||
|
#no-tlsv1
|
||||||
|
#no-tlsv1_1
|
||||||
|
#no-tlsv1_2
|
||||||
@@ -16,7 +16,7 @@ host_config:
|
|||||||
ldap_password: "<%= @host[:ldap_password] %>"
|
ldap_password: "<%= @host[:ldap_password] %>"
|
||||||
ldap_encrypt: <%= @ldap_encryption_type %>
|
ldap_encrypt: <%= @ldap_encryption_type %>
|
||||||
ldap_base: "ou=<%= @host[:name] %>,<%= @ldap_base %>"
|
ldap_base: "ou=<%= @host[:name] %>,<%= @ldap_base %>"
|
||||||
ldap_filter: "(objectClass=person)"
|
ldap_filter: "<%= @ldap_filter %>"
|
||||||
<% end -%>
|
<% end -%>
|
||||||
|
|
||||||
append_host_config:
|
append_host_config:
|
||||||
|
|||||||
@@ -62,4 +62,4 @@ node.default['kosmos-ipfs']['ipfs']['config'] = {
|
|||||||
node.default['kosmos-ipfs']['nginx']['domain'] = "ipfs.kosmos.org"
|
node.default['kosmos-ipfs']['nginx']['domain'] = "ipfs.kosmos.org"
|
||||||
node.default['kosmos-ipfs']['nginx']['external_api_port'] = 5444
|
node.default['kosmos-ipfs']['nginx']['external_api_port'] = 5444
|
||||||
|
|
||||||
node.default['kosmos-ipfs']['kredits-pinner']['revision'] = "v2.2.0"
|
node.default['kosmos-ipfs']['kredits-pinner']['revision'] = "v2.3.0"
|
||||||
|
|||||||
@@ -44,7 +44,7 @@ end
|
|||||||
|
|
||||||
elasticsearch_service 'elasticsearch'
|
elasticsearch_service 'elasticsearch'
|
||||||
|
|
||||||
postgresql_data_bag_item = data_bag_item('credentials', 'postgresql')
|
postgresql_credentials = data_bag_item('credentials', 'postgresql')
|
||||||
|
|
||||||
mastodon_path = node["kosmos-mastodon"]["directory"]
|
mastodon_path = node["kosmos-mastodon"]["directory"]
|
||||||
mastodon_user = "mastodon"
|
mastodon_user = "mastodon"
|
||||||
@@ -75,7 +75,7 @@ npm_package "yarn" do
|
|||||||
version "1.22.4"
|
version "1.22.4"
|
||||||
end
|
end
|
||||||
|
|
||||||
ruby_version = "3.0.6"
|
ruby_version = "3.3.0"
|
||||||
|
|
||||||
ruby_path = "/opt/ruby_build/builds/#{ruby_version}"
|
ruby_path = "/opt/ruby_build/builds/#{ruby_version}"
|
||||||
bundle_path = "#{ruby_path}/bin/bundle"
|
bundle_path = "#{ruby_path}/bin/bundle"
|
||||||
@@ -168,7 +168,22 @@ execute "restart mastodon services" do
|
|||||||
notifies :restart, "service[mastodon-streaming]", :delayed
|
notifies :restart, "service[mastodon-streaming]", :delayed
|
||||||
end
|
end
|
||||||
|
|
||||||
mastodon_credentials = data_bag_item('credentials', 'mastodon')
|
credentials = data_bag_item('credentials', 'mastodon')
|
||||||
|
|
||||||
|
ldap_config = {
|
||||||
|
host: "ldap.kosmos.local",
|
||||||
|
port: 389,
|
||||||
|
method: "plain",
|
||||||
|
base: "ou=kosmos.org,cn=users,dc=kosmos,dc=org",
|
||||||
|
bind_dn: credentials["ldap_bind_dn"],
|
||||||
|
password: credentials["ldap_password"],
|
||||||
|
uid: "cn",
|
||||||
|
mail: "mail",
|
||||||
|
search_filter: "(&(|(cn=%{email})(mail=%{email}))(serviceEnabled=mastodon))",
|
||||||
|
uid_conversion_enabled: "true",
|
||||||
|
uid_conversion_search: "-",
|
||||||
|
uid_conversion_replace: "_"
|
||||||
|
}
|
||||||
|
|
||||||
template "#{mastodon_path}/.env.#{rails_env}" do
|
template "#{mastodon_path}/.env.#{rails_env}" do
|
||||||
source "env.erb"
|
source "env.erb"
|
||||||
@@ -178,21 +193,22 @@ template "#{mastodon_path}/.env.#{rails_env}" do
|
|||||||
variables redis_url: node["kosmos-mastodon"]["redis_url"],
|
variables redis_url: node["kosmos-mastodon"]["redis_url"],
|
||||||
domain: node["kosmos-mastodon"]["domain"],
|
domain: node["kosmos-mastodon"]["domain"],
|
||||||
alternate_domains: node["kosmos-mastodon"]["alternate_domains"],
|
alternate_domains: node["kosmos-mastodon"]["alternate_domains"],
|
||||||
paperclip_secret: mastodon_credentials['paperclip_secret'],
|
paperclip_secret: credentials['paperclip_secret'],
|
||||||
secret_key_base: mastodon_credentials['secret_key_base'],
|
secret_key_base: credentials['secret_key_base'],
|
||||||
otp_secret: mastodon_credentials['otp_secret'],
|
otp_secret: credentials['otp_secret'],
|
||||||
smtp_login: mastodon_credentials['smtp_user_name'],
|
ldap: ldap_config,
|
||||||
smtp_password: mastodon_credentials['smtp_password'],
|
smtp_login: credentials['smtp_user_name'],
|
||||||
|
smtp_password: credentials['smtp_password'],
|
||||||
smtp_from_address: "mail@#{node['kosmos-mastodon']['domain']}",
|
smtp_from_address: "mail@#{node['kosmos-mastodon']['domain']}",
|
||||||
s3_endpoint: node["kosmos-mastodon"]["s3_endpoint"],
|
s3_endpoint: node["kosmos-mastodon"]["s3_endpoint"],
|
||||||
s3_region: node["kosmos-mastodon"]["s3_region"],
|
s3_region: node["kosmos-mastodon"]["s3_region"],
|
||||||
s3_bucket: node["kosmos-mastodon"]["s3_bucket"],
|
s3_bucket: node["kosmos-mastodon"]["s3_bucket"],
|
||||||
s3_alias_host: node["kosmos-mastodon"]["s3_alias_host"],
|
s3_alias_host: node["kosmos-mastodon"]["s3_alias_host"],
|
||||||
aws_access_key_id: mastodon_credentials['s3_key_id'],
|
aws_access_key_id: credentials['s3_key_id'],
|
||||||
aws_secret_access_key: mastodon_credentials['s3_secret_key'],
|
aws_secret_access_key: credentials['s3_secret_key'],
|
||||||
vapid_private_key: mastodon_credentials['vapid_private_key'],
|
vapid_private_key: credentials['vapid_private_key'],
|
||||||
vapid_public_key: mastodon_credentials['vapid_public_key'],
|
vapid_public_key: credentials['vapid_public_key'],
|
||||||
db_pass: postgresql_data_bag_item['mastodon_user_password'],
|
db_pass: postgresql_credentials['mastodon_user_password'],
|
||||||
db_host: "pg.kosmos.local",
|
db_host: "pg.kosmos.local",
|
||||||
default_locale: node["kosmos-mastodon"]["default_locale"],
|
default_locale: node["kosmos-mastodon"]["default_locale"],
|
||||||
allowed_private_addresses: node["kosmos-mastodon"]["allowed_private_addresses"],
|
allowed_private_addresses: node["kosmos-mastodon"]["allowed_private_addresses"],
|
||||||
|
|||||||
@@ -28,12 +28,15 @@ template "#{node['openresty']['dir']}/snippets/mastodon.conf" do
|
|||||||
owner 'www-data'
|
owner 'www-data'
|
||||||
mode 0640
|
mode 0640
|
||||||
variables web_root_dir: web_root_dir,
|
variables web_root_dir: web_root_dir,
|
||||||
server_name: server_name
|
server_name: server_name,
|
||||||
|
s3_private_url: "#{node["kosmos-mastodon"]["s3_endpoint"]}/#{node["kosmos-mastodon"]["s3_bucket"]}/",
|
||||||
|
s3_public_url: "https://#{node["kosmos-mastodon"]["s3_alias_host"]}/"
|
||||||
notifies :reload, 'service[openresty]', :delayed
|
notifies :reload, 'service[openresty]', :delayed
|
||||||
end
|
end
|
||||||
|
|
||||||
tls_cert_for server_name do
|
tls_cert_for server_name do
|
||||||
auth "gandi_dns"
|
auth "gandi_dns"
|
||||||
|
acme_domain "letsencrypt.kosmos.org"
|
||||||
action :create
|
action :create
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|||||||
@@ -29,6 +29,23 @@ SMTP_LOGIN=<%= @smtp_login %>
|
|||||||
SMTP_PASSWORD=<%= @smtp_password %>
|
SMTP_PASSWORD=<%= @smtp_password %>
|
||||||
SMTP_FROM_ADDRESS=<%= @smtp_from_address %>
|
SMTP_FROM_ADDRESS=<%= @smtp_from_address %>
|
||||||
|
|
||||||
|
<% if @ldap %>
|
||||||
|
# LDAP configuration
|
||||||
|
LDAP_ENABLED=true
|
||||||
|
LDAP_HOST=<%= @ldap[:host] %>
|
||||||
|
LDAP_PORT=<%= @ldap[:port] %>
|
||||||
|
LDAP_METHOD='<%= @ldap[:method] %>'
|
||||||
|
LDAP_BASE='<%= @ldap[:base] %>'
|
||||||
|
LDAP_BIND_DN='<%= @ldap[:bind_dn] %>'
|
||||||
|
LDAP_PASSWORD='<%= @ldap[:password] %>'
|
||||||
|
LDAP_UID=<%= @ldap[:uid] %>
|
||||||
|
LDAP_MAIL=<%= @ldap[:mail] %>
|
||||||
|
LDAP_SEARCH_FILTER='<%= @ldap[:search_filter] %>'
|
||||||
|
LDAP_UID_CONVERSION_ENABLED=<%= @ldap[:uid_conversion_enabled] %>
|
||||||
|
LDAP_UID_CONVERSION_SEARCH=<%= @ldap[:uid_conversion_search] %>
|
||||||
|
LDAP_UID_CONVERSION_REPLACE=<%= @ldap[:uid_conversion_replace] %>
|
||||||
|
<% end %>
|
||||||
|
|
||||||
# Optional asset host for multi-server setups
|
# Optional asset host for multi-server setups
|
||||||
# CDN_HOST=assets.example.com
|
# CDN_HOST=assets.example.com
|
||||||
|
|
||||||
|
|||||||
@@ -32,6 +32,12 @@ server {
|
|||||||
<% if @onion_address %>
|
<% if @onion_address %>
|
||||||
add_header Onion-Location https://mastodon.<%= @onion_address %>$request_uri;
|
add_header Onion-Location https://mastodon.<%= @onion_address %>$request_uri;
|
||||||
<% end %>
|
<% end %>
|
||||||
|
|
||||||
|
location ~ ^/.well-known/(lnurlp|keysend) {
|
||||||
|
add_header 'Access-Control-Allow-Origin' '*';
|
||||||
|
proxy_ssl_server_name on;
|
||||||
|
proxy_pass https://accounts.kosmos.org;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
<% if @onion_address %>
|
<% if @onion_address %>
|
||||||
|
|||||||
@@ -108,11 +108,13 @@ location @proxy {
|
|||||||
|
|
||||||
proxy_pass http://mastodon_app;
|
proxy_pass http://mastodon_app;
|
||||||
proxy_buffering on;
|
proxy_buffering on;
|
||||||
proxy_redirect off;
|
|
||||||
proxy_http_version 1.1;
|
proxy_http_version 1.1;
|
||||||
proxy_set_header Upgrade $http_upgrade;
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
proxy_set_header Connection $connection_upgrade;
|
proxy_set_header Connection $connection_upgrade;
|
||||||
|
|
||||||
|
# https://github.com/mastodon/mastodon/issues/24380
|
||||||
|
proxy_redirect <%= @s3_private_url %> <%= @s3_public_url %>;
|
||||||
|
|
||||||
tcp_nodelay on;
|
tcp_nodelay on;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -7,6 +7,7 @@ domain = node["email"]["domain"]
|
|||||||
hostname = node["email"]["hostname"]
|
hostname = node["email"]["hostname"]
|
||||||
root_dir = node["email"]["root_directory"]
|
root_dir = node["email"]["root_directory"]
|
||||||
ip_addr = node["knife_zero"]["host"]
|
ip_addr = node["knife_zero"]["host"]
|
||||||
|
extra_hostnames = ["smtp.#{domain}", "imap.#{domain}"]
|
||||||
|
|
||||||
node.override["set_fqdn"] = hostname
|
node.override["set_fqdn"] = hostname
|
||||||
include_recipe "hostname"
|
include_recipe "hostname"
|
||||||
@@ -23,7 +24,9 @@ directory root_dir do
|
|||||||
end
|
end
|
||||||
|
|
||||||
tls_cert_for hostname do
|
tls_cert_for hostname do
|
||||||
|
domain ([hostname]+extra_hostnames)
|
||||||
auth "gandi_dns"
|
auth "gandi_dns"
|
||||||
|
deploy_hook "systemctl reload postfix.service && systemctl reload dovecot.service"
|
||||||
action :create
|
action :create
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|||||||
@@ -3,6 +3,8 @@
|
|||||||
# Recipe:: nginx_web
|
# Recipe:: nginx_web
|
||||||
#
|
#
|
||||||
|
|
||||||
|
gandi_api_credentials = data_bag_item('credentials', 'gandi_api')
|
||||||
|
|
||||||
file "#{node['openresty']['dir']}/conf.d/garage.conf" do
|
file "#{node['openresty']['dir']}/conf.d/garage.conf" do
|
||||||
content <<-EOF
|
content <<-EOF
|
||||||
upstream garage_web {
|
upstream garage_web {
|
||||||
@@ -40,8 +42,12 @@ end
|
|||||||
#
|
#
|
||||||
|
|
||||||
node['garage']['s3_web_domains'].each do |domain_name|
|
node['garage']['s3_web_domains'].each do |domain_name|
|
||||||
|
second_level_domain = domain_name.match(/(?:.*\.)?([^.]+\.[^.]+)$/) { $1 }
|
||||||
|
proxy_validation = !gandi_api_credentials["domains"].include?(second_level_domain)
|
||||||
|
|
||||||
tls_cert_for domain_name do
|
tls_cert_for domain_name do
|
||||||
auth "gandi_dns"
|
auth "gandi_dns"
|
||||||
|
acme_domain "letsencrypt.kosmos.org" if proxy_validation
|
||||||
action :create
|
action :create
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|||||||
@@ -1,11 +1,14 @@
|
|||||||
gitea_version = "1.21.3"
|
node.default["gitea"]["version"] = "1.22.0"
|
||||||
node.default["gitea"]["version"] = gitea_version
|
node.default["gitea"]["checksum"] = "a31086f073cb9592d28611394b2de3655db515d961e4fdcf5b549cb40753ef3d"
|
||||||
node.default["gitea"]["binary_url"] = "https://dl.gitea.io/gitea/#{gitea_version}/gitea-#{gitea_version}-linux-amd64"
|
|
||||||
node.default["gitea"]["binary_checksum"] = "ccf6cc2077401e382bca0d000553a781a42c9103656bd33ef32bf093cca570eb"
|
|
||||||
node.default["gitea"]["working_directory"] = "/var/lib/gitea"
|
node.default["gitea"]["working_directory"] = "/var/lib/gitea"
|
||||||
node.default["gitea"]["port"] = 3000
|
node.default["gitea"]["port"] = 3000
|
||||||
node.default["gitea"]["postgresql_host"] = "localhost:5432"
|
node.default["gitea"]["postgresql_host"] = "localhost:5432"
|
||||||
node.default["gitea"]["domain"] = "gitea.kosmos.org"
|
node.default["gitea"]["domain"] = "gitea.kosmos.org"
|
||||||
|
node.default["gitea"]["commit_signing"] = {
|
||||||
|
"name_real" => "Gitea",
|
||||||
|
"name_comment" => "commit signing",
|
||||||
|
"name_email" => "git@#{node["gitea"]["domain"]}"
|
||||||
|
}
|
||||||
|
|
||||||
node.default["gitea"]["config"] = {
|
node.default["gitea"]["config"] = {
|
||||||
"actions": {
|
"actions": {
|
||||||
@@ -16,5 +19,5 @@ node.default["gitea"]["config"] = {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
node.default["gitea"]["act_runner"]["download_url"] = "https://dl.gitea.com/act_runner/main/act_runner-main-linux-amd64"
|
node.default["gitea"]["act_runner"]["version"] = "0.2.6"
|
||||||
node.default["gitea"]["act_runner"]["checksum"] = "577ec7c64e7458b1e97cbe61d02da1ba1f4ddf24281b175f24f65101e72c000c"
|
node.default["gitea"]["act_runner"]["checksum"] = "234c2bdb871e7b0bfb84697f353395bfc7819faf9f0c0443845868b64a041057"
|
||||||
|
|||||||
@@ -8,6 +8,7 @@ version '0.2.0'
|
|||||||
chef_version '>= 14.0'
|
chef_version '>= 14.0'
|
||||||
|
|
||||||
depends "firewall"
|
depends "firewall"
|
||||||
|
depends "gpg"
|
||||||
depends "kosmos_openresty"
|
depends "kosmos_openresty"
|
||||||
depends "kosmos_postgresql"
|
depends "kosmos_postgresql"
|
||||||
depends "backup"
|
depends "backup"
|
||||||
|
|||||||
@@ -3,6 +3,8 @@
|
|||||||
# Recipe:: act_runner
|
# Recipe:: act_runner
|
||||||
#
|
#
|
||||||
|
|
||||||
|
version = node["gitea"]["act_runner"]["version"]
|
||||||
|
download_url = "https://dl.gitea.com/act_runner/#{version}/act_runner-#{version}-linux-amd64"
|
||||||
working_directory = node["gitea"]["working_directory"]
|
working_directory = node["gitea"]["working_directory"]
|
||||||
gitea_credentials = data_bag_item("credentials", "gitea")
|
gitea_credentials = data_bag_item("credentials", "gitea")
|
||||||
runners = gitea_credentials["runners"]
|
runners = gitea_credentials["runners"]
|
||||||
@@ -24,7 +26,7 @@ end
|
|||||||
end
|
end
|
||||||
|
|
||||||
remote_file "/usr/local/bin/act_runner" do
|
remote_file "/usr/local/bin/act_runner" do
|
||||||
source node["gitea"]["act_runner"]["download_url"]
|
source download_url
|
||||||
checksum node["gitea"]["act_runner"]["checksum"]
|
checksum node["gitea"]["act_runner"]["checksum"]
|
||||||
mode "0750"
|
mode "0750"
|
||||||
end
|
end
|
||||||
@@ -66,6 +68,7 @@ act_runner register \
|
|||||||
WorkingDirectory: runner_dir,
|
WorkingDirectory: runner_dir,
|
||||||
Environment: "HOME=/root",
|
Environment: "HOME=/root",
|
||||||
ExecStart: "/usr/local/bin/act_runner daemon",
|
ExecStart: "/usr/local/bin/act_runner daemon",
|
||||||
|
ExecStartPre: "/bin/sleep 3", # Wait for Gitea's API to be up when restarting at the same time
|
||||||
Restart: "always",
|
Restart: "always",
|
||||||
},
|
},
|
||||||
Install: {
|
Install: {
|
||||||
|
|||||||
@@ -3,6 +3,8 @@
|
|||||||
# Recipe:: default
|
# Recipe:: default
|
||||||
#
|
#
|
||||||
|
|
||||||
|
version = node["gitea"]["version"]
|
||||||
|
download_url = "https://dl.gitea.io/gitea/#{version}/gitea-#{version}-linux-amd64"
|
||||||
working_directory = node["gitea"]["working_directory"]
|
working_directory = node["gitea"]["working_directory"]
|
||||||
git_home_directory = "/home/git"
|
git_home_directory = "/home/git"
|
||||||
repository_root_directory = "#{git_home_directory}/gitea-repositories"
|
repository_root_directory = "#{git_home_directory}/gitea-repositories"
|
||||||
@@ -75,6 +77,22 @@ if node.chef_environment == "production"
|
|||||||
}
|
}
|
||||||
end
|
end
|
||||||
|
|
||||||
|
if node["gitea"]["commit_signing"]
|
||||||
|
gpg_install
|
||||||
|
|
||||||
|
gpg_key "git" do
|
||||||
|
user "git"
|
||||||
|
group "git"
|
||||||
|
name_real node["gitea"]["commit_signing"]["name_real"]
|
||||||
|
name_comment node["gitea"]["commit_signing"]["name_comment"]
|
||||||
|
name_email node["gitea"]["commit_signing"]["name_email"]
|
||||||
|
end
|
||||||
|
|
||||||
|
execute "enable git commit signing for all repositories" do
|
||||||
|
command "su - git -c 'git config --global commit.gpgsign true'"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
config_variables = {
|
config_variables = {
|
||||||
working_directory: working_directory,
|
working_directory: working_directory,
|
||||||
git_home_directory: git_home_directory,
|
git_home_directory: git_home_directory,
|
||||||
@@ -91,6 +109,7 @@ config_variables = {
|
|||||||
smtp_user: smtp_credentials["user_name"],
|
smtp_user: smtp_credentials["user_name"],
|
||||||
smtp_password: smtp_credentials["password"],
|
smtp_password: smtp_credentials["password"],
|
||||||
config: node["gitea"]["config"],
|
config: node["gitea"]["config"],
|
||||||
|
commit_signing: node["gitea"]["commit_signing"],
|
||||||
s3_key_id: gitea_data_bag_item["s3_key_id"],
|
s3_key_id: gitea_data_bag_item["s3_key_id"],
|
||||||
s3_secret_key: gitea_data_bag_item["s3_secret_key"],
|
s3_secret_key: gitea_data_bag_item["s3_secret_key"],
|
||||||
s3_bucket: gitea_data_bag_item["s3_bucket"]
|
s3_bucket: gitea_data_bag_item["s3_bucket"]
|
||||||
@@ -107,8 +126,8 @@ template "#{config_directory}/app.ini" do
|
|||||||
end
|
end
|
||||||
|
|
||||||
remote_file gitea_binary_path do
|
remote_file gitea_binary_path do
|
||||||
source node['gitea']['binary_url']
|
source download_url
|
||||||
checksum node['gitea']['binary_checksum']
|
checksum node['gitea']['checksum']
|
||||||
mode "0755"
|
mode "0755"
|
||||||
notifies :restart, "service[gitea]", :delayed
|
notifies :restart, "service[gitea]", :delayed
|
||||||
end
|
end
|
||||||
|
|||||||
@@ -28,6 +28,15 @@ SSL_MODE = disable
|
|||||||
[repository]
|
[repository]
|
||||||
ROOT = <%= @repository_root_directory %>
|
ROOT = <%= @repository_root_directory %>
|
||||||
|
|
||||||
|
<% if @commit_signing %>
|
||||||
|
[repository.signing]
|
||||||
|
SIGNING_KEY = default
|
||||||
|
INITIAL_COMMIT = always
|
||||||
|
CRUD_ACTIONS = always
|
||||||
|
MERGES = always
|
||||||
|
WIKI = never
|
||||||
|
<% end %>
|
||||||
|
|
||||||
# [indexer]
|
# [indexer]
|
||||||
# ISSUE_INDEXER_PATH = /data/gitea/indexers/issues.bleve
|
# ISSUE_INDEXER_PATH = /data/gitea/indexers/issues.bleve
|
||||||
|
|
||||||
@@ -112,3 +121,7 @@ MINIO_USE_SSL=<%= c["use_ssl"] %>
|
|||||||
[actions]
|
[actions]
|
||||||
ENABLED = true
|
ENABLED = true
|
||||||
<% end %>
|
<% end %>
|
||||||
|
|
||||||
|
[other]
|
||||||
|
SHOW_FOOTER_VERSION = false
|
||||||
|
SHOW_FOOTER_TEMPLATE_LOAD_TIME = false
|
||||||
|
|||||||
@@ -21,8 +21,13 @@ server {
|
|||||||
location ~ ^/(avatars|repo-avatars)/.*$ {
|
location ~ ^/(avatars|repo-avatars)/.*$ {
|
||||||
proxy_buffers 1024 8k;
|
proxy_buffers 1024 8k;
|
||||||
proxy_pass http://_gitea_web;
|
proxy_pass http://_gitea_web;
|
||||||
proxy_http_version 1.1;
|
|
||||||
expires 30d;
|
expires 30d;
|
||||||
|
proxy_set_header Connection $http_connection;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
}
|
}
|
||||||
|
|
||||||
# Docker registry
|
# Docker registry
|
||||||
@@ -30,12 +35,22 @@ server {
|
|||||||
client_max_body_size 0;
|
client_max_body_size 0;
|
||||||
proxy_buffers 1024 8k;
|
proxy_buffers 1024 8k;
|
||||||
proxy_pass http://_gitea_web;
|
proxy_pass http://_gitea_web;
|
||||||
proxy_http_version 1.1;
|
proxy_set_header Connection $http_connection;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
}
|
}
|
||||||
|
|
||||||
location / {
|
location / {
|
||||||
proxy_buffers 1024 8k;
|
proxy_buffers 1024 8k;
|
||||||
proxy_pass http://_gitea_web;
|
proxy_pass http://_gitea_web;
|
||||||
proxy_http_version 1.1;
|
proxy_set_header Connection $http_connection;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,9 +1,10 @@
|
|||||||
ubuntu_server_cloud_image_release = "20230506"
|
release = "20240514"
|
||||||
|
img_filename = "ubuntu-22.04-server-cloudimg-amd64-disk-kvm"
|
||||||
|
|
||||||
node.default["kosmos_kvm"]["host"]["qemu_base_image"] = {
|
node.default["kosmos_kvm"]["host"]["qemu_base_image"] = {
|
||||||
"url" => "https://cloud-images.ubuntu.com/releases/focal/release-#{ubuntu_server_cloud_image_release}/ubuntu-20.04-server-cloudimg-amd64-disk-kvm.img",
|
"url" => "https://cloud-images.ubuntu.com/releases/jammy/release-#{release}/#{img_filename}.img",
|
||||||
"checksum" => "27d2b91fd2b715729d739e2a3155dce70d1aaae4f05c177f338b9d4b60be638c",
|
"checksum" => "2e7698b3ebd7caead06b08bd3ece241e6ce294a6db01f92ea12bcb56d6972c3f",
|
||||||
"path" => "/var/lib/libvirt/images/base/ubuntu-20.04-server-cloudimg-amd64-disk-kvm-#{ubuntu_server_cloud_image_release}.qcow2"
|
"path" => "/var/lib/libvirt/images/base/#{img_filename}-#{release}.qcow2"
|
||||||
}
|
}
|
||||||
|
|
||||||
# A systemd.timer OnCalendar config value
|
# A systemd.timer OnCalendar config value
|
||||||
|
|||||||
@@ -22,8 +22,5 @@ borg create -v $REPOSITORY::$1_$(date +%F_%H-%M) \
|
|||||||
/var/lib/libvirt/images/$1.qcow2 \
|
/var/lib/libvirt/images/$1.qcow2 \
|
||||||
/root/backups/vm_meta/$1.xml
|
/root/backups/vm_meta/$1.xml
|
||||||
|
|
||||||
echo "Pivoting base image back to original"
|
echo "Pivoting base image back to original, and removing the snapshot image"
|
||||||
virsh blockcommit $1 vda --pivot --base=/var/lib/libvirt/images/$1.qcow2
|
virsh blockcommit $1 vda --pivot --base=/var/lib/libvirt/images/$1.qcow2 && rm /var/lib/libvirt/images/$1.hotswap.qcow2
|
||||||
|
|
||||||
echo "Removing snapshot image"
|
|
||||||
rm /var/lib/libvirt/images/$1.hotswap.qcow2
|
|
||||||
|
|||||||
20
site-cookbooks/kosmos_strfry/LICENSE
Normal file
20
site-cookbooks/kosmos_strfry/LICENSE
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
Copyright (c) 2024 Kosmos Developers
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining
|
||||||
|
a copy of this software and associated documentation files (the
|
||||||
|
"Software"), to deal in the Software without restriction, including
|
||||||
|
without limitation the rights to use, copy, modify, merge, publish,
|
||||||
|
distribute, sublicense, and/or sell copies of the Software, and to
|
||||||
|
permit persons to whom the Software is furnished to do so, subject to
|
||||||
|
the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be
|
||||||
|
included in all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||||
|
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||||
|
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||||
|
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||||
|
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||||
|
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||||
|
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
4
site-cookbooks/kosmos_strfry/README.md
Normal file
4
site-cookbooks/kosmos_strfry/README.md
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
kosmos_strfry
|
||||||
|
=============
|
||||||
|
|
||||||
|
Installs/configures a strfry relay and its reverse proxy config
|
||||||
2
site-cookbooks/kosmos_strfry/attributes/default.rb
Normal file
2
site-cookbooks/kosmos_strfry/attributes/default.rb
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
node.default["strfry"]["ldap_search_dn"] = "ou=kosmos.org,cn=users,dc=kosmos,dc=org"
|
||||||
|
node.default["strfry"]["extras_dir"] = "/opt/strfry"
|
||||||
10
site-cookbooks/kosmos_strfry/metadata.rb
Normal file
10
site-cookbooks/kosmos_strfry/metadata.rb
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
name 'kosmos_strfry'
|
||||||
|
maintainer 'Kosmos'
|
||||||
|
maintainer_email 'mail@kosmos.org'
|
||||||
|
license 'MIT'
|
||||||
|
description 'strfry wrapper cookbook'
|
||||||
|
long_description IO.read(File.join(File.dirname(__FILE__), 'README.md'))
|
||||||
|
version '0.1.0'
|
||||||
|
|
||||||
|
depends 'kosmos_openresty'
|
||||||
|
depends 'deno'
|
||||||
13
site-cookbooks/kosmos_strfry/recipes/firewall.rb
Normal file
13
site-cookbooks/kosmos_strfry/recipes/firewall.rb
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
#
|
||||||
|
# Cookbook Name:: kosmos_strfry
|
||||||
|
# Recipe:: firewall
|
||||||
|
#
|
||||||
|
|
||||||
|
include_recipe "kosmos-base::firewall"
|
||||||
|
|
||||||
|
firewall_rule "strfry" do
|
||||||
|
port node["strfry"]["port"]
|
||||||
|
source "10.1.1.0/24"
|
||||||
|
protocol :tcp
|
||||||
|
command :allow
|
||||||
|
end
|
||||||
29
site-cookbooks/kosmos_strfry/recipes/nginx.rb
Normal file
29
site-cookbooks/kosmos_strfry/recipes/nginx.rb
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
#
|
||||||
|
# Cookbook Name:: kosmos_strfry
|
||||||
|
# Recipe:: nginx
|
||||||
|
#
|
||||||
|
|
||||||
|
domain = node["strfry"]["domain"]
|
||||||
|
|
||||||
|
upstream_hosts = []
|
||||||
|
search(:node, 'role:strfry').each do |node|
|
||||||
|
upstream_hosts << node['knife_zero']['host']
|
||||||
|
end
|
||||||
|
if upstream_hosts.empty?
|
||||||
|
Chef::Log.warn("No node found with 'strfry' role. Not configuring nginx site.")
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
tls_cert_for domain do
|
||||||
|
auth "gandi_dns"
|
||||||
|
action :create
|
||||||
|
end
|
||||||
|
|
||||||
|
openresty_site domain do
|
||||||
|
template "nginx_conf_strfry.erb"
|
||||||
|
variables domain: domain,
|
||||||
|
upstream_port: node['strfry']['port'],
|
||||||
|
upstream_hosts: upstream_hosts,
|
||||||
|
ssl_cert: "/etc/letsencrypt/live/#{domain}/fullchain.pem",
|
||||||
|
ssl_key: "/etc/letsencrypt/live/#{domain}/privkey.pem"
|
||||||
|
end
|
||||||
83
site-cookbooks/kosmos_strfry/recipes/policies.rb
Normal file
83
site-cookbooks/kosmos_strfry/recipes/policies.rb
Normal file
@@ -0,0 +1,83 @@
|
|||||||
|
#
|
||||||
|
# Cookbook Name:: kosmos_strfry
|
||||||
|
# Recipe:: policies
|
||||||
|
#
|
||||||
|
|
||||||
|
include_recipe "deno"
|
||||||
|
|
||||||
|
#
|
||||||
|
# config
|
||||||
|
#
|
||||||
|
|
||||||
|
ldap_credentials = Chef::EncryptedDataBagItem.load('credentials', 'dirsrv')
|
||||||
|
|
||||||
|
extras_dir = node["strfry"]["extras_dir"]
|
||||||
|
|
||||||
|
directory extras_dir do
|
||||||
|
owner node["strfry"]["user"]
|
||||||
|
group node["strfry"]["group"]
|
||||||
|
mode "0755"
|
||||||
|
end
|
||||||
|
|
||||||
|
env = {
|
||||||
|
ldap_url: 'ldap://ldap.kosmos.local:389', # requires "ldap_client" role
|
||||||
|
ldap_bind_dn: ldap_credentials["service_dn"],
|
||||||
|
ldap_password: ldap_credentials["service_password"],
|
||||||
|
ldap_search_dn: node["strfry"]["ldap_search_dn"],
|
||||||
|
whitelist_pubkeys: node["strfry"]["whitelist_pubkeys"].join(",")
|
||||||
|
}
|
||||||
|
|
||||||
|
template "#{extras_dir}/.env" do
|
||||||
|
source 'env.erb'
|
||||||
|
owner node["strfry"]["user"]
|
||||||
|
group node["strfry"]["group"]
|
||||||
|
mode 0600
|
||||||
|
sensitive true
|
||||||
|
variables config: env
|
||||||
|
notifies :restart, "service[strfry]", :delayed
|
||||||
|
end
|
||||||
|
|
||||||
|
#
|
||||||
|
# strfry deno scripts
|
||||||
|
#
|
||||||
|
|
||||||
|
base_url = "https://gitea.kosmos.org/kosmos/akkounts/raw/branch/live/extras/strfry"
|
||||||
|
|
||||||
|
remote_file "#{extras_dir}/deno.json" do
|
||||||
|
source "#{base_url}/deno.json"
|
||||||
|
owner node["strfry"]["user"]
|
||||||
|
group node["strfry"]["group"]
|
||||||
|
mode "0644"
|
||||||
|
notifies :restart, "service[strfry]", :delayed
|
||||||
|
end
|
||||||
|
|
||||||
|
remote_file "#{extras_dir}/deno.lock" do
|
||||||
|
source "#{base_url}/deno.lock"
|
||||||
|
owner node["strfry"]["user"]
|
||||||
|
group node["strfry"]["group"]
|
||||||
|
mode "0644"
|
||||||
|
notifies :restart, "service[strfry]", :delayed
|
||||||
|
end
|
||||||
|
|
||||||
|
remote_file "#{extras_dir}/strfry-policy.ts" do
|
||||||
|
source "#{base_url}/strfry-policy.ts"
|
||||||
|
owner node["strfry"]["user"]
|
||||||
|
group node["strfry"]["group"]
|
||||||
|
mode "0755"
|
||||||
|
notifies :restart, "service[strfry]", :delayed
|
||||||
|
end
|
||||||
|
|
||||||
|
remote_file "#{extras_dir}/ldap-policy.ts" do
|
||||||
|
source "#{base_url}/ldap-policy.ts"
|
||||||
|
owner node["strfry"]["user"]
|
||||||
|
group node["strfry"]["group"]
|
||||||
|
mode "0644"
|
||||||
|
notifies :restart, "service[strfry]", :delayed
|
||||||
|
end
|
||||||
|
|
||||||
|
remote_file "#{extras_dir}/strfry-sync.ts" do
|
||||||
|
source "#{base_url}/strfry-sync.ts"
|
||||||
|
owner node["strfry"]["user"]
|
||||||
|
group node["strfry"]["group"]
|
||||||
|
mode "0644"
|
||||||
|
end
|
||||||
11
site-cookbooks/kosmos_strfry/templates/env.erb
Normal file
11
site-cookbooks/kosmos_strfry/templates/env.erb
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
<% @config.each do |key, value| %>
|
||||||
|
<% if value.is_a?(Hash) %>
|
||||||
|
<% value.each do |k, v| %>
|
||||||
|
<%= "#{key.upcase}_#{k.upcase}" %>=<%= v.to_s %>
|
||||||
|
<% end %>
|
||||||
|
<% else %>
|
||||||
|
<% if value %>
|
||||||
|
<%= key.upcase %>=<%= value.to_s %>
|
||||||
|
<% end %>
|
||||||
|
<% end %>
|
||||||
|
<% end %>
|
||||||
25
site-cookbooks/kosmos_strfry/templates/nginx_conf_strfry.erb
Normal file
25
site-cookbooks/kosmos_strfry/templates/nginx_conf_strfry.erb
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
upstream _strfry {
|
||||||
|
<% @upstream_hosts.each do |host| %>
|
||||||
|
server <%= host %>:<%= @upstream_port || "7777" %>;
|
||||||
|
<% end %>
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
listen <%= "#{node['openresty']['listen_ip']}:" if node['openresty']['listen_ip'] %>443 ssl http2;
|
||||||
|
server_name <%= @domain %>;
|
||||||
|
|
||||||
|
access_log "/var/log/nginx/<%= @domain %>.access.log";
|
||||||
|
error_log "/var/log/nginx/<%= @domain %>.error.log";
|
||||||
|
|
||||||
|
ssl_certificate <%= @ssl_cert %>;
|
||||||
|
ssl_certificate_key <%= @ssl_key %>;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_pass http://_strfry;
|
||||||
|
proxy_http_version 1.1;
|
||||||
|
proxy_set_header Upgrade $http_upgrade;
|
||||||
|
proxy_set_header Connection "upgrade";
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,3 +1,4 @@
|
|||||||
node.default["kosmos_website"]["domain"] = "kosmos.org"
|
node.default["kosmos_website"]["domain"] = "kosmos.org"
|
||||||
node.default["kosmos_website"]["repo"] = "https://gitea.kosmos.org/kosmos/website.git"
|
node.default["kosmos_website"]["repo"] = "https://gitea.kosmos.org/kosmos/website.git"
|
||||||
node.default["kosmos_website"]["revision"] = "chore/content"
|
node.default["kosmos_website"]["revision"] = "chore/content"
|
||||||
|
node.default["kosmos_website"]["accounts_url"] = "https://accounts.kosmos.org"
|
||||||
|
|||||||
@@ -23,6 +23,7 @@ end
|
|||||||
openresty_site domain do
|
openresty_site domain do
|
||||||
template "nginx_conf_website.erb"
|
template "nginx_conf_website.erb"
|
||||||
variables domain: domain,
|
variables domain: domain,
|
||||||
|
accounts_url: node.default["kosmos_website"]["accounts_url"],
|
||||||
ssl_cert: "/etc/letsencrypt/live/#{domain}/fullchain.pem",
|
ssl_cert: "/etc/letsencrypt/live/#{domain}/fullchain.pem",
|
||||||
ssl_key: "/etc/letsencrypt/live/#{domain}/privkey.pem"
|
ssl_key: "/etc/letsencrypt/live/#{domain}/privkey.pem"
|
||||||
end
|
end
|
||||||
|
|||||||
35
site-cookbooks/kosmos_website/recipes/redirects.rb
Normal file
35
site-cookbooks/kosmos_website/recipes/redirects.rb
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
#
|
||||||
|
# Cookbook:: kosmos_website
|
||||||
|
# Recipe:: redirects
|
||||||
|
#
|
||||||
|
|
||||||
|
redirects = [
|
||||||
|
{
|
||||||
|
domain: "kosmos.chat",
|
||||||
|
target: "https://kosmos.org",
|
||||||
|
http_status: 307
|
||||||
|
},
|
||||||
|
{
|
||||||
|
domain: "kosmos.cash",
|
||||||
|
acme_domain: "letsencrypt.kosmos.org",
|
||||||
|
target: "https://kosmos.org",
|
||||||
|
http_status: 307
|
||||||
|
}
|
||||||
|
]
|
||||||
|
|
||||||
|
redirects.each do |redirect|
|
||||||
|
tls_cert_for redirect[:domain] do
|
||||||
|
auth "gandi_dns"
|
||||||
|
acme_domain redirect[:acme_domain] unless redirect[:acme_domain].nil?
|
||||||
|
action :create
|
||||||
|
end
|
||||||
|
|
||||||
|
openresty_site redirect[:domain] do
|
||||||
|
template "nginx_conf_redirect.erb"
|
||||||
|
variables domain: redirect[:domain],
|
||||||
|
target: redirect[:target],
|
||||||
|
http_status: redirect[:http_status],
|
||||||
|
ssl_cert: "/etc/letsencrypt/live/#{redirect[:domain]}/fullchain.pem",
|
||||||
|
ssl_key: "/etc/letsencrypt/live/#{redirect[:domain]}/privkey.pem"
|
||||||
|
end
|
||||||
|
end
|
||||||
@@ -0,0 +1,20 @@
|
|||||||
|
# Generated by Chef
|
||||||
|
|
||||||
|
server {
|
||||||
|
server_name <%= @domain %>;
|
||||||
|
listen <%= "#{node['openresty']['listen_ip']}:" if node['openresty']['listen_ip'] %>443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
access_log <%= node[:openresty][:log_dir] %>/<%= @domain %>.access.log;
|
||||||
|
error_log <%= node[:openresty][:log_dir] %>/<%= @domain %>.error.log warn;
|
||||||
|
|
||||||
|
gzip_static on;
|
||||||
|
gzip_comp_level 5;
|
||||||
|
|
||||||
|
ssl_certificate <%= @ssl_cert %>;
|
||||||
|
ssl_certificate_key <%= @ssl_key %>;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
return <%= @http_status || 301 %> <%= @target %>;
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,18 @@
|
|||||||
|
# Generated by Chef
|
||||||
|
|
||||||
|
server {
|
||||||
|
server_name <%= @domain %>;
|
||||||
|
listen <%= "#{node['openresty']['listen_ip']}:" if node['openresty']['listen_ip'] %>443 ssl http2;
|
||||||
|
listen [::]:443 ssl http2;
|
||||||
|
|
||||||
|
root /var/www/<%= @domain %>/public;
|
||||||
|
|
||||||
|
access_log <%= node[:openresty][:log_dir] %>/<%= @domain %>.access.log;
|
||||||
|
error_log <%= node[:openresty][:log_dir] %>/<%= @domain %>.error.log warn;
|
||||||
|
|
||||||
|
gzip_static on;
|
||||||
|
gzip_comp_level 5;
|
||||||
|
|
||||||
|
ssl_certificate <%= @ssl_cert %>;
|
||||||
|
ssl_certificate_key <%= @ssl_key %>;
|
||||||
|
}
|
||||||
@@ -1,9 +1,18 @@
|
|||||||
# Generated by Chef
|
# Generated by Chef
|
||||||
|
|
||||||
|
server {
|
||||||
|
server_name _;
|
||||||
|
listen 80 default_server;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
return 301 https://<%= @domain %>;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
server_name <%= @domain %>;
|
server_name <%= @domain %>;
|
||||||
listen <%= "#{node['openresty']['listen_ip']}:" if node['openresty']['listen_ip'] %>443 ssl http2;
|
listen <%= "#{node['openresty']['listen_ip']}:" if node['openresty']['listen_ip'] %>443 ssl http2 default_server;
|
||||||
listen [::]:443 ssl http2;
|
listen [::]:443 ssl http2 default_server;
|
||||||
|
|
||||||
root /var/www/<%= @domain %>/public;
|
root /var/www/<%= @domain %>/public;
|
||||||
|
|
||||||
@@ -18,8 +27,10 @@ server {
|
|||||||
ssl_certificate <%= @ssl_cert %>;
|
ssl_certificate <%= @ssl_cert %>;
|
||||||
ssl_certificate_key <%= @ssl_key %>;
|
ssl_certificate_key <%= @ssl_key %>;
|
||||||
|
|
||||||
|
<% if @accounts_url %>
|
||||||
location ~ ^/.well-known/(webfinger|nostr|lnurlp|keysend) {
|
location ~ ^/.well-known/(webfinger|nostr|lnurlp|keysend) {
|
||||||
proxy_ssl_server_name on;
|
proxy_ssl_server_name on;
|
||||||
proxy_pass https://accounts.kosmos.org;
|
proxy_pass https://accounts.kosmos.org;
|
||||||
}
|
}
|
||||||
|
<% end %>
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -18,6 +18,7 @@ end
|
|||||||
|
|
||||||
tls_cert_for domain do
|
tls_cert_for domain do
|
||||||
auth "gandi_dns"
|
auth "gandi_dns"
|
||||||
|
acme_domain "letsencrypt.kosmos.org"
|
||||||
action :create
|
action :create
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|||||||
@@ -24,10 +24,10 @@ file "/etc/letsencrypt/renewal-hooks/post/nginx" do
|
|||||||
group "root"
|
group "root"
|
||||||
end
|
end
|
||||||
|
|
||||||
gandi_api_data_bag_item = data_bag_item('credentials', 'gandi_api_5apps')
|
gandi_api_credentials = data_bag_item('credentials', 'gandi_api')
|
||||||
|
|
||||||
template "/root/gandi_dns_certbot_hook.sh" do
|
template "/root/gandi_dns_certbot_hook.sh" do
|
||||||
variables gandi_api_key: gandi_api_data_bag_item["key"]
|
variables gandi_api_key: gandi_api_credentials["key"]
|
||||||
mode 0770
|
mode 0770
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|||||||
1
site-cookbooks/strfry
Submodule
1
site-cookbooks/strfry
Submodule
Submodule site-cookbooks/strfry added at a4756377b4
Reference in New Issue
Block a user