Compare commits
8 Commits
Author | SHA1 | Date | |
---|---|---|---|
cdd66c8757 | |||
05474d5046 | |||
4b0445befe | |||
0f3784217c | |||
ea51dace79 | |||
fd73485fa5 | |||
6801eff85d | |||
8e94b3d942 |
6
.env
6
.env
@ -1,6 +1,8 @@
|
|||||||
PROD_URL=matrix.gmoker.com
|
PROD_URL=matrix.gmoker.com
|
||||||
SERVER_NAME=gmoker.com
|
SERVER_NAME=gmoker.com
|
||||||
IMAGEAPP=ghcr.io/element-hq/synapse:v1.106.0
|
IMAGEAPP=ghcr.io/element-hq/synapse:v1.115.0
|
||||||
|
|
||||||
TURN_URL=turn.test.gmoker.com
|
TURN_URL=turn.test.gmoker.com
|
||||||
IMAGECOTURN=docker.io/coturn/coturn:4.6.2
|
IMAGECOTURN=docker.io/coturn/coturn:4.6.2-r12
|
||||||
|
|
||||||
|
MAX_UPLOAD_SIZE=50M
|
||||||
|
@ -12,10 +12,11 @@ jobs:
|
|||||||
BASE_URL="$PROD_URL"
|
BASE_URL="$PROD_URL"
|
||||||
else
|
else
|
||||||
BASE_URL="${{ gitea.ref_name }}.$(tr / '\n' <<< "${{ gitea.repository }}" | tac | tr '\n' .)k8s.gmoker.com"
|
BASE_URL="${{ gitea.ref_name }}.$(tr / '\n' <<< "${{ gitea.repository }}" | tac | tr '\n' .)k8s.gmoker.com"
|
||||||
|
SERVER_NAME="$BASE_URL"
|
||||||
fi
|
fi
|
||||||
cat <<EOF >> .env
|
cat <<EOF >> .env
|
||||||
BASE_URL="$BASE_URL"
|
BASE_URL="$BASE_URL"
|
||||||
PUBLIC_URL="${PUBLIC_URL:-$BASE_URL}"
|
SERVER_NAME="$SERVER_NAME"
|
||||||
EOF
|
EOF
|
||||||
cat .env
|
cat .env
|
||||||
|
|
||||||
|
@ -1,16 +1,16 @@
|
|||||||
server_name: "$SERVER_NAME"
|
server_name: "$SERVER_NAME"
|
||||||
public_baseurl: "https://$BASE_URL"
|
public_baseurl: "https://$BASE_URL"
|
||||||
pid_file: /homeserver.pid
|
pid_file: /homeserver.pid
|
||||||
web_client: false
|
web_client: False
|
||||||
soft_file_limit: 0
|
soft_file_limit: 0
|
||||||
log_config: "/config/log.config"
|
log_config: "/config/log.config"
|
||||||
|
|
||||||
listeners:
|
listeners:
|
||||||
- port: 8008
|
- port: 8008
|
||||||
tls: false
|
tls: False
|
||||||
type: http
|
|
||||||
x_forwarded: true
|
|
||||||
bind_addresses: ['::']
|
bind_addresses: ['::']
|
||||||
|
type: http
|
||||||
|
x_forwarded: False
|
||||||
resources:
|
resources:
|
||||||
- names: [client, federation]
|
- names: [client, federation]
|
||||||
compress: true
|
compress: true
|
||||||
@ -39,7 +39,7 @@ federation_rc_concurrent: 3
|
|||||||
media_store_path: "/data/media"
|
media_store_path: "/data/media"
|
||||||
max_upload_size: "50M"
|
max_upload_size: "50M"
|
||||||
max_image_pixels: "32M"
|
max_image_pixels: "32M"
|
||||||
dynamic_thumbnails: false
|
dynamic_thumbnails: False
|
||||||
|
|
||||||
thumbnail_sizes:
|
thumbnail_sizes:
|
||||||
- width: 32
|
- width: 32
|
||||||
@ -58,24 +58,23 @@ thumbnail_sizes:
|
|||||||
height: 600
|
height: 600
|
||||||
method: scale
|
method: scale
|
||||||
|
|
||||||
url_preview_enabled: false
|
url_preview_enabled: False
|
||||||
max_spider_size: "10M"
|
max_spider_size: "10M"
|
||||||
|
|
||||||
enable_registration_captcha: false
|
enable_registration_captcha: False
|
||||||
|
|
||||||
turn_uris: [ "turn:$TURN_URL?transport=tcp", "turn:$TURN_URL?transport=udp" ]
|
turn_uris: [ "turn:$TURN_URL?transport=tcp", "turn:$TURN_URL?transport=udp" ]
|
||||||
turn_shared_secret: "$TURN_SHARED_SECRET"
|
turn_shared_secret: "$TURN_SHARED_SECRET"
|
||||||
turn_user_lifetime: "1h"
|
turn_user_lifetime: "1h"
|
||||||
turn_allow_guests: true
|
turn_allow_guests: True
|
||||||
|
|
||||||
enable_registration: false
|
enable_registration: False
|
||||||
registration_shared_secret: "$REGISTRATION_SECRET"
|
registration_shared_secret: "$REGISTRATION_SECRET"
|
||||||
|
|
||||||
enable_metrics: true
|
enable_metrics: True
|
||||||
report_stats: true
|
report_stats: True
|
||||||
|
|
||||||
macaroon_secret_key: "$API_SECRET"
|
macaroon_secret_key: "$API_SECRET"
|
||||||
expire_access_token: false
|
|
||||||
|
|
||||||
signing_key_path: "/keys/signing.key"
|
signing_key_path: "/keys/signing.key"
|
||||||
key_refresh_interval: "1d"
|
key_refresh_interval: "1d"
|
||||||
@ -86,6 +85,6 @@ trusted_key_servers:
|
|||||||
"ed25519:auto": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
|
"ed25519:auto": "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
|
||||||
|
|
||||||
password_config:
|
password_config:
|
||||||
enabled: true
|
enabled: True
|
||||||
|
|
||||||
encryption_enabled_by_default_for_room_type: "all"
|
encryption_enabled_by_default_for_room_type: "all"
|
@ -31,7 +31,7 @@ function kgcmkey() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
function get_synapse_key() {
|
function get_synapse_key() {
|
||||||
kgcmkey synapse-config 'homeserver\.yaml' | awk -F\" "/^\s*$1/{print \$2}" || openssl rand -hex 32
|
kgcmkey synapse 'homeserver\.yaml' | awk -F\" "/^\s*$1/{print \$2}" || openssl rand -hex 32
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -47,11 +47,10 @@ export API_SECRET; API_SECRET="$(get_synapse_key macaroon_secr
|
|||||||
export TURN_SHARED_SECRET; TURN_SHARED_SECRET="$(get_synapse_key turn_shared_secret)"
|
export TURN_SHARED_SECRET; TURN_SHARED_SECRET="$(get_synapse_key turn_shared_secret)"
|
||||||
export REGISTRATION_SECRET; REGISTRATION_SECRET="$(get_synapse_key registration_shared_secret)"
|
export REGISTRATION_SECRET; REGISTRATION_SECRET="$(get_synapse_key registration_shared_secret)"
|
||||||
|
|
||||||
kcreatecm synapse-config \
|
kcreatecm synapse \
|
||||||
--from-file=homeserver.yaml=<(envsubst "$(env | xargs printf '$%s ')" < homeserver.yaml) \
|
--from-file=homeserver.yaml=<(envsubst "$(env | xargs printf '$%s ')" < config/homeserver.yaml) \
|
||||||
--from-file=log.config=<(envsubst "$(env | xargs printf '$%s ')" < log.config)
|
--from-file=log.config=<(envsubst "$(env | xargs printf '$%s ')" < config/log.config)
|
||||||
|
|
||||||
kapply common/keys.yaml common/app.yaml common/delegation.yaml
|
kapply common/keys.yaml common/app.yaml
|
||||||
|
|
||||||
kubectl rollout restart deployment delegation
|
|
||||||
kubectl rollout restart statefulset app
|
kubectl rollout restart statefulset app
|
||||||
|
@ -4,3 +4,9 @@
|
|||||||
export NB_REPLICAS=1
|
export NB_REPLICAS=1
|
||||||
|
|
||||||
. ./manifests/bin/deploy.sh
|
. ./manifests/bin/deploy.sh
|
||||||
|
|
||||||
|
if [ "$GITHUB_REF_NAME" = prod ]; then
|
||||||
|
kapply common/delegation.yaml
|
||||||
|
|
||||||
|
kubectl rollout restart deployment delegation
|
||||||
|
fi
|
||||||
|
@ -4,6 +4,7 @@ kind: Ingress
|
|||||||
metadata:
|
metadata:
|
||||||
name: app
|
name: app
|
||||||
annotations:
|
annotations:
|
||||||
|
nginx.ingress.kubernetes.io/proxy-body-size: "$MAX_UPLOAD_SIZE"
|
||||||
cert-manager.io/cluster-issuer: letsencrypt-prod
|
cert-manager.io/cluster-issuer: letsencrypt-prod
|
||||||
spec:
|
spec:
|
||||||
ingressClassName: nginx
|
ingressClassName: nginx
|
||||||
@ -53,8 +54,6 @@ spec:
|
|||||||
labels:
|
labels:
|
||||||
app: app
|
app: app
|
||||||
spec:
|
spec:
|
||||||
imagePullSecrets:
|
|
||||||
- name: regcred
|
|
||||||
containers:
|
containers:
|
||||||
- name: app
|
- name: app
|
||||||
image: "$IMAGEAPP"
|
image: "$IMAGEAPP"
|
||||||
@ -69,7 +68,6 @@ spec:
|
|||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: config
|
- name: config
|
||||||
mountPath: /config/
|
mountPath: /config/
|
||||||
readOnly: true
|
|
||||||
- name: data
|
- name: data
|
||||||
mountPath: /data/
|
mountPath: /data/
|
||||||
- name: keys
|
- name: keys
|
||||||
@ -79,7 +77,7 @@ spec:
|
|||||||
volumes:
|
volumes:
|
||||||
- name: config
|
- name: config
|
||||||
configMap:
|
configMap:
|
||||||
name: synapse-config
|
name: synapse
|
||||||
- name: keys
|
- name: keys
|
||||||
persistentVolumeClaim:
|
persistentVolumeClaim:
|
||||||
claimName: keys
|
claimName: keys
|
||||||
|
1
manifests/common/turn.yaml
Normal file
1
manifests/common/turn.yaml
Normal file
@ -0,0 +1 @@
|
|||||||
|
# https://element-hq.github.io/synapse/latest/setup/turn/coturn.html
|
@ -85,7 +85,6 @@ spec:
|
|||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: delegation
|
- name: delegation
|
||||||
mountPath: /etc/nginx/conf.d/
|
mountPath: /etc/nginx/conf.d/
|
||||||
readOnly: true
|
|
||||||
volumes:
|
volumes:
|
||||||
- name: delegation
|
- name: delegation
|
||||||
configMap:
|
configMap:
|
Loading…
Reference in New Issue
Block a user