Преглед изворни кода

Move SSL certificates from /etc/pki/acmetool-certs to /matrix/ssl

Moving keeps everything in the /matrix directory, so that we
wouldn't contaminate anything else on the system or risk
clashing with something else.

Also retrieving certificates separately for the Riot and Matrix domains,
which should help in multiple ways:

- allows them to be very different (completely separate base domain..)

- allows for Riot to be disabled for the playbook some time later
  and still have the code not break
pull/6/head
Slavi Pantaleev пре 8 година
родитељ
комит
cb323f5b4c
11 измењених фајлова са 35 додато и 24 уклоњено
  1. +1
    -1
      examples/host-vars.yml
  2. +2
    -3
      roles/matrix-server/defaults/main.yml
  3. +11
    -1
      roles/matrix-server/tasks/setup_main.yml
  4. +3
    -3
      roles/matrix-server/tasks/setup_postgres.yml
  5. +2
    -2
      roles/matrix-server/tasks/setup_s3fs.yml
  6. +9
    -6
      roles/matrix-server/tasks/setup_ssl.yml
  7. +0
    -1
      roles/matrix-server/tasks/setup_synapse.yml
  8. +2
    -2
      roles/matrix-server/templates/cron.d/matrix-periodic-restarter.j2
  9. +2
    -2
      roles/matrix-server/templates/cron.d/matrix-ssl-certificate-renewal.j2
  10. +1
    -1
      roles/matrix-server/templates/systemd/matrix-nginx-proxy.service.j2
  11. +2
    -2
      roles/matrix-server/templates/systemd/matrix-synapse.service.j2

+ 1
- 1
examples/host-vars.yml Прегледај датотеку

@@ -5,7 +5,7 @@
# an email notification there.
#
# Example value: someone@example.com
host_specific_ssl_support_email: YOUR_EMAIL_ADDRESS_HERE
host_specific_matrix_ssl_support_email: YOUR_EMAIL_ADDRESS_HERE

# This is your bare domain name (`<your-domain`).
#


+ 2
- 3
roles/matrix-server/defaults/main.yml Прегледај датотеку

@@ -11,9 +11,6 @@ hostname_matrix: "matrix.{{ hostname_identity }}"
# This and the Matrix hostname (see above) are expected to be on the same server.
hostname_riot: "riot.{{ hostname_identity }}"

ssl_certs_path: /etc/pki/acmetool-certs
ssl_support_email: "{{ host_specific_ssl_support_email }}"

matrix_user_username: "matrix"
matrix_user_uid: 991
matrix_user_gid: 991
@@ -27,6 +24,8 @@ matrix_postgres_connection_password: "synapse-password"
matrix_postgres_db_name: "homeserver"

matrix_base_data_path: "/matrix"
matrix_ssl_certs_path: "{{ matrix_base_data_path }}/ssl"
matrix_ssl_support_email: "{{ host_specific_matrix_ssl_support_email }}"
matrix_environment_variables_data_path: "{{ matrix_base_data_path }}/environment-variables"
matrix_synapse_base_path: "{{ matrix_base_data_path }}/synapse"
matrix_synapse_config_dir_path: "{{ matrix_synapse_base_path }}/config"


+ 11
- 1
roles/matrix-server/tasks/setup_main.yml Прегледај датотеку

@@ -17,4 +17,14 @@
file:
path: "{{ matrix_environment_variables_data_path }}"
state: directory
mode: 0700
mode: 0700

- name: Ensure Matrix base path exists
file:
path: "{{ item }}"
state: directory
mode: 0750
owner: "{{ matrix_user_username }}"
group: "{{ matrix_user_username }}"
with_items:
- "{{ matrix_synapse_base_path }}"

+ 3
- 3
roles/matrix-server/tasks/setup_postgres.yml Прегледај датотеку

@@ -48,7 +48,7 @@
# Tasks related to getting rid of the internal postgres server (if it was previously enabled)
#

- name: Check existance of matrix-postgres service
- name: Check existence of matrix-postgres service
stat: path="/etc/systemd/system/matrix-postgres.service"
register: matrix_postgres_service_stat
when: matrix_postgres_use_external
@@ -63,7 +63,7 @@
state: absent
when: "matrix_postgres_use_external and matrix_postgres_service_stat.stat.exists"

- name: Check existance of matrix-postgres local data path
- name: Check existence of matrix-postgres local data path
stat: path="{{ matrix_postgres_data_path }}"
register: matrix_postgres_data_path_stat
when: matrix_postgres_use_external
@@ -72,4 +72,4 @@
- name: Notify if matrix-postgres local data remains
debug:
msg: "Note: You are not using a local PostgreSQL database, but some old data remains from before in {{ matrix_postgres_data_path }}. Feel free to delete that."
when: "matrix_postgres_use_external and matrix_postgres_data_path_stat.stat.exists"
when: "matrix_postgres_use_external and matrix_postgres_data_path_stat.stat.exists"

+ 2
- 2
roles/matrix-server/tasks/setup_s3fs.yml Прегледај датотеку

@@ -26,7 +26,7 @@
# Tasks related to getting rid of s3fs (if it was previously enabled)
#

- name: Check existance of matrix-s3fs service
- name: Check existence of matrix-s3fs service
stat: path="/etc/systemd/system/matrix-s3fs.service"
register: matrix_s3fs_service_stat

@@ -51,4 +51,4 @@
docker_image:
name: "{{ docker_s3fs_image }}"
state: absent
when: "not matrix_s3_media_store_enabled"
when: "not matrix_s3_media_store_enabled"

+ 9
- 6
roles/matrix-server/tasks/setup_ssl.yml Прегледај датотеку

@@ -17,7 +17,7 @@

- name: Ensure SSL certificates path exists
file:
path: "{{ ssl_certs_path }}"
path: "{{ matrix_ssl_certs_path }}"
state: directory
mode: 0770
owner: "{{ matrix_user_username }}"
@@ -34,10 +34,13 @@
- name: Ensure SSL certificates are marked as wanted in acmetool
shell: >-
/usr/bin/docker run --rm --name acmetool-host-grab -p 80:80
-v {{ ssl_certs_path }}:/certs
-e ACME_EMAIL={{ ssl_support_email }}
-v {{ matrix_ssl_certs_path }}:/certs
-e ACME_EMAIL={{ matrix_ssl_support_email }}
willwill/acme-docker
acmetool want {{ hostname_matrix }} {{ hostname_riot }} --xlog.severity=debug
acmetool want {{ item }} --xlog.severity=debug
with_items:
- "{{ hostname_matrix }}"
- "{{ hostname_riot }}"

- name: Ensure matrix-nginx-proxy is started (if previously installed & started)
service: name=matrix-nginx-proxy state=started
@@ -45,6 +48,6 @@

- name: Ensure periodic SSL renewal cronjob configured
template:
src: "{{ role_path }}/templates/cron.d/ssl-certificate-renewal.j2"
dest: "/etc/cron.d/ssl-certificate-renewal"
src: "{{ role_path }}/templates/cron.d/matrix-ssl-certificate-renewal.j2"
dest: "/etc/cron.d/matrix-ssl-certificate-renewal"
mode: 0600

+ 0
- 1
roles/matrix-server/tasks/setup_synapse.yml Прегледај датотеку

@@ -8,7 +8,6 @@
owner: "{{ matrix_user_username }}"
group: "{{ matrix_user_username }}"
with_items:
- "{{ matrix_synapse_base_path }}"
- "{{ matrix_synapse_config_dir_path }}"
- "{{ matrix_synapse_run_path }}"
# We handle matrix_synapse_media_store_path below, not here,


+ 2
- 2
roles/matrix-server/templates/cron.d/matrix-periodic-restarter.j2 Прегледај датотеку

@@ -1,8 +1,8 @@
MAILTO="{{ ssl_support_email }}"
MAILTO="{{ matrix_ssl_support_email }}"

# This periodically restarts the Matrix services
# to ensure they're using the latest SSL certificate
# in case it got renewed by the `ssl-certificate-renewal` cronjob
# in case it got renewed by the `matrix-ssl-certificate-renewal` cronjob
# (which happens once every ~2-3 months).
#
# Because `matrix-nginx-proxy.service` depends on `matrix-synapse.service`,


roles/matrix-server/templates/cron.d/ssl-certificate-renewal.j2 → roles/matrix-server/templates/cron.d/matrix-ssl-certificate-renewal.j2 Прегледај датотеку

@@ -1,4 +1,4 @@
MAILTO="{{ ssl_support_email }}"
MAILTO="{{ matrix_ssl_support_email }}"

# The goal of this cronjob is to ask acmetool to check
# the current SSL certificates and to see if some need renewal.
@@ -18,4 +18,4 @@ MAILTO="{{ ssl_support_email }}"
# These files can be retrieved via any vhost on port 80 of matrix-nginx-proxy,
# because it aliases `/.well-known/acme-challenge` to that same directory.

15 4 */5 * * root /usr/bin/docker run --rm --name acmetool-host-grab --net=host -v {{ ssl_certs_path }}:/certs -v {{ ssl_certs_path }}/run:/var/run/acme -e ACME_EMAIL={{ ssl_support_email }} willwill/acme-docker acmetool --batch reconcile # --xlog.severity=debug
15 4 */5 * * root /usr/bin/docker run --rm --name acmetool-host-grab --net=host -v {{ matrix_ssl_certs_path }}:/certs -v {{ matrix_ssl_certs_path }}/run:/var/run/acme -e ACME_EMAIL={{ matrix_ssl_support_email }} willwill/acme-docker acmetool --batch reconcile # --xlog.severity=debug

+ 1
- 1
roles/matrix-server/templates/systemd/matrix-nginx-proxy.service.j2 Прегледај датотеку

@@ -17,7 +17,7 @@ ExecStart=/usr/bin/docker run --rm --name matrix-nginx-proxy \
--link matrix-synapse:synapse \
--link matrix-riot-web:riot \
-v {{ matrix_nginx_proxy_confd_path }}:/etc/nginx/conf.d \
-v {{ ssl_certs_path }}:/acmetool-certs \
-v {{ matrix_ssl_certs_path }}:/acmetool-certs \
{{ docker_nginx_image }}
ExecStop=-/usr/bin/docker kill matrix-nginx-proxy
ExecStop=-/usr/bin/docker rm matrix-nginx-proxy


+ 2
- 2
roles/matrix-server/templates/systemd/matrix-synapse.service.j2 Прегледај датотеку

@@ -15,7 +15,7 @@ Requires=matrix-s3fs.service
Type=simple
ExecStartPre=-/usr/bin/docker kill matrix-synapse
ExecStartPre=-/usr/bin/docker rm matrix-synapse
ExecStartPre=-{{ '/usr/bin/chown' if ansible_os_family == 'RedHat' else '/bin/chown' }} {{ matrix_user_username }}:{{ matrix_user_username }} {{ ssl_certs_path }} -R
ExecStartPre=-{{ '/usr/bin/chown' if ansible_os_family == 'RedHat' else '/bin/chown' }} {{ matrix_user_username }}:{{ matrix_user_username }} {{ matrix_ssl_certs_path }} -R
ExecStart=/usr/bin/docker run --rm --name matrix-synapse \
{% if not matrix_postgres_use_external %}
--link matrix-postgres:{{ matrix_postgres_connection_hostname }} \
@@ -27,7 +27,7 @@ ExecStart=/usr/bin/docker run --rm --name matrix-synapse \
-v {{ matrix_synapse_config_dir_path }}:/data \
-v {{ matrix_synapse_run_path }}:/matrix-run \
-v {{ matrix_synapse_media_store_path }}:/matrix-media-store \
-v {{ ssl_certs_path }}:/acmetool-certs \
-v {{ matrix_ssl_certs_path }}:/acmetool-certs \
{{ docker_matrix_image }}
ExecStop=-/usr/bin/docker kill matrix-synapse
ExecStop=-/usr/bin/docker rm matrix-synapse


Loading…
Откажи
Сачувај