Compare commits

...
This repository has been archived on 2023-03-15. You can view files and clone it, but cannot push or open issues or pull requests.

421 Commits
alexvm ... main

Author SHA1 Message Date
Alex ab6db28ada add Adrien@Lille to ifconfig 2023-03-15 18:19:58 +01:00
Alex 46e29828b1 add missing iptables rules 2023-02-12 16:40:14 +01:00
Quentin a6742bcf53
fix io 2023-02-02 07:45:38 +01:00
Alex 653e170fb2
remove outdated info 2022-12-24 23:00:33 +01:00
Alex b449e83870
Notice that repo is obsolete 2022-12-22 17:59:51 +01:00
Alex b575b2b486
Remove all files from op_guide, now migrated to guide.deuxfleurs.fr 2022-12-22 17:46:19 +01:00
Alex 015c372532
Add allowed ipv6 prefix 2022-09-09 17:25:34 +02:00
Quentin ec597541c8
Fix create db doc 2022-08-25 02:02:40 +02:00
Quentin ed82071223
Upgrade Stolon doc 2022-08-24 17:09:40 +02:00
Alex 18610f9a9a
Add Quentin@Lyon (orion) to iptables v6 rules 2022-08-24 16:29:02 +02:00
Quentin 11a2ffa89d
Upgrade Stolon to Posgtgres 14 2022-08-24 15:58:21 +02:00
Alex ae91f66fac
Disable guichet on old cluster 2022-08-24 15:51:29 +02:00
Quentin 145f3a8499
Matrix is so weird... 2022-08-19 18:27:43 +02:00
Quentin 638f775742
Hot fix 2022-08-19 18:01:19 +02:00
Quentin 38a0feffe0
Add zorun 2022-08-18 22:31:34 +02:00
Quentin 1e003461bd
Add the net target to io 2022-08-17 12:26:23 +02:00
Quentin 2e872eb87f
Update max@bruxelles IP addresses 2022-08-17 11:50:48 +02:00
Quentin ef265b87de
Update doc 2022-07-28 17:34:49 +02:00
Quentin 64172fc999
update runners' doc 2022-07-25 15:20:21 +02:00
Quentin ceae80d87c
Use Tricot certificates instead of self-signed ones 2022-07-06 13:16:50 +02:00
Quentin 0e81c9f23b
Upgrade Matrix 2022-07-01 14:17:33 +02:00
Quentin 39e3ecce64
Upgrade Synapse + Element Web 2022-07-01 13:59:50 +02:00
Quentin 51482e16e4
Drop allow unsafe locale 2022-06-06 10:52:18 +02:00
Quentin 6c31560c7b
Forced to allow unsafe local 2022-06-06 09:08:51 +02:00
Quentin 72b41408ef
Upgrade synapse+element web in Nomad 2022-06-06 09:03:51 +02:00
Quentin 7dd2aeb63b
Upgrade matrix+riot 2022-06-06 08:42:57 +02:00
Alex a17640d606
update bottin config 2022-06-01 12:41:38 +02:00
Alex 241dd1e175
Drone update 2022-05-31 11:53:42 +02:00
Quentin d712c08dbc
Update the doc 2022-05-10 15:42:41 +02:00
Alex 415075b010
Garage v0.7.1 2022-05-09 16:25:15 +02:00
Alex 2021b7d08c
New ipv6 prefix for lx@orsay 2022-05-09 00:10:21 +02:00
Quentin 99a4f51166
Simplify the build 2022-05-06 10:49:28 +02:00
Quentin 653e45f192
Packaging try on Cryptpad 2022-05-06 10:32:41 +02:00
Quentin f0ead6efed
WIP Cryptpad packaging 2022-05-05 17:45:15 +02:00
Quentin f27636dd14
Add headers in Garage 2022-05-05 08:50:33 +02:00
Alex d7164c7d90
remove obsolete admin_port 2022-05-04 17:33:43 +02:00
Alex 5b861cd652
Remove unused Traefik config 2022-05-04 17:28:39 +02:00
Alex 79d68c4aa3
Update tricot 2022-05-04 17:27:54 +02:00
Quentin 4cb1dbe663
Add a security HTTPS header to Garage web 2022-05-04 09:20:07 +02:00
Quentin d21c010da1
Set plume log verbosity to info 2022-04-24 13:45:32 +02:00
Quentin 60ad398c44
Upgrade Plume + debug info 2022-04-23 22:04:14 +02:00
Quentin 2695a79e8a
Add garage backup info 2022-04-23 13:27:52 +02:00
Quentin 1e9a538be9
add concrete examples 2022-04-19 14:41:03 +02:00
Quentin c69923f104
Add missing doc 2022-04-19 14:38:29 +02:00
Quentin d62f87fa71
Update guide 2022-04-19 14:32:44 +02:00
Quentin 501fbb5553
Add doc for secrets 2022-04-19 13:46:12 +02:00
Quentin b2b26879cb replace os.system with subprocess.run 2022-04-15 14:57:54 +02:00
Quentin 83745f737a Deployment on Nomad 2022-04-15 14:24:41 +02:00
Quentin 8cf1b0c3e4 Build image via Nix 2022-04-15 12:36:49 +02:00
Quentin 9701b863fd Create a backup script 2022-04-14 17:50:17 +02:00
Alex 1183583fdf
make adrien admin 2022-04-06 12:17:15 +02:00
Quentin 1e5e4af35c Ajout de Publii dans le postmortem 2022-03-30 10:04:54 +02:00
Quentin ce36e7e09b Ajout coupure élec + SSD lent 2022-03-28 11:59:37 +02:00
Quentin 68607d567c Ajout de matrix 2022-03-28 11:55:25 +02:00
Quentin b5137f6665 Ajout de GlusterFS 2022-03-28 11:51:49 +02:00
Alex 3f73721ad5
documentation de petits incidents techniques plus ou moins évitables 2022-03-28 11:43:47 +02:00
Alex 0e6aa95754
Update Garage to 0.7.0-rc1 2022-03-28 10:59:24 +02:00
Quentin 306974a163 Change Plume restart policy 2022-03-18 11:37:14 +01:00
Quentin 9883d85c2a Small postfix modifications 2022-03-14 10:02:22 +01:00
Quentin a1c6c33d73 Maintenance du 2022-03-09 2022-03-09 16:54:19 +01:00
Quentin 1322dae8da Upgrade Matrix 2022-03-09 11:52:36 +01:00
Quentin e7329a0202 Add zstd 2022-03-09 11:32:43 +01:00
Quentin b359601d2d Documentation for Drone 2022-03-07 11:02:37 +01:00
Alex 8ce62ddca1
Close drone registrations 2022-02-21 14:54:42 +01:00
Alex 0b16fd1c08
Update Garage and change a few config parameters 2022-02-10 14:34:18 +01:00
Alex 41e1a31bb9
fix typo 2022-02-09 16:06:23 +01:00
Alex 1410f2f8d8
Add LX@Orsay to trusted net 2022-02-09 15:53:45 +01:00
Alex f74651a0c3
Upgrade garage to 0.6 RC1 2022-02-01 15:33:33 +01:00
Quentin 5ecab67379 Use a list to organize ref 2022-01-28 19:14:39 +01:00
Quentin f3dbf47547 Ajout de pg_verifybackup 2022-01-28 19:11:58 +01:00
Quentin 37bea48d45 Finalize manual backup 2022-01-28 18:44:07 +01:00
Quentin 89937f2107 Update guide 2022-01-28 17:00:50 +01:00
Quentin 2775eeb0fe WIP manual backup 2022-01-27 18:26:02 +01:00
Quentin 715c3d3a9f Use ampersand in backup instead of semi colon 2022-01-27 16:58:22 +01:00
Quentin 84b26f347d Add consul backup with restic 2022-01-27 16:56:02 +01:00
Quentin 3baa511fce Plume backup + WIP consul 2022-01-27 16:32:57 +01:00
Quentin 00d7106a18 Redeploy plume 2022-01-27 13:31:25 +01:00
Quentin 831ddd3055 Some fixes 2022-01-27 09:57:49 +01:00
Quentin a13a02c45c Add a backup script for emails 2022-01-26 21:48:48 +01:00
Quentin 453b633268 Update guide 2022-01-26 19:31:44 +01:00
Quentin a68a1e1da7 Migrate jitsi + WIP backup doc 2022-01-26 19:09:26 +01:00
Quentin 3563fb5994 Change how email is stored 2022-01-26 17:20:20 +01:00
Quentin 7cede37e6d Mises à jour du cluster 2022-01-25 12:12:58 +01:00
Alex f229d58467
Update tricot and increase RAM allocation 2022-01-11 15:07:33 +01:00
Alex 87986ff3cf
Move out .hcl files specific to Neptune cluster 2021-12-25 19:40:30 +01:00
Alex 85eb4d5b82
Revert garage to 0.5.0 temporarily to fix winscp bug 2021-12-15 11:18:04 +01:00
Alex 59ce079a52
Update tricot 2021-12-14 11:43:18 +01:00
Quentin 582882286e
latest s3 provider version is required 2021-12-14 11:19:09 +01:00
Quentin fa75e0012c
Also upgrade async upload 2021-12-14 11:12:40 +01:00
Quentin e9ba2243e7
Update Matrix 2021-12-14 11:05:41 +01:00
Alex 3df786a5f5
Don't use ipv6 in garage staging cluster 2021-12-13 11:44:27 +01:00
Quentin 50a09980c5 Update jitsi's nomad service 2021-12-12 13:21:49 +01:00
Quentin f73d8dab93 log4shell mitigation 2021-12-12 13:03:45 +01:00
Quentin c00f0fefe7 Update bagage 2021-12-12 12:49:48 +01:00
Alex 2fc9276be2
fixed tricot with compression now 2021-12-10 00:26:51 +01:00
Alex c6819c8d4a
Revert for now 2021-12-09 16:52:16 +01:00
Alex d64fe28143
upgrade tricot to enable compression 2021-12-09 16:14:17 +01:00
Alex 783894b60d
Tricot 19 2021-12-09 12:24:18 +01:00
Alex 854da5b984
Different tricot config for neptune dc 2021-12-09 11:04:56 +01:00
Alex 8d178815d6
Only one frontend 2021-12-09 10:51:58 +01:00
Alex 2d2e7bb5c6
fix tricot 2021-12-08 23:48:08 +01:00
Alex ea55c9b12b
synapse on dummy infrastructure for tricot test 2021-12-08 18:05:17 +01:00
Alex 3693d9f36b
Traefik on all servers 2021-12-08 13:32:47 +01:00
Alex a4982c6cd6
last tricot version 2021-12-08 13:28:22 +01:00
Alex 7f08d5f324
Add tricot tags to everything 2021-12-08 12:42:48 +01:00
Alex 2c2ee6c903
Rename tricot+traefik to frontend 2021-12-08 12:21:50 +01:00
Alex 3297135a58
Add tricot to replace traefik 2021-12-08 12:19:08 +01:00
Alex 8846421cc4
Deploy core on neptune as well 2021-12-08 11:41:07 +01:00
Alex fff6f1db20
garage with new s3_router 2021-12-06 22:10:26 +01:00
Alex ef2fa848f1
single region staging cluster 2021-12-04 21:56:15 +01:00
Alex 4cc6a0182c
Bump synapse to 1.47.1 to fix CVE 2021-11-23 13:48:12 +01:00
Quentin 7113a3ae56 Add secrets 2021-11-20 14:58:09 +01:00
Quentin 5df7058c84 Working SFTP deployment of Garage 2021-11-20 14:56:56 +01:00
Alex 9ce6c7ad6e
Add config files for garage staging cluster 2021-11-18 17:14:30 +01:00
Alex 0268f63f66
Upgrade garage to 0.5 2021-11-17 16:42:13 +01:00
Alex 948a916c2f
Add missing options for discord bridge 2021-11-16 12:57:15 +01:00
Alex 289359cedc
Prepare to add Discord bridge 2021-11-16 12:05:28 +01:00
Alex 627c89b545
make config file clearer 2021-11-15 23:05:01 +01:00
Alex e20b903bc0
Add matterbridge to bridge RFID channel 2021-11-15 17:53:59 +01:00
Alex 489cc492d5
Deploy garage v0.4.0 2021-11-10 14:19:23 +01:00
adrien 779aea8f11 Merge pull request 'ajout machine Spoutnik, lien vers cluster de test dans readme' (#55) from machine/spoutnik into main
Reviewed-on: #55
2021-11-06 19:41:59 +01:00
adrien 76d160f9af ajout machine Spoutnik, lien vers cluster de test dans readme 2021-11-06 19:39:06 +01:00
Alex f362d57965
Update garage to v0.4-rc2 2021-11-05 11:41:16 +01:00
Alex 2734f79c0d
Updated Garage version that eats less RAM under load 2021-11-04 10:55:37 +01:00
Alex b8420756b4
Updated garage definition 2021-11-02 13:48:00 +01:00
Alex 6c90a00f04 Merge pull request 'Migration to garage 0.4' (#53) from garage04 into main
Reviewed-on: #53
2021-10-26 16:17:59 +02:00
Alex 7fc001a92f
Migration to garage 0.4 2021-10-26 16:14:29 +02:00
Quentin c51b654dd6
Add a docker compose for runners 2021-10-19 12:55:51 +02:00
Quentin 6093ec74f2
Drone 2.0.4 -> 2.4.0 2021-10-12 10:21:18 +02:00
Alex 7ee2f8aa2c
Update garage (ListObjects fix) 2021-10-11 13:48:00 +02:00
Quentin 83bd5f2cdd Increase RAM for Plume 2021-09-30 22:23:17 +02:00
Quentin 6d4be5fb83 Migrate to riot web 1.9.0 2021-09-28 22:17:24 +02:00
Alex e8474d52a2
Alps build: add missing plugin directory for html and js files 2021-09-28 17:53:49 +02:00
Quentin 1f15cfa420 Update io parameters 2021-09-28 17:26:27 +02:00
Quentin 5b1f775513 Change IP address 2021-09-28 16:51:58 +02:00
Quentin 39f1e983bf Merge pull request 'os/users: Add kokakiwi (jill) user and keys' (#52) from KokaKiwi/infrastructure:add-jill-keys into main
Reviewed-on: #52
2021-09-28 16:50:37 +02:00
Jill bebd6eaab6
os/users: Add kokakiwi (jill) user and keys
Signed-off-by: Jill <kokakiwi@deuxfleurs.fr>
2021-09-28 15:36:59 +02:00
Quentin 88a7c04cee
media-async-upload must be in the matrix group
note: the group stanza is not mandatory
2021-09-20 09:52:13 +02:00
Quentin 136d176176
Synapse does not use GlusterFS anymore 2021-09-17 18:49:45 +02:00
Quentin 2a0610658d Upgrade synapse+riot web 2021-09-17 18:24:00 +02:00
Quentin 6db8495bbf
Remove fb2nx that never worked 2021-09-17 17:42:16 +02:00
Quentin 4ea2494bd5
Update bottin 2021-09-17 17:41:57 +02:00
Quentin acd46fde80
Remove connection limit dovecot 2021-09-14 17:46:06 +02:00
Quentin 6716687fd7
Finally fix dovecot 2021-09-14 14:02:50 +02:00
Quentin a2a25e2ea4
Use `cn` instead of `mail` to store emails 2021-09-14 11:33:29 +02:00
Quentin e74bda617c
Merge branch 'main' of git.deuxfleurs.fr:Deuxfleurs/infrastructure 2021-09-10 18:33:07 +02:00
Quentin 2dfd006dc5
Upgrade bagage and fix mem leak 2021-09-10 18:32:50 +02:00
Alex 9c4f78619d
Update guichet config: remove useless default groups nextcloud and seafile 2021-09-10 15:32:17 +02:00
Quentin 8fe0a78b0c
Upgrade Bagage 2021-09-03 11:02:22 +02:00
Quentin e66b1c2c54
Upgrade Plume 2021-09-02 15:35:59 +02:00
Quentin d40c41004d Add bagage deployment 2021-08-20 17:39:07 +02:00
Quentin 09269e8497 Merge pull request 'bump diplonat version 2->3' (#39) from bump-diplonat into main
Reviewed-on: #39
2021-08-19 11:43:28 +02:00
darkgallium e26f57c8eb bump diplonat version 2->3 2021-08-19 11:33:36 +02:00
Alex d25f4d18aa
update guichet 2021-08-18 14:17:31 +02:00
Alex b8470be123
Update guichet 2021-08-16 16:45:04 +02:00
Alex 9d5b490fd9
add restart with mode "delay" stance to diplonat 2021-07-26 22:58:51 +02:00
Quentin 9304997d84
Upgrade guichet & postgres 2021-07-22 11:03:36 +02:00
Alex 2f37aaaf76
update drone server to 2.0.4 2021-07-08 11:12:05 +02:00
Alex 69f063e406
Update garage to handle ed25519 keys for TLS 2021-07-08 11:07:45 +02:00
Quentin 8302595f65
Merge branch 'main' of git.deuxfleurs.fr:Deuxfleurs/infrastructure 2021-07-02 17:07:19 +02:00
Quentin 4fdc4a5144
Add pv for psql + upgrade postgres to 13.3 2021-07-02 17:06:58 +02:00
Quentin 2b39a896a7 Postgres can not be run as root 2021-07-02 14:45:59 +02:00
Quentin e97496e09d fix entrypoint 2021-07-02 14:16:33 +02:00
Quentin 2670c8f8f1 libc is needed fos stolon 2021-07-02 14:08:22 +02:00
Quentin 0a6ffcacd2 Merge branch 'main' of git.deuxfleurs.fr:Deuxfleurs/infrastructure into main 2021-07-02 13:11:29 +02:00
Quentin 2d61f1449d Upgrade postgresql 2021-07-02 13:10:49 +02:00
Quentin 80c2f1f701
Merge branch 'main' of git.deuxfleurs.fr:Deuxfleurs/infrastructure 2021-07-01 23:49:08 +02:00
Quentin e640f82eb8
Add 500Mo x3 more RAM to postgres and 2Go less RAM to Matrix 2021-07-01 23:48:11 +02:00
Alex 455e4db784
update guichet 2021-07-01 16:30:21 +02:00
Quentin 576ac2772e
Update config to add more time to pull images 2021-07-01 15:53:41 +02:00
Quentin 1277d94bec
Remove easybridge + increase nomad docker timeout when pulling images 2021-07-01 15:36:54 +02:00
Quentin b9f0f012bd
Update synapse configuration 2021-07-01 14:25:04 +02:00
Quentin 4b68522721
Add locales 2021-07-01 14:23:33 +02:00
Quentin 3c8cd4ca1c
Deactivate guests + expose _synapse api 2021-06-30 16:24:03 +02:00
Quentin 784efbcc9b
Add a restart policy 2021-06-30 12:57:13 +02:00
Quentin 2d30e1a9c7
Log to journald 2021-06-29 13:57:01 +02:00
Quentin 42c020e00b
Fix typo 2021-06-04 21:39:44 +02:00
Quentin 7e82b0d94d Add git 2021-06-04 21:32:45 +02:00
Quentin efcdef7856
Matrix 1.35.1 + S3 backend 2021-06-04 19:48:50 +02:00
Alex 62fa15390b
Update easybridge 2021-06-01 23:44:57 +02:00
Alex a26d41259a
Update garage to v0.3.0 2021-05-28 15:55:52 +02:00
Quentin 73d30b9aa5
Disable syslog as it is not present in the container 2021-05-19 09:44:36 +02:00
Quentin 8c213bc7ba
Update garage 2021-05-19 09:44:17 +02:00
Quentin 1edc5f37a2
Upgrade Matrix configuration 2021-05-19 09:43:45 +02:00
Quentin 4f506422e3 Upgrade matrix 2021-05-18 15:26:41 +02:00
Quentin 3bb2cf9e93 Allow only cipher suites recommended by Mozilla
Check https://ssl-config.mozilla.org/#server=traefik&version=1.7&config=intermediate&guideline=5.6
2021-05-07 20:01:31 +02:00
Alex 1f15d29eab
Update garage to v0.2.1.6 2021-05-04 13:28:04 +02:00
Quentin 6754cfef81 Merge branch 'main' of git.deuxfleurs.fr:Deuxfleurs/infrastructure into main 2021-05-03 19:10:16 +02:00
Quentin 3df53eaa94 Upgrade plume build scripts 2021-05-03 19:09:50 +02:00
Quentin 51b5295ba8 Allow Garage to use 800MB of RAM instead of 500MB 2021-05-03 17:27:06 +02:00
Alex 925639b678
update garage 2021-04-28 01:16:35 +02:00
Quentin 68575d2654
Migrate from Plume from v0.6.0 to v0.7.0RC 2021-04-19 10:50:38 +02:00
Quentin 338a8ec7da
Try to migrate to pg_basebackup 2021-04-17 12:21:13 +02:00
Quentin 3135c38505
Upgrade stolon 2021-04-15 13:05:21 +02:00
Quentin 87303033d1
Debug stolon backup 2021-04-15 12:38:31 +02:00
Quentin 9dfff86cd2
Target a replicated server and not the main one 2021-04-14 19:10:46 +02:00
Quentin b851ca0c95
Update matrix HCL + document stolon conf change 2021-04-14 18:15:45 +02:00
Quentin fae36c7ef6 Upgrade synapse+riot images 2021-04-09 14:11:26 +02:00
Alex 4ecda8cc8d
Updated version of Drone 2021-04-07 14:06:02 +02:00
Alex 2ef1a9df5d
Update garage 2021-04-05 20:48:33 +02:00
Alex 1df83c6064
Add iptables rules allowing new IPv6 2021-04-05 18:28:45 +02:00
Quentin 0b4c61dfe1 Try to optimize Consul 2021-04-04 20:04:25 +02:00
Quentin e979434970 Fix Jitsi's IP address 2021-04-04 19:15:29 +02:00
Quentin 474c4575f4 Rename postgres 2021-04-01 19:04:50 +02:00
Alex 5126868e30 update garage to v0.2.1 2021-03-19 14:00:48 +01:00
Quentin 4ad6376aa8 Document how to repair Traefik/ACME 2021-03-18 10:17:05 +01:00
Alex e197429531 Update bottin; remove drone runner 2021-03-16 14:59:10 +01:00
mricher d67a6c363a
Set prometheus node_exporter version to v1.1.2 2021-03-09 00:15:55 +01:00
Alex 573a86b87c Change resource allocation 2021-03-08 23:01:11 +01:00
Alex c586633613 Add node-exporter for metrics collection 2021-03-08 22:55:55 +01:00
Alex e806e24fea Add SSL certificates in ALPS image 2021-03-08 17:49:22 +01:00
Alex a84f4c8f87 Use patched Alps from git.deuxfleurs.fr/Deuxfleurs/alps 2021-03-08 17:32:05 +01:00
Alex b42e42faaa Improve resource allocation 2021-03-08 16:34:41 +01:00
Quentin d6bdfbed5f Expose prometheus metrics on Consul 2021-03-07 21:36:27 +01:00
Quentin 255e3fd2d7 Debug stolon proxy 2021-03-07 18:29:56 +01:00
Quentin eb3f64df41 Merge branch 'master' of git.deuxfleurs.fr:Deuxfleurs/infrastructure 2021-03-07 17:07:52 +01:00
Quentin 35ddbd9f20 Upgrade Stolon 2021-03-07 17:07:35 +01:00
Quentin 4f296808e8 Refactor stolon Dockerfile 2021-03-07 12:54:03 +01:00
Quentin 4d7470b2fd Draft stolon update 2021-03-07 12:18:08 +01:00
Quentin b608567648 Add a new parameter to stolon 2021-03-07 11:43:46 +01:00
Quentin a69efd9b31 Add gzip compression 2021-03-06 21:43:55 +01:00
Quentin 96f2978a7f Change target image 2021-03-06 20:09:16 +01:00
Quentin 224c0a23a3 Increment image 2021-03-06 20:08:17 +01:00
Quentin c0d86cb0a1 Mount backup directory + export PGPASSWORD 2021-03-06 20:06:57 +01:00
Quentin d1a4ed0f79 Matrix backup draft 2021-03-06 19:52:13 +01:00
Quentin 27963ca089 Upgraded matrix/element to 1.28.0/1.7.22 2021-03-05 17:44:05 +01:00
Quentin 1c5b1f2e5b Upgrade matrix image 2021-03-05 17:40:40 +01:00
Alex fada3f6ed1 Don't always restart stolon keeper if it is failed (let stolon do its job) 2021-02-24 14:54:18 +01:00
Alex 987cefeba0 bump garage 2021-02-24 14:54:10 +01:00
Alex 71971143c4 Fix drone DB (why did it work before???) 2021-02-24 14:53:58 +01:00
Alex 89133ddbea Change l'adresse d'expéditeur pour les invites 2021-02-18 14:02:18 +01:00
Quentin 59623243c8 Deactivate test endpoint 2021-02-11 11:57:23 +01:00
Quentin 2958fbae1b Port nginx's configuration from integration to deployment 2021-02-11 11:56:30 +01:00
Quentin c2d3c543b9 Jitsi add missing mimetypes 2021-02-11 11:54:06 +01:00
Alex 9c2232cebc Add Drone CI 2021-02-08 14:52:13 +01:00
Quentin 9c060b3c28 Add tools 2021-02-01 19:56:16 +01:00
Quentin b6b812c011 Upgrade jitsi nginx conf to make ADRN happy! 2021-02-01 18:19:43 +01:00
Quentin 5fb05f0b7e Add CORS for our load testing frontend 2021-02-01 12:42:29 +01:00
Quentin 5babe6fad1 Fix port binding 2021-02-01 11:22:16 +01:00
Quentin 34c5544ef5 Fix prosody listening 2021-02-01 11:06:45 +01:00
Quentin 847540f7b7 Add trimSpace to secrets to prevent a parsing bug 2021-02-01 10:29:13 +01:00
Quentin 9337129336 Fix typos in the service file 2021-02-01 10:26:26 +01:00
Quentin 088c9df20c Prepare Nomad deployment 2021-02-01 09:50:38 +01:00
Quentin 0a87d26e47 Polish configuration 2021-02-01 08:40:59 +01:00
Quentin cb69a1123c Stabilize build scripts 2021-02-01 07:48:50 +01:00
Quentin c2960f75b7 Add curl to the dockerfile 2021-01-31 18:17:37 +01:00
Quentin 56cf9c1e55 Videobridge doc + debug 2021-01-31 18:03:55 +01:00
Quentin a3f62d1f30 Overide logging + some doc to debug java processes 2021-01-31 15:47:01 +01:00
Quentin 09e1e641a7 Working on meet frontend 2021-01-30 12:06:14 +01:00
Quentin 9ea066d6df Only old configuration can be used for ice4 harvester 2021-01-29 19:22:16 +01:00
Quentin 59ca97e2a9 Migrate JVB to the new packaging 2021-01-29 18:59:19 +01:00
Quentin 83d8668a59 Jicofo might work as intended! 2021-01-29 17:47:09 +01:00
Quentin 952d7c0510 Improve jitsi config 2021-01-29 17:30:43 +01:00
Quentin 7bdea77811 WIP debugging jitsi 2021-01-29 17:17:28 +01:00
Quentin cee95ad061 Merge pull request 'Upgrade Synapse & Element-web, réécriture de l'OP guide, et ajout du secret turn.zinz.dev' (#33) from adrien/infrastructure:master into master
Reviewed-on: #33
2021-01-29 15:53:37 +01:00
LUXEY Adrien 24dcc09695 Upgraded Synapse and Element-web on cluster's nomad, and the OP guide 2021-01-29 12:11:43 +01:00
LUXEY Adrien d286da23d8 pushed Synapse and Element-web to latest version, and rewrote the OP guide a bit 2021-01-29 11:53:03 +01:00
LUXEY Adrien 9a263b762b Merge branch 'master' of git.deuxfleurs.fr:Deuxfleurs/infrastructure 2021-01-29 10:57:42 +01:00
LUXEY Adrien 8f0cb24246 added zinz.dev static auth secret declaration 2021-01-29 10:56:42 +01:00
Quentin 982efd1b49 Still so broken... 2021-01-28 23:02:37 +01:00
Quentin 5b53cf1673 Trying to switch on a development version 2021-01-28 21:47:35 +01:00
Quentin 47bcdaaf0d Rework prosody's configuration 2021-01-28 21:05:10 +01:00
Quentin 0e848bb2d0 Polished prosody 2021-01-28 19:28:15 +01:00
Quentin 4809e27220 WIP integration jitsi 2021-01-28 18:55:56 +01:00
Quentin 7b57ff72a9 Simplify prosody too 2021-01-28 17:52:41 +01:00
Quentin ebb772e5ba Fix ansible inventory + Fix jicofo's hocon conf + fix jicofo's dockerfile 2021-01-28 17:02:10 +01:00
Quentin 07765e8456 Add resources 2021-01-21 10:11:43 +01:00
Quentin 6adb551db4 More info in README 2021-01-20 16:02:58 +01:00
Quentin 3e7dc8b49d Fix conf links 2021-01-20 15:54:17 +01:00
Quentin 031f31e91e WIP modernize jitsi conf 2021-01-20 15:44:42 +01:00
Quentin 5dfca7a713 fix naming 2021-01-20 12:53:23 +01:00
Quentin bd9c854a12 change port due to a strange bug 2021-01-20 11:35:54 +01:00
Quentin d3a3867180 Public IP changed 2021-01-20 10:51:25 +01:00
Quentin b879be2156 Enrichir le postmortem 2021-01-20 10:49:29 +01:00
Quentin 46dce5d917 fix indent postmortem 2021-01-20 10:34:53 +01:00
Quentin 6b91db048d Ajout du postmortem 2021-01-20 10:34:16 +01:00
Quentin 8eaa7914d0 Merge branch 'master' of git.deuxfleurs.fr:Deuxfleurs/infrastructure 2021-01-20 10:21:42 +01:00
Quentin 2a0e9720b7 React to Free changing my IP address 2021-01-20 10:21:18 +01:00
Alex 2e25e150d4 Merge pull request 'secretmgr retourne une erreur bien formatée face à un fichier vide' (#32) from adrien/infrastructure:master into master
Reviewed-on: #32
2021-01-19 18:48:31 +01:00
Alex a2eec38de4 Add a few missing secrets 2021-01-19 18:02:00 +01:00
Alex 1c814f002a Add CMD_ONCE secret type and fill in/change secret definitions 2021-01-19 17:53:53 +01:00
Alex 9560f80852 mention secretmgr.py in create_database 2021-01-19 17:29:37 +01:00
Alex a847a9683f Cleanup op_guide folder 2021-01-19 17:27:32 +01:00
LUXEY Adrien 6e1940061a coturn retourne une erreur bien formatée face à un fichier vide (il pourrait renvoyer autre chose), plus bug nom de variable 2021-01-19 17:16:58 +01:00
Quentin af2b8b06ba Merge pull request 'master' (#30) from adrien/infrastructure:master into master
Reviewed-on: #30
2021-01-19 15:49:11 +01:00
LUXEY Adrien 98280c8628 updated READMEs 2021-01-19 15:21:23 +01:00
LUXEY Adrien 2a346f5430 coquille 2021-01-19 14:40:14 +01:00
LUXEY Adrien 65421d947e merge from upstream 2021-01-19 14:33:44 +01:00
Quentin eb925049ac Remove web_static 2021-01-19 13:47:50 +01:00
Quentin 0be20b22a6 Upgrade garage description 2021-01-18 16:51:06 +01:00
Quentin 7e637a070c Add guichet in our readme
Signed-off-by: Quentin Dufour <quentin@deuxfleurs.fr>
2021-01-18 16:49:46 +01:00
Quentin 2c2efdc276 Merge branch 'master' of git.deuxfleurs.fr:Deuxfleurs/infrastructure 2021-01-18 16:46:21 +01:00
Quentin 6c8c861dd5 Update README 2021-01-18 16:46:08 +01:00
Quentin ad6017eea0 Merge pull request 'Reorganize app/ and add script for secret management' (#29) from test_reorganize into master
Reviewed-on: #29
2021-01-18 08:18:21 +01:00
Quentin c642370def Add hierarchy to the README 2021-01-18 08:08:48 +01:00
Quentin cffd902815 Add some documentation + add a requirements file 2021-01-18 08:06:19 +01:00
Quentin 79b7273ff2 Remove my blog 2021-01-18 06:51:19 +01:00
Alex 850ccbf1c7 secretmgr.py does quite a few things! 2021-01-16 20:03:00 +01:00
Alex d4d0b100ad Document secrets and add stub utility to manage them 2021-01-16 17:37:34 +01:00
Alex c74dc92feb Proposal: reorganize app/ folder by modules 2021-01-16 17:07:01 +01:00
Alex 0c4ee40e01 Update garage 2021-01-16 16:21:25 +01:00
Alex a6b23f5713 upgrade garage to 0.1.1 2021-01-15 19:34:33 +01:00
Quentin 52c141e5fc Update Riot+Matrix 2021-01-13 19:17:28 +01:00
Quentin 464b990e19 Upgrade jitsi 2021-01-13 14:42:14 +01:00
Quentin 969ee58b7d WIP nextcloud tests 2021-01-07 21:37:29 +01:00
Quentin 4456fb56c1 Upgrade nomad+consul 2021-01-07 21:36:47 +01:00
Quentin ba3d84a1de Upgrade plume 2021-01-07 11:09:29 +01:00
LUXEY Adrien a5a56b6f70 wrote a redirection to deuxfleurs.fr in Treafik config's comments 2020-12-28 12:04:08 +01:00
Quentin 7508a10a71 WIP redirect regex 2020-12-28 11:55:29 +01:00
Quentin c4c4d6f8a6 Fix URL 2020-12-28 11:05:05 +01:00
Quentin fc518df1c1 Migrate Traefik 2020-12-28 11:02:33 +01:00
Quentin a2f8e11d06 Migrate plume+diagnet+web_static 2020-12-28 10:49:09 +01:00
Quentin 48db0185a4 Migrate postgres 2020-12-25 12:16:18 +01:00
Quentin 4f23adfbb9 Migrated plume 2020-12-25 11:48:52 +01:00
Quentin 1624b348df Migrate platoo 2020-12-25 11:21:41 +01:00
Quentin 8625a9af75 Upgrade seafile + discard unused services 2020-12-25 11:16:11 +01:00
Quentin f75497af11 Fix service addressing 2020-12-24 10:01:42 +01:00
Quentin 6913655316 We do not use pithos 2020-12-23 19:42:30 +01:00
Quentin 80dc6ec803 Migrate jitsi 2020-12-23 15:55:17 +01:00
Quentin 9117616f02 Migrate Synapse + Email hack
Nomad seemed to dislike the 'auth_port' label, replaced by 'zauthentication_port'
2020-12-22 18:24:33 +01:00
Quentin b29028405d Migrate Garage 2020-12-22 17:48:27 +01:00
Quentin 9f6f0fb53c Migrate Nomad job for emails 2020-12-22 16:40:36 +01:00
Quentin a2adaa2101 Migrate directory to new Nomad syntax 2020-12-22 14:52:49 +01:00
Quentin bb5a82b056 Fix seafile 2020-12-22 14:40:04 +01:00
Quentin e628dc44ba Migrate seafile 2020-12-22 14:31:42 +01:00
Quentin 846449b238 Migrate Nextcloud to Nomad 1.0.1 2020-12-22 10:46:26 +01:00
Quentin b6ccf06d8a Set priorities 2020-12-18 10:32:44 +01:00
Quentin 685bc45802 Activate pg_rewind on stolon 2020-12-18 10:23:45 +01:00
Quentin 55f93cc5ad First step to integrate io to the cluster 2020-12-16 19:14:45 +01:00
Quentin 41e33f40ad Merge pull request 'Add traefik v1 prometheus metrics configuration' (#27) from feature/enable-traefik-metrics into master
Reviewed-on: #27
2020-12-14 17:08:34 +01:00
mricher 94ee5d3e5c
Remove traefik v2 options and fix endpoint to admin 2020-12-14 17:07:44 +01:00
mricher 91ffdc732c
Add traefik v1 prometheus metrics configuration 2020-12-14 00:19:01 +01:00
Quentin 3ff113ceab Merge pull request 'Upgraded to Synapse v1.24.0' (#26) from adrien/infrastructure:master into master
Reviewed-on: #26
2020-12-11 11:00:38 +01:00
LUXEY Adrien bcb3964417 Nomad config for synapse v1.24.0 2020-12-10 09:32:16 +01:00
LUXEY Adrien ad064dddbc Merge branch 'master' of git.deuxfleurs.fr:Deuxfleurs/infrastructure 2020-12-10 09:09:34 +01:00
LUXEY Adrien 2b3df5b6ee upped synapse to v1.24.0 2020-12-10 09:09:17 +01:00
Quentin 9c947a458f Merge branch 'feature/alps' into master 2020-12-04 13:54:02 +01:00
Quentin e370380a3f Alps is now deployed 2020-12-04 13:53:30 +01:00
Quentin d1332a2d42 Add alps container 2020-12-04 13:42:20 +01:00
Quentin 6402119511 Set Jitsi videobridge max memory 2020-12-02 12:28:19 +01:00
Quentin 365849760d Upgrade Nomad and expose telemetry 2020-11-30 08:31:17 +01:00
adrien de3e21101d Merge pull request 'Pushed synapse version to 1.23.0 and riotweb to 1.7.14, incl. nomad deployment' (#25) from adrien/infrastructure:master into master
Reviewed-on: #25
2020-11-29 23:19:44 +01:00
LUXEY Adrien da1d381068 pushed synapse to 1.23.0 and riotweb to 1.7.14 and deployed through nomad 2020-11-29 23:13:17 +01:00
LUXEY Adrien fd38cbf744 pushed synapse to 1.23.0 and riotweb to 1.7.14 2020-11-29 22:51:38 +01:00
Quentin d241948034 Add missing dovecot conf files 2020-11-27 14:41:57 +01:00
Quentin e2bb0e1b4e Fix tab again 2020-11-22 13:02:14 +01:00
Quentin cfab2346cf Another another try 2020-11-22 13:01:05 +01:00
Quentin f544c202be Another try? 2020-11-22 13:00:42 +01:00
Quentin 804078b3f4 Try to fix lists 2020-11-22 13:00:15 +01:00
Quentin 9f41d95dcf New line 2020-11-22 12:59:52 +01:00
Quentin 33f769c747 A guide to update Matrix 2020-11-22 12:59:07 +01:00
Quentin c19cadf353 Fix sogo conf to match RAM usage
To do the math:
SoGo SxVMemLimit * SoGo WOWorkersCount < Nomad Memory Limit
Before we had 384 * 10 >>> 1000
Now we have 300 * 3 < 1000
2020-11-22 12:40:51 +01:00
Alex 1bb9c7ce19 Add timestamp to backup 2020-11-15 20:14:19 +01:00
Alex f931dd939c Add cryptography to consul backup 2020-11-15 19:43:33 +01:00
Alex e2a0c40e6b Script to backup Consul KV store 2020-11-15 19:27:57 +01:00
Alex 2051a21662 Bump bottin 2020-11-13 13:02:22 +01:00
Quentin f14777e1b6 Merge pull request 'ansible-users' (#23) from ansible-users into master
Reviewed-on: Deuxfleurs/deuxfleurs.fr#23
2020-11-13 12:37:10 +01:00
Alex 7e111783fe Add LX key3 2020-11-13 12:34:07 +01:00
Alex e1f171e19c use ansible_become instead of ansible_user: root 2020-11-13 12:33:23 +01:00
Quentin 9981ea0286 Fix memory 2020-11-03 21:12:01 +01:00
Quentin 0191926455 Seafile fails with OOM when trying to synchronize a 2GB folder 2020-11-03 19:42:08 +01:00
Quentin 2452e87509 Migrate synapse to 1.22.1 2020-10-30 19:16:23 +01:00
Quentin bf58bd2a2c Some Seafile wizardry to bypass ipv4 only limitations 2020-10-28 22:57:41 +01:00
Quentin ed3ed5e2e4 Add max prefix 2020-10-28 17:55:03 +01:00
Quentin c32bd6df1d Add some doc 2020-10-28 17:07:55 +01:00
Quentin 03680a992b Switch Matrix+Plume to IPv6, Add Trusted Net to ip6tables 2020-10-28 16:55:11 +01:00
Quentin aba3ba723c Nomad now speaks IPv6 2020-10-28 15:53:22 +01:00
Quentin f9013d9ca5 Fix seafdav 2020-10-28 15:14:29 +01:00
Quentin 9fef7ae777 Port seafile 2020-10-28 15:09:51 +01:00
Quentin e74737e6e3 mariadb migrated to host 2020-10-28 14:50:22 +01:00
Quentin 1f53e2061e backport a hack to enable jitsi 2020-10-28 14:41:19 +01:00
Quentin d8d0d74920 rework jitsi service 2020-10-28 14:12:15 +01:00
Quentin 2ef6ab1881 Simplify configuration 2020-10-28 12:08:23 +01:00
Quentin f4a88fa565 Docker does not use IPv6, switching to "network=host" 2020-10-27 23:25:30 +01:00
Quentin 2557793cee switch consul to ipv6 2020-10-27 22:39:00 +01:00
Quentin bf9a9128b8 Disable IPv6 Router Advertisement (RA) as it provision an additional IP address that we do not want to use and breaks things 2020-10-27 21:52:46 +01:00
Quentin 5902805ac9 Reintroduce resolv.conf, it is needed + change DNS from FDN (broken) to Free 2020-10-22 20:22:57 +02:00
Quentin e465d65a27 This file is not needed anymore 2020-10-22 18:57:25 +02:00
Quentin 3b75213d40 We now have IPv6 activated on our network interfaces! 2020-10-22 18:55:29 +02:00
Quentin b53b71f750 Fix some bugs 2020-10-22 18:29:37 +02:00
Quentin 6858f17766 Rework Ansible to support ipv6 2020-10-22 17:57:02 +02:00
Quentin 5c31fbf0b1 Add plume config template 2020-10-19 20:29:15 +02:00
Quentin 3ef7b6775b Plume loves LDAP now 2020-10-19 20:27:54 +02:00
Quentin e4c15e9d71 Plume integration is working 2020-10-19 20:07:15 +02:00
Quentin 6b667af32b Remove unrelated content 2020-10-19 12:02:50 +02:00
Quentin 4af75bd8b8 WIP plume 2020-10-15 21:20:11 +02:00
Quentin 25ec221248 WIP plume container 2020-10-14 21:27:43 +02:00
Quentin fcbb788de6 Readd Florian 2020-10-14 18:27:20 +02:00
Quentin 948e4fb94e Upgrade chat 2020-10-13 11:59:02 +02:00
Alex 8fb283d502 upgrade easybridge 2020-10-10 00:03:51 +02:00
Alex cc57e0b353 Bump easybridge version 2020-10-04 21:31:58 +02:00
Quentin c5eee91b12 WIP plume dockerfile 2020-10-01 15:25:04 +02:00
Quentin 3afe80b158 Upgrade synapse 1.20.0 2020-09-23 11:25:59 +02:00
Quentin 9460862c18 Add guide 2020-09-22 11:50:03 +02:00
Quentin 6467a5ab31 Merge branch 'master' of git.deuxfleurs.fr:Deuxfleurs/deuxfleurs.fr 2020-09-21 16:30:23 +02:00
Quentin 9e4e2f7b99 Add plume 2020-09-21 16:29:49 +02:00
Quentin f8682668c2 Upgrade Element Web to new config.json
- Display deuxfleurs.fr and not im.deuxfleurs.fr on login screen
  - Remove broken welcome page on login
  - Set our jitsi instance
  - Add more servers in the room discovery page
2020-09-18 19:55:48 +02:00
Quentin 09fc30214d Upgrade synapse as proposed 2020-09-16 15:52:19 +02:00
Quentin e9bc6fe7f1 Merge pull request 'ajout de adrien dans la config de l'os' (#20) from ajout-adrien into master
Reviewed-on: Deuxfleurs/deuxfleurs.fr#20
2020-09-14 23:20:47 +02:00
Adrien 6b1a7127ce ajout de moi-meme dans la config de l'os 2020-09-14 23:12:54 +02:00
Quentin 484c3fe667 Merge branch 'feature/rebase' 2020-09-13 12:03:07 +02:00
Quentin d5bfc38fe8 Final step for jitsi 2020-09-13 12:00:48 +02:00
Quentin d76d82fccb Use jre headless for more leightweight images 2020-09-13 09:48:04 +00:00
Quentin a1be6b31ed Increment once to be sure 2020-09-13 11:47:07 +02:00
Quentin da034dabfc Finally it seems to work 2020-09-13 11:46:14 +02:00
Quentin 744fa8b8c9 Merge branch 'feature/rebase' of git.deuxfleurs.fr:Deuxfleurs/deuxfleurs.fr into feature/rebase 2020-09-12 23:18:20 +02:00
Quentin c40095d02c WIP jitsi 2020-09-12 23:18:02 +02:00
Quentin 7951d35035 WIP jitsi fix 2020-09-12 21:04:25 +00:00
Quentin 1af6eabc81 Fix videobridge 2020-09-12 22:18:30 +02:00
Quentin 51e4af08c0 Reformat markdown 2020-09-12 20:18:41 +02:00
Quentin a23e08ce20 Refactor 2 2020-09-12 20:17:07 +02:00
Quentin fb4ffbc7fa Fix broken Jitsi... 2020-09-12 18:01:34 +00:00
Quentin b00fc0eaf1 Use a more recent npm 2020-09-12 12:21:30 +02:00
Quentin 0c05730a5d Rationalize container building 2020-09-12 11:27:32 +02:00
Quentin 5337be94df Better handle jitsi versions 2020-09-12 11:15:07 +02:00
Quentin c4a6cf1534 Rebase first step 2020-09-12 10:03:48 +02:00
Quentin 0550647b93 Updated natrix 2020-09-07 14:31:05 +02:00
Quentin 30fe6d2e3c Final sogo upgrade 2020-08-20 10:39:10 +02:00
Quentin 72b84fbe18 upgrade matrix + wip sogo 2020-08-20 10:01:44 +02:00
Quentin bdff5571f1 Merge branch 'master' of git.deuxfleurs.fr:Deuxfleurs/deuxfleurs.fr 2020-07-16 09:04:56 +02:00
Quentin c29d660700 Migrate matrix+riot 2020-07-16 09:04:32 +02:00
381 changed files with 7624 additions and 4154 deletions

5
.gitmodules vendored
View File

@ -1,6 +1,3 @@
[submodule "docker/static/goStatic"]
path = docker/static/goStatic
path = app/build/static/goStatic
url = https://github.com/PierreZ/goStatic
[submodule "docker/blog/quentin.dufour.io"]
path = docker/blog-quentin/quentin.dufour.io
url = git@gitlab.com:superboum/quentin.dufour.io.git

View File

@ -1,76 +1,21 @@
deuxfleurs.fr
=============
*Many things are still missing here, including a proper documentation. Please stay nice, it is a volunter project. Feel free to open pull/merge requests to improve it. Thanks.*
**OBSOLETION NOTICE:** We are progressively migrating our stack to NixOS, to replace Ansible. Most of the files present in this repository are outdated or obsolete,
the current code for our infrastructure is at: <https://git.deuxfleurs.fr/Deuxfleurs/nixcfg>.
## Our abstraction stack
## I am lost, how this repo works?
We try to build a generic abstraction stack between our different resources (CPU, RAM, disk, etc.) and our services (Chat, Storage, etc.):
To ease the development, we make the choice of a fully integrated environment
* ansible (physical node conf)
* nomad (schedule containers)
* consul (distributed key value store / lock / service discovery)
* glusterfs (file storage)
* stolon + postgresql (distributed relational database)
* docker (container tool)
* bottin (LDAP server, auth)
1. `os` the base os for the cluster
1. `build`: where you will build our OS image based on Debian that you will install on your server
2. `config`: our Ansible recipes to configure and update your freshly installed server
2. `apps` apps we deploy on the cluster
1. `build`: our Docker files to build immutable images of our applications
2. `integration`: Our Docker compose files to test locally how our built images interact together
3. `config`: Files containing application configurations to be deployed on Consul Key Value Store
4. `deployment`: Files containing application definitions to be deployed on Nomad Scheduler
3. `op_guide`: Guides to explain you operations you can do cluster wide (like configuring postgres)
Some services we provide:
* Chat (Matrix/Riot)
* Email (Postfix/Dovecot/Sogo)
* Storage (Seafile)
As a generic abstraction is provided, deploying new services should be easy.
## Start hacking
### Clone the repository
```
git clone https://gitlab.com/superboum/deuxfleurs.fr.git
git submodule init
git submodule update
```
### Deploying/Updating new services is done from your machine
*The following instructions are provided for ops that already have access to the servers.*
Deploy Nomad on your machine:
```bash
export NOMAD_VER=0.9.1
wget https://releases.hashicorp.com/nomad/${NOMAD_VER}/nomad_${NOMAD_VER}_linux_amd64.zip
unzip nomad_${NOMAD_VER}_linux_amd64.zip
sudo mv nomad /usr/local/bin
rm nomad_${NOMAD_VER}_linux_amd64.zip
```
Deploy Consul on your machine:
```bash
export CONSUL_VER=1.5.1
wget https://releases.hashicorp.com/consul/${CONSUL_VER}/consul_${CONSUL_VER}_linux_amd64.zip
unzip consul_${CONSUL_VER}_linux_amd64.zip
sudo mv consul /usr/local/bin
rm consul_${CONSUL_VER}_linux_amd64.zip
```
Create an alias (and put it in your `.bashrc`) to bind APIs on your machine:
```
alias bind_df="ssh \
-p110 \
-N \
-L 4646:127.0.0.1:4646 \
-L 8500:127.0.0.1:8500 \
-L 8082:traefik.service.2.cluster.deuxfleurs.fr:8082 \
<a server from the cluster>"
```
and run:
```
bind_df
```

View File

@ -1,5 +0,0 @@
*.aux
*.fdb_latexmk
*.fls
*.log
*.pdf

View File

@ -1,68 +0,0 @@
\documentclass[a4paper,DIV=12]{scrartcl}
\usepackage[french]{babel}
% On abuse komafont pour réduire la place prise par le titre
\addtokomafont{title}{\vspace*{-3em}}
\addtokomafont{author}{\vspace*{-1em}}
\addtokomafont{date}{\vspace*{-0.5em}}
% On ajoute "Article" devant les sections
\renewcommand\sectionformat{Article\enskip\thesection~:\hspace{1em}}
% On réduit la taille des sections
\addtokomafont{section}{\large}
% On rajoute un peu d'espace entre les paragraphes
\setlength{\parskip}{.8em}
% On enlève de la place après les titres
% (je n'ai pas pu utiliser le paquet dédié titlesec car il cause plein d'erreurs)
%\titlespacing\section{1pt}{*4}{*1.5}
\let\oldsection\section
\renewcommand{\section}[1]{\oldsection{#1}\vspace{-1em}}
\title{Procès-verbal de lassemblée générale constitutive de l'association Deuxfleurs}
\date{13 janvier 2020}
\author{Association Deuxfleurs\\10A Allée de Lanvaux, 35700 Rennes}
\begin{document}
\maketitle
Le 13 janvier 2020 à 19 heures, les fondateurs de lassociation Deuxfleurs se sont réunis en assemblée générale constitutive au 24 rue des Tanneurs à Rennes. Sont présents Adrien, Alex, Anaïs, Axelle, Louison, Maximilien, Quentin, Rémi et Vincent.
Lassemblée générale désigne Adrien Luxey en qualité de président de séance et Quentin Dufour en qualité de secrétaire de séance.
Le président de séance met à la disposition des présents le projet de statuts de lassociation et létat des actes passés pour le compte de lassociation en formation.
Puis il rappelle que lassemblée générale constitutive est appelée à statuer sur lordre du jour suivant :
\begin{itemize}
\item présentation du projet de constitution de lassociation ;
\item présentation du projet de statuts ;
\item adoption des statuts ;
\item désignation des premiers membres du conseil ;
\item pouvoirs en vue des formalités de déclaration et publication.
\end{itemize}
Enfin, le président de séance expose les motifs du projet de création de lassociation et commente le projet de statuts.
Il ouvre la discussion. Un débat sinstaure entre les membres de lassemblée.
Après quoi, personne ne demandant plus la parole, le président met successivement aux voix les délibérations suivantes.
\paragraph{1\iere~délibération} Lassemblée générale adopte les statuts dont le projet lui a été soumis.
Cette délibération est adoptée à lunanimité.
\paragraph{2\ieme~délibération} Lassemblée générale constitutive désigne en qualité de premiers membres du conseil d'administration :
\begin{itemize}
\item Adrien Luxey
\item Alex Auvolat
\item Maximilien Richer
\item Quentin Dufour
\item Vincent Giraud
\end{itemize}
Conformément aux statuts, cette désignation est faite pour une durée expirant lors de lassemblée générale qui sera appelée à statuer sur les comptes de lexercice clos le 13 janvier 2021.
Les membres du conseil ainsi désignés acceptent leurs fonctions
Nom, prénom et signature du président et du secrétaire de séance
\end{document}

View File

@ -1,104 +0,0 @@
\documentclass[a4paper,DIV=12]{scrartcl}
\usepackage[frenchb]{babel}
% On abuse komafont pour réduire la place prise par le titre
\addtokomafont{title}{\vspace*{-3em}}
\addtokomafont{author}{\vspace*{-1em}}
\addtokomafont{date}{\vspace*{-2em}}
% On ajoute "Article" devant les sections
\renewcommand\sectionformat{Article\enskip\thesection~:\hspace{1em}}
% On réduit la taille des sections
\addtokomafont{section}{\large}
% On rajoute un peu d'espace entre les paragraphes
\setlength{\parskip}{.8em}
% On enlève de la place après les titres
% (je n'ai pas pu utiliser le paquet dédié titlesec car il cause plein d'erreurs)
%\titlespacing\section{1pt}{*4}{*1.5}
\let\oldsection\section
\renewcommand{\section}[1]{\oldsection{#1}\vspace{-1em}}
\title{Statuts de l'association Deuxfleurs}
\date{13 janvier 2020}
\begin{document}
\maketitle
\section{Constitution et dénomination}
Il est fondé entre les adhérents aux présents statuts une association régie par la loi 1901, ayant pour titre Deuxfleurs.
\section{Buts}
Cette association a pour but de défendre et promouvoir les libertés individuelles et collectives à travers la mise en place d'infrastuctures numériques libres.
\section{Siège social}
Le siège social est fixé au 10A, Allée de Lanvaux, 35700 Rennes.
Il pourra être transféré suite à un vote par l'assemblée générale.
\section{Durée de l'association}
L'association perdure tant qu'elle possède au moins un membre, ou jusqu'à sa dissolution décidée en assemblée générale.
\section{Admission et adhésion}\label{article:admission}
Pour faire partie de l'association, il faut être coopté par un membre de l'association, adhérer aux présents statuts et s'acquitter de la cotisation annuelle dont le montant est de 10 euros.
\section{Composition de l'association}
L'association se compose exclusivement de membres admis selon les dispositions de l'article~\ref{article:admission} et à jour de leur cotisation.
Tout membre actif possède une voix lors des votes en assemblée générale.
Est considéré actif tout membre présent à l'assemblée générale (physiquement, par visioconférence ou par procuration écrite donnée à un autre membre de l'association).
\section{Perte de la qualité de membre}
La qualité de membre se perd par :
\begin{itemize}
\item la démission,
\item le non-renouvelement de la cotisation dans un délai de deux mois après le 1er Janvier de l'année courante,
\item le décès,
\item la radiation prononcée aux deux tiers des votes exprimés, lors d'un vote extraordinaire ou de l'assemblée générale.
\end{itemize}
\section{L'assemblée générale}\label{article:ag}
L'assemblée générale ordinaire se réunit au moins une fois par an, convoquée par le conseil d'administration.
Lassemblée générale extraordinaire est convoquée par le conseil dadministration, à la demande de celui-ci ou à la demande du quart au moins des membres de l'association.
L'assemblée générale (ordinaire ou extraordinaire) comprend tous les membres de l'association à jour de leur cotisation.
Quinze jours au moins avant la date fixée, les membres de l'association sont convoqués via la liste de diffusion de l'association et l'ordre du jour est inscrit sur les convocations.
Le conseil dadministration anime lassemblée générale.
Lassemblée générale, après avoir délibéré, se prononce sur le rapport moral et/ou d'activités.
Le conseil dadministration rend compte de l'exercice financier clos et soumet le bilan de lexercice clos à lapprobation de lassemblée dans un délai de six mois après la clôture des comptes.
Lassemblée générale délibère sur les orientations à venir et se prononce sur le budget prévisionnel de lannée en cours.
Elle pourvoit, au scrutin secret, à la nomination ou au renouvellement des membres du conseil d'administration via un scrutin de Condorcet Randomisé.
Elle fixe le montant de la cotisation annuelle.
Les décisions de l'assemblée sont prises à la majorité des membres présents ou représentés.
Chaque membre présent ne peut détenir plus d'une procuration.
\section{Membres mineurs}
Les mineurs peuvent adhérer à lassociation sous réserve dun accord tacite ou dune autorisation écrite de leurs parents ou tuteurs légaux.
Ils sont membres à part entière de lassociation.
Seuls les membres âgés de 16 ans au moins au jour dune élection sont autorisés à y voter, notamment au cours d'une assemblée générale.
Pour les autres, leur droit de vote est transmis à leur représentant légal.
\section{Le conseil d'administration}
L'association est administrée par un conseil d'administration composé de 3 à 6 membres, élus pour 1 an dans les conditions fixées à larticle~\ref{article:ag}.
Tous les membres de lassociation à jour de leur cotisation sont éligibles.
En cas de vacance de poste, le conseil d'administration peut pourvoir provisoirement au remplacement de ses membres. Ce remplacement est obligatoire quand le conseil d'administration compte moins de 3 membres.
Il est procédé à leur remplacement définitif à la plus prochaine assemblée générale.
Les pouvoirs des membres ainsi élus prennent fin à l'époque où devrait normalement expirer le mandat des membres remplacés.
Le conseil dadministration met en œuvre les décisions de lassemblée générale, organise et anime la vie de lassociation, dans le cadre fixé par les statuts.
Chacun de ses membres peut être habilité par le conseil à remplir toutes les formalités de déclaration et de publication prescrites par la législation et tout autre acte nécessaire au fonctionnement de lassociation et décidé par le conseil dadministration.
Tous les membres du conseil dadministration sont responsables des engagements contractés par lassociation.
Tout contrat ou convention passé entre lassociation d'une part, et un membre du conseil d'administration, son conjoint ou un proche, d'autre part, est soumis pour autorisation au conseil d'administration et présenté pour information à la plus prochaine assemblée générale.
Le conseil dadministration se réunit au moins 4 fois par an et toutes les fois qu'il est convoqué par le tiers de ses membres.
La présence de la moitié au moins des membres du conseil est nécessaire pour que le conseil d'administration puisse délibérer valablement.
Les décisions sont prises au consensus et, à défaut, à la majorité des voix des présents. Le vote par procuration n'est pas autorisé.
\section{Modification des statuts de l'association}
Sur demande d'un tiers des membres actifs, ou sur demande du conseil d'administration, des amendements aux statuts de l'association peuvent être discutés et soumis au vote lors d'une assemblée générale, selon les modalités de l'article~\ref{article:ag}.
\end{document}

View File

@ -1,3 +0,0 @@
# Documents administatifs
__Statuts__ : Pour compiler les statuts, faites `latexmk -pdf statuts.tex`

View File

@ -1,15 +0,0 @@
# ANSIBLE
## How to proceed
For each machine, **one by one** do:
- Check that cluster is healthy
- `sudo gluster peer status`
- `sudo gluster volume status all` (check Online Col, only `Y` must appear)
- Check that Nomad is healthy
- Check that Consul is healthy
- Check that Postgres is healthy
- Run `ansible-playbook -i production --limit <machine> site.yml`
- Reboot
- Check that cluster is healthy

View File

@ -1,4 +0,0 @@
[cluster_nodes]
veterini ansible_host=fbx-rennes2.machine.deuxfleurs.fr ansible_port=110 ansible_user=root public_ip=192.168.1.2 private_ip=192.168.1.2 interface=eno1 dns_server=80.67.169.40
silicareux ansible_host=fbx-rennes2.machine.deuxfleurs.fr ansible_port=111 ansible_user=root public_ip=192.168.1.3 private_ip=192.168.1.3 interface=eno1 dns_server=80.67.169.40
wonse ansible_host=fbx-rennes2.machine.deuxfleurs.fr ansible_port=112 ansible_user=root public_ip=192.168.1.4 private_ip=192.168.1.4 interface=eno1 dns_server=80.67.169.40

View File

@ -1,2 +0,0 @@
nameserver {{ private_ip }}
nameserver {{ dns_server }}

View File

@ -1,12 +0,0 @@
# WARNING!! When rules.{v4,v6} are changed, the whole iptables configuration is reloaded.
# This creates issues with Docker, which injects its own configuration in iptables when it starts.
# In practice, most (all?) containers will break if rules.{v4,v6} are changed,
# and docker will have to be restared.
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
COMMIT

View File

@ -1,11 +0,0 @@
- name: "Deploy iptablesv4 configuration"
template: src=rules.v4.j2 dest=/etc/iptables/rules.v4
- name: "Deploy iptablesv6 configuration"
copy: src=rules.v6 dest=/etc/iptables/rules.v6
- name: "Activate IP forwarding"
sysctl:
name: net.ipv4.ip_forward
value: "1"
sysctl_set: yes

View File

@ -1,34 +0,0 @@
addresses {
http = "0.0.0.0"
rpc = "0.0.0.0"
serf = "0.0.0.0"
}
advertise {
http = "{{ public_ip }}"
rpc = "{{ public_ip }}"
serf = "{{ public_ip }}"
}
data_dir = "/var/lib/nomad"
server {
enabled = true
bootstrap_expect = 3
}
consul {
address="127.0.0.1:8500"
}
client {
enabled = true
#cpu_total_compute = 4000
servers = ["127.0.0.1:4648"]
network_interface = "{{ interface }}"
options {
docker.privileged.enabled = "true"
docker.volumes.enabled = "true"
}
}

View File

@ -1,3 +0,0 @@
---
- name: umount gluster
shell: umount --force --lazy /mnt/glusterfs ; true

View File

@ -1,72 +0,0 @@
- name: "Add GlusterFS Repo Key"
apt_key:
url: https://download.gluster.org/pub/gluster/glusterfs/5/rsa.pub
state: present
- name: "Add GlusterFS official repository"
apt_repository:
repo: "deb [arch=amd64] https://download.gluster.org/pub/gluster/glusterfs/5/LATEST/Debian/buster/amd64/apt buster main"
state: present
filename: gluster
- name: "Install GlusterFS"
apt:
name:
- glusterfs-server
- glusterfs-client
state: present
- name: "Ensure Gluster Daemon started and enabled"
service:
name: glusterd
enabled: yes
state: started
- name: "Create directory for GlusterFS bricks"
file: path=/mnt/storage/glusterfs/brick1 recurse=yes state=directory
- name: "Create GlusterFS volumes"
gluster_volume:
state: present
name: donnees
bricks: /mnt/storage/glusterfs/brick1/g1
#rebalance: yes
redundancies: 1
disperses: 3
#replicas: 3
force: yes
options:
client.event-threads: "8"
server.event-threads: "8"
performance.stat-prefetch: "on"
nfs.disable: "on"
features.cache-invalidation: "on"
performance.client-io-threads: "on"
config.transport: tcp
performance.quick-read: "on"
performance.io-cache: "on"
nfs.export-volumes: "off"
cluster.lookup-optimize: "on"
cluster: "{% for selected_host in groups['cluster_nodes'] %}{{ hostvars[selected_host]['private_ip'] }}{{ ',' if not loop.last else '' }}{% endfor %}"
run_once: true
- name: "Create mountpoint"
file: path=/mnt/glusterfs recurse=yes state=directory
- name: "Flush handlers (umount glusterfs and restart ganesha)"
meta: flush_handlers
- name: "Add fstab entry"
tags: gluster-fstab
mount:
path: /mnt/glusterfs
src: "{{ private_ip }}:/donnees"
fstype: glusterfs
opts: "defaults,_netdev,noauto,x-systemd.automount"
state: present
- name: Mount everything
command: mount -a
args:
warn: no

2
app/.gitignore vendored Normal file
View File

@ -0,0 +1,2 @@
env/
__pycache__

66
app/README.md Normal file
View File

@ -0,0 +1,66 @@
# Folder hierarchy
- `<module>/build/<image_name>/`: folders with dockerfiles and other necessary resources for building container images
- `<module>/config/`: folder containing configuration files, referenced by deployment file
- `<module>/secrets/`: folder containing secrets, which can be synchronized with Consul using `secretmgr.py`
- `<module>/deploy/`: folder containing the HCL file(s) necessary for deploying the module
- `<module>/integration/`: folder containing files for integration testing using docker-compose
# Secret Manager `secretmgr.py`
The Secret Manager ensures that all secrets are present where they should in the cluster.
**You need access to the cluster** (SSH port forwarding) for it to find any secret on the cluster. Refer to the previous directory's [README](../README.md), at the bottom of the file.
## How to install `secretmgr.py` dependencies
```bash
### Install system dependencies first:
## On fedora
dnf install -y openldap-devel cyrus-sasl-devel
## On ubuntu
apt-get install -y libldap2-dev libsasl2-dev
### Now install the Python dependencies from requirements.txt:
## Either using a virtual environment
# (requires virtualenv python module)
python3 -m virtualenv env
# Must be done everytime you create a new terminal window in this folder:
. env/bin/activate
# Install the deps
pip install -r requirements.txt
## Either by installing the dependencies for your system user:
pip3 install --user -r requirements.txt
```
## How to use `secretmgr.py`
Check that all secrets are correctly deployed for app `dummy`:
```bash
./secretmgr.py check dummy
```
Generate secrets for app `dummy` if they don't already exist:
```bash
./secretmgr.py gen dummy
```
Rotate secrets for app `dummy`, overwriting existing ones (be careful, this is dangerous!):
```bash
./secretmgr.py regen dummy
```
# Upgrading one of our packaged apps to a new version
1. Edit `docker-compose.yml`
2. Change the `VERSION` variable to the desired version
3. Increment the docker image tag by 1 (eg: superboum/riot:v13 -> superboum/riot:v14)
4. Run `docker-compose build`
5. Run `docker-compose push`
6. Done

View File

@ -0,0 +1,28 @@
FROM golang:buster as builder
WORKDIR /root
RUN git clone https://filippo.io/age && cd age/cmd/age && go build -o age .
FROM amd64/debian:buster
COPY --from=builder /root/age/cmd/age/age /usr/local/bin/age
RUN apt-get update && \
apt-get -qq -y full-upgrade && \
apt-get install -y rsync wget openssh-client unzip && \
apt-get clean && \
rm -f /var/lib/apt/lists/*_*
RUN mkdir -p /root/.ssh
WORKDIR /root
RUN wget https://releases.hashicorp.com/consul/1.8.5/consul_1.8.5_linux_amd64.zip && \
unzip consul_1.8.5_linux_amd64.zip && \
chmod +x consul && \
mv consul /usr/local/bin && \
rm consul_1.8.5_linux_amd64.zip
COPY do_backup.sh /root/do_backup.sh
CMD "/root/do_backup.sh"

View File

@ -0,0 +1,20 @@
#!/bin/sh
set -x -e
cd /root
chmod 0600 .ssh/id_ed25519
cat > .ssh/config <<EOF
Host backuphost
HostName $TARGET_SSH_HOST
Port $TARGET_SSH_PORT
User $TARGET_SSH_USER
EOF
consul kv export | \
gzip | \
age -r "$(cat /root/.ssh/id_ed25519.pub)" | \
ssh backuphost "cat > $TARGET_SSH_DIR/consul/$(date --iso-8601=minute)_consul_kv_export.gz.age"

View File

@ -0,0 +1 @@
result

View File

@ -0,0 +1,8 @@
## Build
```bash
docker load < $(nix-build docker.nix)
docker push superboum/backup-psql:???
```

View File

@ -0,0 +1,106 @@
#!/usr/bin/env python3
import shutil,sys,os,datetime,minio,subprocess
working_directory = "."
if 'CACHE_DIR' in os.environ: working_directory = os.environ['CACHE_DIR']
required_space_in_bytes = 20 * 1024 * 1024 * 1024
bucket = os.environ['AWS_BUCKET']
key = os.environ['AWS_ACCESS_KEY_ID']
secret = os.environ['AWS_SECRET_ACCESS_KEY']
endpoint = os.environ['AWS_ENDPOINT']
pubkey = os.environ['CRYPT_PUBLIC_KEY']
psql_host = os.environ['PSQL_HOST']
psql_user = os.environ['PSQL_USER']
s3_prefix = str(datetime.datetime.now())
files = [ "backup_manifest", "base.tar.gz", "pg_wal.tar.gz" ]
clear_paths = [ os.path.join(working_directory, f) for f in files ]
crypt_paths = [ os.path.join(working_directory, f) + ".age" for f in files ]
s3_keys = [ s3_prefix + "/" + f for f in files ]
def abort(msg):
for p in clear_paths + crypt_paths:
if os.path.exists(p):
print(f"Remove {p}")
os.remove(p)
if msg: sys.exit(msg)
else: print("success")
# Check we have enough space on disk
if shutil.disk_usage(working_directory).free < required_space_in_bytes:
abort(f"Not enough space on disk at path {working_directory} to perform a backup, aborting")
# Check postgres password is set
if 'PGPASSWORD' not in os.environ:
abort(f"You must pass postgres' password through the environment variable PGPASSWORD")
# Check our working directory is empty
if len(os.listdir(working_directory)) != 0:
abort(f"Working directory {working_directory} is not empty, aborting")
# Check Minio
client = minio.Minio(endpoint, key, secret)
if not client.bucket_exists(bucket):
abort(f"Bucket {bucket} does not exist or its access is forbidden, aborting")
# Perform the backup locally
try:
ret = subprocess.run(["pg_basebackup",
f"--host={psql_host}",
f"--username={psql_user}",
f"--pgdata={working_directory}",
f"--format=tar",
"--wal-method=stream",
"--gzip",
"--compress=6",
"--progress",
"--max-rate=5M",
])
if ret.returncode != 0:
abort(f"pg_basebackup exited, expected return code 0, got {ret.returncode}. aborting")
except Exception as e:
abort(f"pg_basebackup raised exception {e}. aborting")
# Check that the expected files are here
for p in clear_paths:
print(f"Checking that {p} exists locally")
if not os.path.exists(p):
abort(f"File {p} expected but not found, aborting")
# Cipher them
for c, e in zip(clear_paths, crypt_paths):
print(f"Ciphering {c} to {e}")
try:
ret = subprocess.run(["age", "-r", pubkey, "-o", e, c])
if ret.returncode != 0:
abort(f"age exit code is {ret}, 0 expected. aborting")
except Exception as e:
abort(f"aged raised an exception. {e}. aborting")
# Upload the backup to S3
for p, k in zip(crypt_paths, s3_keys):
try:
print(f"Uploading {p} to {k}")
result = client.fput_object(bucket, k, p)
print(
"created {0} object; etag: {1}, version-id: {2}".format(
result.object_name, result.etag, result.version_id,
),
)
except Exception as e:
abort(f"Exception {e} occured while upload {p}. aborting")
# Check that the files have been uploaded
for k in s3_keys:
try:
print(f"Checking that {k} exists remotely")
result = client.stat_object(bucket, k)
print(
"last-modified: {0}, size: {1}".format(
result.last_modified, result.size,
),
)
except Exception as e:
abort(f"{k} not found on S3. {e}. aborting")
abort(None)

View File

@ -0,0 +1,8 @@
{
pkgsSrc = fetchTarball {
# Latest commit on https://github.com/NixOS/nixpkgs/tree/nixos-21.11
# As of 2022-04-15
url ="https://github.com/NixOS/nixpkgs/archive/2f06b87f64bc06229e05045853e0876666e1b023.tar.gz";
sha256 = "sha256:1d7zg96xw4qsqh7c89pgha9wkq3rbi9as3k3d88jlxy2z0ns0cy2";
};
}

View File

@ -0,0 +1,37 @@
let
common = import ./common.nix;
pkgs = import common.pkgsSrc {};
python-with-my-packages = pkgs.python3.withPackages (p: with p; [
minio
]);
in
pkgs.stdenv.mkDerivation {
name = "backup-psql";
src = pkgs.lib.sourceFilesBySuffices ./. [ ".py" ];
buildInputs = [
python-with-my-packages
pkgs.age
pkgs.postgresql_14
];
buildPhase = ''
cat > backup-psql <<EOF
#!${pkgs.bash}/bin/bash
export PYTHONPATH=${python-with-my-packages}/${python-with-my-packages.sitePackages}
export PATH=${python-with-my-packages}/bin:${pkgs.age}/bin:${pkgs.postgresql_14}/bin
${python-with-my-packages}/bin/python3 $out/lib/backup-psql.py
EOF
chmod +x backup-psql
'';
installPhase = ''
mkdir -p $out/{bin,lib}
cp *.py $out/lib/backup-psql.py
cp backup-psql $out/bin/backup-psql
'';
}

View File

@ -0,0 +1,11 @@
let
common = import ./common.nix;
app = import ./default.nix;
pkgs = import common.pkgsSrc {};
in
pkgs.dockerTools.buildImage {
name = "superboum/backup-psql-docker";
config = {
Cmd = [ "${app}/bin/backup-psql" ];
};
}

View File

@ -0,0 +1,171 @@
job "backup_daily" {
datacenters = ["dc1"]
type = "batch"
priority = "60"
periodic {
cron = "@daily"
// Do not allow overlapping runs.
prohibit_overlap = true
}
group "backup-dovecot" {
constraint {
attribute = "${attr.unique.hostname}"
operator = "="
value = "digitale"
}
task "main" {
driver = "docker"
config {
image = "restic/restic:0.12.1"
entrypoint = [ "/bin/sh", "-c" ]
args = [ "restic backup /mail && restic forget --keep-within 1m1d --keep-within-weekly 3m --keep-within-monthly 1y && restic prune --max-unused 50% --max-repack-size 2G && restic check" ]
volumes = [
"/mnt/ssd/mail:/mail"
]
}
template {
data = <<EOH
AWS_ACCESS_KEY_ID={{ key "secrets/email/dovecot/backup_aws_access_key_id" }}
AWS_SECRET_ACCESS_KEY={{ key "secrets/email/dovecot/backup_aws_secret_access_key" }}
RESTIC_REPOSITORY={{ key "secrets/email/dovecot/backup_restic_repository" }}
RESTIC_PASSWORD={{ key "secrets/email/dovecot/backup_restic_password" }}
EOH
destination = "secrets/env_vars"
env = true
}
resources {
cpu = 500
memory = 200
}
restart {
attempts = 2
interval = "30m"
delay = "15s"
mode = "fail"
}
}
}
group "backup-plume" {
constraint {
attribute = "${attr.unique.hostname}"
operator = "="
value = "digitale"
}
task "main" {
driver = "docker"
config {
image = "restic/restic:0.12.1"
entrypoint = [ "/bin/sh", "-c" ]
args = [ "restic backup /plume && restic forget --keep-within 1m1d --keep-within-weekly 3m --keep-within-monthly 1y && restic prune --max-unused 50% --max-repack-size 2G && restic check" ]
volumes = [
"/mnt/ssd/plume/media:/plume"
]
}
template {
data = <<EOH
AWS_ACCESS_KEY_ID={{ key "secrets/plume/backup_aws_access_key_id" }}
AWS_SECRET_ACCESS_KEY={{ key "secrets/plume/backup_aws_secret_access_key" }}
RESTIC_REPOSITORY={{ key "secrets/plume/backup_restic_repository" }}
RESTIC_PASSWORD={{ key "secrets/plume/backup_restic_password" }}
EOH
destination = "secrets/env_vars"
env = true
}
resources {
cpu = 500
memory = 200
}
restart {
attempts = 2
interval = "30m"
delay = "15s"
mode = "fail"
}
}
}
group "backup-consul" {
task "consul-kv-export" {
driver = "docker"
lifecycle {
hook = "prestart"
sidecar = false
}
config {
image = "consul:1.11.2"
network_mode = "host"
entrypoint = [ "/bin/sh", "-c" ]
args = [ "/bin/consul kv export > $NOMAD_ALLOC_DIR/consul.json" ]
}
env {
CONSUL_HTTP_ADDR = "http://consul.service.2.cluster.deuxfleurs.fr:8500"
}
resources {
cpu = 200
memory = 200
}
restart {
attempts = 2
interval = "30m"
delay = "15s"
mode = "fail"
}
}
task "restic-backup" {
driver = "docker"
config {
image = "restic/restic:0.12.1"
entrypoint = [ "/bin/sh", "-c" ]
args = [ "restic backup $NOMAD_ALLOC_DIR/consul.json && restic forget --keep-within 1m1d --keep-within-weekly 3m --keep-within-monthly 1y && restic prune --max-unused 50% --max-repack-size 2G && restic check" ]
}
template {
data = <<EOH
AWS_ACCESS_KEY_ID={{ key "secrets/backup/consul/backup_aws_access_key_id" }}
AWS_SECRET_ACCESS_KEY={{ key "secrets/backup/consul/backup_aws_secret_access_key" }}
RESTIC_REPOSITORY={{ key "secrets/backup/consul/backup_restic_repository" }}
RESTIC_PASSWORD={{ key "secrets/backup/consul/backup_restic_password" }}
EOH
destination = "secrets/env_vars"
env = true
}
resources {
cpu = 200
memory = 200
}
restart {
attempts = 2
interval = "30m"
delay = "15s"
mode = "fail"
}
}
}
}

View File

@ -0,0 +1,55 @@
job "backup_weekly" {
datacenters = ["dc1"]
type = "batch"
priority = "60"
periodic {
cron = "@weekly"
// Do not allow overlapping runs.
prohibit_overlap = true
}
group "backup-psql" {
task "main" {
driver = "docker"
config {
image = "superboum/backup-psql-docker:gyr3aqgmhs0hxj0j9hkrdmm1m07i8za2"
volumes = [
// Mount a cache on the hard disk to avoid filling the SSD
"/mnt/storage/tmp_bckp_psql:/mnt/cache"
]
}
template {
data = <<EOH
CACHE_DIR=/mnt/cache
AWS_BUCKET=backups-pgbasebackup
AWS_ENDPOINT=s3.deuxfleurs.shirokumo.net
AWS_ACCESS_KEY_ID={{ key "secrets/backup/psql/aws_access_key_id" }}
AWS_SECRET_ACCESS_KEY={{ key "secrets/backup/psql/aws_secret_access_key" }}
CRYPT_PUBLIC_KEY={{ key "secrets/backup/psql/crypt_public_key" }}
PSQL_HOST=psql-proxy.service.2.cluster.deuxfleurs.fr
PSQL_USER={{ key "secrets/postgres/keeper/pg_repl_username" }}
PGPASSWORD={{ key "secrets/postgres/keeper/pg_repl_pwd" }}
EOH
destination = "secrets/env_vars"
env = true
}
resources {
cpu = 200
memory = 200
}
restart {
attempts = 2
interval = "30m"
delay = "15s"
mode = "fail"
}
}
}
}

View File

@ -0,0 +1,67 @@
job "backup_periodic" {
datacenters = ["dc1"]
type = "batch"
periodic {
// Launch every hour
cron = "0 * * * * *"
// Do not allow overlapping runs.
prohibit_overlap = true
}
task "backup-consul" {
driver = "docker"
config {
image = "lxpz/backup_consul:12"
volumes = [
"secrets/id_ed25519:/root/.ssh/id_ed25519",
"secrets/id_ed25519.pub:/root/.ssh/id_ed25519.pub",
"secrets/known_hosts:/root/.ssh/known_hosts"
]
network_mode = "host"
}
env {
CONSUL_HTTP_ADDR = "http://consul.service.2.cluster.deuxfleurs.fr:8500"
}
template {
data = <<EOH
TARGET_SSH_USER={{ key "secrets/backup/target_ssh_user" }}
TARGET_SSH_PORT={{ key "secrets/backup/target_ssh_port" }}
TARGET_SSH_HOST={{ key "secrets/backup/target_ssh_host" }}
TARGET_SSH_DIR={{ key "secrets/backup/target_ssh_dir" }}
EOH
destination = "secrets/env_vars"
env = true
}
template {
data = "{{ key \"secrets/backup/id_ed25519\" }}"
destination = "secrets/id_ed25519"
}
template {
data = "{{ key \"secrets/backup/id_ed25519.pub\" }}"
destination = "secrets/id_ed25519.pub"
}
template {
data = "{{ key \"secrets/backup/target_ssh_fingerprint\" }}"
destination = "secrets/known_hosts"
}
resources {
memory = 200
}
restart {
attempts = 2
interval = "30m"
delay = "15s"
mode = "fail"
}
}
}

View File

@ -0,0 +1 @@
USER Backup AWS access key ID

View File

@ -0,0 +1 @@
USER Backup AWS secret access key

View File

@ -0,0 +1 @@
USER Restic password to encrypt backups

View File

@ -0,0 +1 @@
USER Restic repository, eg. s3:https://s3.garage.tld

View File

@ -0,0 +1 @@
USER_LONG Private ed25519 key of the container doing the backup

View File

@ -0,0 +1 @@
USER Public ed25519 key of the container doing the backup (this key must be in authorized_keys on the backup target host)

View File

@ -0,0 +1 @@
USER Minio access key

View File

@ -0,0 +1 @@
USER Minio secret key

View File

@ -0,0 +1 @@
USER a private key to decript backups from age

View File

@ -0,0 +1 @@
USER A public key to encypt backups with age

View File

@ -0,0 +1 @@
USER Directory where to store backups on target host

View File

@ -0,0 +1 @@
USER SSH fingerprint of the target machine (format: copy here the corresponding line from your known_hosts file)

View File

@ -0,0 +1 @@
USER Hostname of the backup target host

View File

@ -0,0 +1 @@
USER SSH port number to connect to the target host

View File

@ -0,0 +1 @@
USER SSH username to log in as on the target host

View File

@ -0,0 +1,83 @@
job "bagage" {
datacenters = ["dc1"]
type = "service"
priority = 90
constraint {
attribute = "${attr.cpu.arch}"
value = "amd64"
}
group "main" {
count = 1
network {
port "web_port" { to = 8080 }
port "ssh_port" {
static = 2222
to = 2222
}
}
task "server" {
driver = "docker"
config {
image = "superboum/amd64_bagage:v11"
readonly_rootfs = false
volumes = [
"secrets/id_rsa:/id_rsa"
]
ports = [ "web_port", "ssh_port" ]
}
env {
BAGAGE_LDAP_ENDPOINT = "bottin2.service.2.cluster.deuxfleurs.fr:389"
}
resources {
memory = 500
}
template {
data = "{{ key \"secrets/bagage/id_rsa\" }}"
destination = "secrets/id_rsa"
}
service {
name = "bagage-ssh"
port = "ssh_port"
address_mode = "host"
tags = [
"bagage",
"(diplonat (tcp_port 2222))"
]
}
service {
name = "bagage-webdav"
tags = [
"bagage",
"traefik.enable=true",
"traefik.frontend.entryPoints=https,http",
"traefik.frontend.rule=Host:bagage.deuxfleurs.fr",
"tricot bagage.deuxfleurs.fr",
]
port = "web_port"
address_mode = "host"
check {
type = "tcp"
port = "web_port"
address_mode = "host"
interval = "60s"
timeout = "5s"
check_restart {
limit = 3
grace = "90s"
ignore_warnings = false
}
}
}
}
}
}

View File

@ -0,0 +1 @@
CMD ssh-keygen -q -f >(cat) -N "" <<< y 2>/dev/null 1>&2 ; true

View File

@ -1,6 +1,7 @@
job "core" {
datacenters = ["dc1"]
datacenters = ["dc1", "neptune"]
type = "system"
priority = 90
constraint {
attribute = "${attr.cpu.arch}"
@ -17,15 +18,21 @@ job "core" {
driver = "docker"
config {
image = "darkgallium/amd64_diplonat:v2"
image = "lxpz/amd64_diplonat:3"
network_mode = "host"
readonly_rootfs = true
privileged = true
privileged = true
}
restart {
interval = "30m"
attempts = 2
delay = "15s"
mode = "delay"
}
template {
data = <<EOH
DIPLONAT_PRIVATE_IP={{ env "attr.unique.network.ip-address" }}
DIPLONAT_REFRESH_TIME=60
DIPLONAT_EXPIRATION_TIME=300
DIPLONAT_CONSUL_NODE_NAME={{ env "attr.unique.hostname" }}

View File

@ -0,0 +1,2 @@
docker load < $(nix-build docker.nix)
docker push superboum/cryptpad:???

View File

@ -0,0 +1,8 @@
{
pkgsSrc = fetchTarball {
# Latest commit on https://github.com/NixOS/nixpkgs/tree/nixos-21.11
# As of 2022-04-15
url ="https://github.com/NixOS/nixpkgs/archive/2f06b87f64bc06229e05045853e0876666e1b023.tar.gz";
sha256 = "sha256:1d7zg96xw4qsqh7c89pgha9wkq3rbi9as3k3d88jlxy2z0ns0cy2";
};
}

View File

@ -0,0 +1,10 @@
let
common = import ./common.nix;
pkgs = import common.pkgsSrc {};
in
pkgs.dockerTools.buildImage {
name = "superboum/cryptpad";
config = {
Cmd = [ "${pkgs.cryptpad}/bin/cryptpad" ];
};
}

View File

@ -0,0 +1,283 @@
/* globals module */
/* DISCLAIMER:
There are two recommended methods of running a CryptPad instance:
1. Using a standalone nodejs server without HTTPS (suitable for local development)
2. Using NGINX to serve static assets and to handle HTTPS for API server's websocket traffic
We do not officially recommend or support Apache, Docker, Kubernetes, Traefik, or any other configuration.
Support requests for such setups should be directed to their authors.
If you're having difficulty difficulty configuring your instance
we suggest that you join the project's IRC/Matrix channel.
If you don't have any difficulty configuring your instance and you'd like to
support us for the work that went into making it pain-free we are quite happy
to accept donations via our opencollective page: https://opencollective.com/cryptpad
*/
module.exports = {
/* CryptPad is designed to serve its content over two domains.
* Account passwords and cryptographic content is handled on the 'main' domain,
* while the user interface is loaded on a 'sandbox' domain
* which can only access information which the main domain willingly shares.
*
* In the event of an XSS vulnerability in the UI (that's bad)
* this system prevents attackers from gaining access to your account (that's good).
*
* Most problems with new instances are related to this system blocking access
* because of incorrectly configured sandboxes. If you only see a white screen
* when you try to load CryptPad, this is probably the cause.
*
* PLEASE READ THE FOLLOWING COMMENTS CAREFULLY.
*
*/
/* httpUnsafeOrigin is the URL that clients will enter to load your instance.
* Any other URL that somehow points to your instance is supposed to be blocked.
* The default provided below assumes you are loading CryptPad from a server
* which is running on the same machine, using port 3000.
*
* In a production instance this should be available ONLY over HTTPS
* using the default port for HTTPS (443) ie. https://cryptpad.fr
* In such a case this should be also handled by NGINX, as documented in
* cryptpad/docs/example.nginx.conf (see the $main_domain variable)
*
*/
httpUnsafeOrigin: 'http://localhost:3000',
/* httpSafeOrigin is the URL that is used for the 'sandbox' described above.
* If you're testing or developing with CryptPad on your local machine then
* it is appropriate to leave this blank. The default behaviour is to serve
* the main domain over port 3000 and to serve the sandbox content over port 3001.
*
* This is not appropriate in a production environment where invasive networks
* may filter traffic going over abnormal ports.
* To correctly configure your production instance you must provide a URL
* with a different domain (a subdomain is sufficient).
* It will be used to load the UI in our 'sandbox' system.
*
* This value corresponds to the $sandbox_domain variable
* in the example nginx file.
*
* Note that in order for the sandboxing system to be effective
* httpSafeOrigin must be different from httpUnsafeOrigin.
*
* CUSTOMIZE AND UNCOMMENT THIS FOR PRODUCTION INSTALLATIONS.
*/
// httpSafeOrigin: "https://some-other-domain.xyz",
/* httpAddress specifies the address on which the nodejs server
* should be accessible. By default it will listen on 127.0.0.1
* (IPv4 localhost on most systems). If you want it to listen on
* all addresses, including IPv6, set this to '::'.
*
*/
httpAddress: '::',
/* httpPort specifies on which port the nodejs server should listen.
* By default it will serve content over port 3000, which is suitable
* for both local development and for use with the provided nginx example,
* which will proxy websocket traffic to your node server.
*
*/
//httpPort: 3000,
/* httpSafePort allows you to specify an alternative port from which
* the node process should serve sandboxed assets. The default value is
* that of your httpPort + 1. You probably don't need to change this.
*
*/
//httpSafePort: 3001,
/* CryptPad will launch a child process for every core available
* in order to perform CPU-intensive tasks in parallel.
* Some host environments may have a very large number of cores available
* or you may want to limit how much computing power CryptPad can take.
* If so, set 'maxWorkers' to a positive integer.
*/
// maxWorkers: 4,
/* =====================
* Admin
* ===================== */
/*
* CryptPad contains an administration panel. Its access is restricted to specific
* users using the following list.
* To give access to the admin panel to a user account, just add their public signing
* key, which can be found on the settings page for registered users.
* Entries should be strings separated by a comma.
*/
/*
adminKeys: [
//"[cryptpad-user1@my.awesome.website/YZgXQxKR0Rcb6r6CmxHPdAGLVludrAF2lEnkbx1vVOo=]",
],
*/
/* =====================
* STORAGE
* ===================== */
/* Pads that are not 'pinned' by any registered user can be set to expire
* after a configurable number of days of inactivity (default 90 days).
* The value can be changed or set to false to remove expiration.
* Expired pads can then be removed using a cron job calling the
* `evict-inactive.js` script with node
*
* defaults to 90 days if nothing is provided
*/
//inactiveTime: 90, // days
/* CryptPad archives some data instead of deleting it outright.
* This archived data still takes up space and so you'll probably still want to
* remove these files after a brief period.
*
* cryptpad/scripts/evict-inactive.js is intended to be run daily
* from a crontab or similar scheduling service.
*
* The intent with this feature is to provide a safety net in case of accidental
* deletion. Set this value to the number of days you'd like to retain
* archived data before it's removed permanently.
*
* defaults to 15 days if nothing is provided
*/
//archiveRetentionTime: 15,
/* It's possible to configure your instance to remove data
* stored on behalf of inactive accounts. Set 'accountRetentionTime'
* to the number of days an account can remain idle before its
* documents and other account data is removed.
*
* Leave this value commented out to preserve all data stored
* by user accounts regardless of inactivity.
*/
//accountRetentionTime: 365,
/* Starting with CryptPad 3.23.0, the server automatically runs
* the script responsible for removing inactive data according to
* your configured definition of inactivity. Set this value to `true`
* if you prefer not to remove inactive data, or if you prefer to
* do so manually using `scripts/evict-inactive.js`.
*/
//disableIntegratedEviction: true,
/* Max Upload Size (bytes)
* this sets the maximum size of any one file uploaded to the server.
* anything larger than this size will be rejected
* defaults to 20MB if no value is provided
*/
//maxUploadSize: 20 * 1024 * 1024,
/* Users with premium accounts (those with a plan included in their customLimit)
* can benefit from an increased upload size limit. By default they are restricted to the same
* upload size as any other registered user.
*
*/
//premiumUploadSize: 100 * 1024 * 1024,
/* =====================
* DATABASE VOLUMES
* ===================== */
/*
* CryptPad stores each document in an individual file on your hard drive.
* Specify a directory where files should be stored.
* It will be created automatically if it does not already exist.
*/
filePath: './root/tmp/mut/datastore/',
/* CryptPad offers the ability to archive data for a configurable period
* before deleting it, allowing a means of recovering data in the event
* that it was deleted accidentally.
*
* To set the location of this archive directory to a custom value, change
* the path below:
*/
archivePath: './root/tmp/mut/data/archive',
/* CryptPad allows logged in users to request that particular documents be
* stored by the server indefinitely. This is called 'pinning'.
* Pin requests are stored in a pin-store. The location of this store is
* defined here.
*/
pinPath: './root/tmp/mut/data/pins',
/* if you would like the list of scheduled tasks to be stored in
a custom location, change the path below:
*/
taskPath: './root/tmp/mut/data/tasks',
/* if you would like users' authenticated blocks to be stored in
a custom location, change the path below:
*/
blockPath: './root/tmp/mut/block',
/* CryptPad allows logged in users to upload encrypted files. Files/blobs
* are stored in a 'blob-store'. Set its location here.
*/
blobPath: './root/tmp/mut/blob',
/* CryptPad stores incomplete blobs in a 'staging' area until they are
* fully uploaded. Set its location here.
*/
blobStagingPath: './root/tmp/mut/data/blobstage',
decreePath: './root/tmp/mut/data/decrees',
/* CryptPad supports logging events directly to the disk in a 'logs' directory
* Set its location here, or set it to false (or nothing) if you'd rather not log
*/
logPath: './root/tmp/mut/data/logs',
/* =====================
* Debugging
* ===================== */
/* CryptPad can log activity to stdout
* This may be useful for debugging
*/
logToStdout: true,
/* CryptPad can be configured to log more or less
* the various settings are listed below by order of importance
*
* silly, verbose, debug, feedback, info, warn, error
*
* Choose the least important level of logging you wish to see.
* For example, a 'silly' logLevel will display everything,
* while 'info' will display 'info', 'warn', and 'error' logs
*
* This will affect both logging to the console and the disk.
*/
logLevel: 'debug',
/* clients can use the /settings/ app to opt out of usage feedback
* which informs the server of things like how much each app is being
* used, and whether certain clientside features are supported by
* the client's browser. The intent is to provide feedback to the admin
* such that the service can be improved. Enable this with `true`
* and ignore feedback with `false` or by commenting the attribute
*
* You will need to set your logLevel to include 'feedback'. Set this
* to false if you'd like to exclude feedback from your logs.
*/
logFeedback: false,
/* CryptPad supports verbose logging
* (false by default)
*/
verbose: true,
/* Surplus information:
*
* 'installMethod' is included in server telemetry to voluntarily
* indicate how many instances are using unofficial installation methods
* such as Docker.
*
*/
installMethod: 'unspecified',
};

View File

@ -0,0 +1,27 @@
{
"suffix": "dc=deuxfleurs,dc=fr",
"bind": "0.0.0.0:389",
"consul_host": "http://consul.service.2.cluster.deuxfleurs.fr:8500",
"log_level": "debug",
"acl": [
"*,dc=deuxfleurs,dc=fr::read:*:* !userpassword !user_secret !alternate_user_secrets !garage_s3_secret_key",
"*::read modify:SELF:*",
"ANONYMOUS::bind:*,ou=users,dc=deuxfleurs,dc=fr:",
"ANONYMOUS::bind:cn=admin,dc=deuxfleurs,dc=fr:",
"*,ou=services,ou=users,dc=deuxfleurs,dc=fr::bind:*,ou=users,dc=deuxfleurs,dc=fr:*",
"*,ou=services,ou=users,dc=deuxfleurs,dc=fr::read:*:*",
"*:cn=asso_deuxfleurs,ou=groups,dc=deuxfleurs,dc=fr:add:*,ou=invitations,dc=deuxfleurs,dc=fr:*",
"ANONYMOUS::bind:*,ou=invitations,dc=deuxfleurs,dc=fr:",
"*,ou=invitations,dc=deuxfleurs,dc=fr::delete:SELF:*",
"*:cn=asso_deuxfleurs,ou=groups,dc=deuxfleurs,dc=fr:add:*,ou=users,dc=deuxfleurs,dc=fr:*",
"*,ou=invitations,dc=deuxfleurs,dc=fr::add:*,ou=users,dc=deuxfleurs,dc=fr:*",
"*:cn=asso_deuxfleurs,ou=groups,dc=deuxfleurs,dc=fr:modifyAdd:cn=email,ou=groups,dc=deuxfleurs,dc=fr:*",
"*,ou=invitations,dc=deuxfleurs,dc=fr::modifyAdd:cn=email,ou=groups,dc=deuxfleurs,dc=fr:*",
"cn=admin,dc=deuxfleurs,dc=fr::read add modify delete:*:*",
"*:cn=admin,ou=groups,dc=deuxfleurs,dc=fr:read add modify delete:*:*"
]
}

View File

@ -12,19 +12,23 @@
"invitation_name_attr": "cn",
"invited_mail_format": "{}@deuxfleurs.fr",
"invited_auto_groups": [
"cn=email,ou=groups,dc=deuxfleurs,dc=fr",
"cn=seafile,ou=groups,dc=deuxfleurs,dc=fr",
"cn=nextcloud,ou=groups,dc=deuxfleurs,dc=fr"
"cn=email,ou=groups,dc=deuxfleurs,dc=fr"
],
"web_address": "https://guichet.deuxfleurs.fr",
"mail_from": "coucou@deuxfleurs.fr",
"mail_from": "deuxfleurs-bienvenue@adnab.me",
"smtp_server": "adnab.me:25",
"smtp_username": "{{ key "secrets/directory/guichet/smtp_user" | trimSpace }}",
"smtp_password": "{{ key "secrets/directory/guichet/smtp_pass" | trimSpace }}",
"admin_account": "cn=admin,dc=deuxfleurs,dc=fr",
"group_can_admin": "cn=admin,ou=groups,dc=deuxfleurs,dc=fr",
"group_can_invite": "cn=asso_deuxfleurs,ou=groups,dc=deuxfleurs,dc=fr"
"group_can_invite": "cn=asso_deuxfleurs,ou=groups,dc=deuxfleurs,dc=fr",
"s3_endpoint": "garage.deuxfleurs.fr",
"s3_access_key": "{{ key "secrets/directory/guichet/s3_access_key" | trimSpace }}",
"s3_secret_key": "{{ key "secrets/directory/guichet/s3_secret_key" | trimSpace }}",
"s3_region": "garage",
"s3_bucket": "bottin-pictures"
}

View File

@ -1,6 +1,7 @@
job "directory2" {
job "directory" {
datacenters = ["dc1"]
type = "service"
priority = 90
constraint {
attribute = "${attr.cpu.arch}"
@ -9,14 +10,21 @@ job "directory2" {
group "bottin" {
count = 1
network {
port "ldap_port" {
static = 389
to = 389
}
}
task "bottin" {
driver = "docker"
config {
image = "lxpz/bottin_amd64:14"
image = "superboum/bottin_amd64:22"
network_mode = "host"
readonly_rootfs = true
port_map {
ldap_port = 1389
}
ports = [ "ldap_port" ]
volumes = [
"secrets/config.json:/config.json"
]
@ -24,15 +32,10 @@ job "directory2" {
resources {
memory = 100
network {
port "ldap_port" {
static = "389"
}
}
}
template {
data = "{{ key \"configuration/directory/bottin/config.json\" }}"
data = file("../config/bottin/config.json")
destination = "secrets/config.json"
}
@ -56,36 +59,32 @@ job "directory2" {
}
}
/*
group "guichet" {
count = 1
network {
port "web_port" { to = 9991 }
}
task "guichet" {
driver = "docker"
config {
image = "lxpz/guichet_amd64:10"
image = "dxflrs/guichet:6y7pv4kgfsn02iijj55kf5af0rbksgrn"
readonly_rootfs = true
port_map {
web_port = 9991
}
ports = [ "web_port" ]
volumes = [
"secrets/config.json:/config.json"
]
}
artifact {
source = "http://127.0.0.1:8500/v1/kv/configuration/directory/guichet/config.json.tpl?raw"
destination = "secrets/config.json.tpl"
mode = "file"
}
template {
source = "secrets/config.json.tpl"
data = file("../config/guichet/config.json.tpl")
destination = "secrets/config.json"
}
resources {
memory = 200
network {
port "web_port" {}
}
}
service {
@ -95,6 +94,7 @@ job "directory2" {
"traefik.enable=true",
"traefik.frontend.entryPoints=https,http",
"traefik.frontend.rule=Host:guichet.deuxfleurs.fr",
"tricot guichet.deuxfleurs.fr",
]
port = "web_port"
address_mode = "host"
@ -112,5 +112,6 @@ job "directory2" {
}
}
}
*/
}

View File

@ -0,0 +1 @@
USER Garage access key for Guichet profile pictures

View File

@ -0,0 +1 @@
USER Garage secret key for Guichet profile pictures

View File

@ -0,0 +1 @@
USER SMTP password

View File

@ -0,0 +1 @@
USER SMTP username

108
app/docker-compose.yml Normal file
View File

@ -0,0 +1,108 @@
version: '3.4'
services:
# Instant Messaging
riot:
build:
context: ./im/build/riotweb
args:
# https://github.com/vector-im/riot-web/releases
VERSION: 1.10.15
image: superboum/amd64_riotweb:v30
synapse:
build:
context: ./im/build/matrix-synapse
args:
# https://github.com/matrix-org/synapse/releases
VERSION: 1.61.1
# https://github.com/matrix-org/synapse-s3-storage-provider/commits/main
# Update with the latest commit on main each time you update the synapse version
# otherwise synapse may fail to launch due to incompatibility issues
# see this issue for an example: https://github.com/matrix-org/synapse-s3-storage-provider/issues/64
S3_VERSION: ffd3fa477321608e57d27644197e721965e0e858
image: superboum/amd64_synapse:v53
# Email
sogo:
build:
context: ./email/build/sogo
args:
# fake for now
VERSION: 5.0.0
image: superboum/amd64_sogo:v7
alps:
build:
context: ./email/build/alps
args:
VERSION: 9bafa64b9d
image: superboum/amd64_alps:v1
dovecot:
build:
context: ./email/build/dovecot
image: superboum/amd64_dovecot:v6
# VoIP
jitsi-meet:
build:
context: ./jitsi/build/jitsi-meet
args:
# https://github.com/jitsi/jitsi-meet
MEET_TAG: stable/jitsi-meet_6826
image: superboum/amd64_jitsi_meet:v5
jitsi-conference-focus:
build:
context: ./jitsi/build/jitsi-conference-focus
args:
# https://github.com/jitsi/jicofo
JICOFO_TAG: stable/jitsi-meet_6826
image: superboum/amd64_jitsi_conference_focus:v9
jitsi-videobridge:
build:
context: ./jitsi/build/jitsi-videobridge
args:
# https://github.com/jitsi/jitsi-videobridge
# note: JVB is not tagged with non-stable tags
JVB_TAG: stable/jitsi-meet_6826
image: superboum/amd64_jitsi_videobridge:v20
jitsi-xmpp:
build:
context: ./jitsi/build/jitsi-xmpp
args:
MEET_TAG: stable/jitsi-meet_6826
PROSODY_VERSION: 0.11.12-1
image: superboum/amd64_jitsi_xmpp:v10
plume:
build:
context: ./plume/build/plume
args:
VERSION: 8709f6cf9f8ff7e3c5ee7ea699ee7c778e92fefc
image: superboum/plume:v8
postfix:
build:
context: ./email/build/postfix
args:
# https://packages.debian.org/fr/buster/postfix
VERSION: 3.4.14-0+deb10u1
image: superboum/amd64_postfix:v3
postgres:
build:
args:
# https://github.com/sorintlab/stolon/releases
STOLON_VERSION: 3bb7499f815f77140551eb762b200cf4557f57d3
context: ./postgres/build/postgres
image: superboum/amd64_postgres:v11
backup-consul:
build:
context: ./backup/build/backup-consul
image: lxpz/backup_consul:12

View File

@ -0,0 +1,127 @@
job "drone-ci" {
datacenters = ["dc1"]
type = "service"
group "server" {
count = 1
network {
port "web_port" {
to = 80
}
}
task "drone_server" {
driver = "docker"
config {
image = "drone/drone:2.12.0"
ports = [ "web_port" ]
}
template {
data = <<EOH
DRONE_GITEA_SERVER=https://git.deuxfleurs.fr
DRONE_GITEA_CLIENT_ID={{ key "secrets/drone-ci/oauth_client_id" }}
DRONE_GITEA_CLIENT_SECRET={{ key "secrets/drone-ci/oauth_client_secret" }}
DRONE_RPC_SECRET={{ key "secrets/drone-ci/rpc_secret" }}
DRONE_SERVER_HOST=drone.deuxfleurs.fr
DRONE_SERVER_PROTO=https
DRONE_DATABASE_SECRET={{ key "secrets/drone-ci/db_enc_secret" }}
DRONE_COOKIE_SECRET={{ key "secrets/drone-ci/cookie_secret" }}
AWS_ACCESS_KEY_ID={{ key "secrets/drone-ci/s3_ak" }}
AWS_SECRET_ACCESS_KEY={{ key "secrets/drone-ci/s3_sk" }}
AWS_DEFAULT_REGION=garage
AWS_REGION=garage
DRONE_S3_BUCKET={{ key "secrets/drone-ci/s3_bucket" }}
DRONE_S3_ENDPOINT=https://garage.deuxfleurs.fr
DRONE_S3_PATH_STYLE=true
DRONE_DATABASE_DRIVER=postgres
DRONE_DATABASE_DATASOURCE=postgres://{{ key "secrets/drone-ci/db_user" }}:{{ key "secrets/drone-ci/db_pass" }}@psql-proxy.service.2.cluster.deuxfleurs.fr:5432/drone?sslmode=disable
DRONE_USER_CREATE=username:lx-admin,admin:true
DRONE_REGISTRATION_CLOSED=true
DRONE_LOGS_TEXT=true
DRONE_LOGS_PRETTY=true
DRONE_LOGS_DEBUG=true
DOCKER_API_VERSION=1.39
EOH
destination = "secrets/env"
env = true
}
resources {
cpu = 100
memory = 100
}
service {
name = "drone"
tags = [
"drone",
"traefik.enable=true",
"traefik.frontend.entryPoints=https,http",
"traefik.frontend.rule=Host:drone.deuxfleurs.fr",
"tricot drone.deuxfleurs.fr",
]
port = "web_port"
address_mode = "host"
check {
type = "http"
protocol = "http"
port = "web_port"
path = "/"
interval = "60s"
timeout = "5s"
check_restart {
limit = 3
grace = "600s"
ignore_warnings = false
}
}
}
}
}
/*
group "runner" {
count = 3
constraint {
operator = "distinct_hosts"
value = "true"
}
task "drone_runner" {
driver = "docker"
config {
network_mode = "host"
#image = "drone/drone-runner-nomad:latest"
image = "drone/drone-runner-docker:1.6.3"
volumes = [
"/var/run/docker.sock:/var/run/docker.sock"
]
}
template {
data = <<EOH
DRONE_RPC_SECRET={{ key "secrets/drone-ci/rpc_secret" }}
DRONE_RPC_HOST=drone.deuxfleurs.fr
DRONE_RPC_PROTO=https
DRONE_RUNNER_NAME={{ env "node.unique.name" }}
DRONE_DEBUG=true
NOMAD_ADDR=http://nomad-client.service.2.cluster.deuxfleurs.fr:4646
DOCKER_API_VERSION=1.39
EOH
destination = "secrets/env"
env = true
}
resources {
memory = 40
cpu = 50
}
}
}
*/
}

View File

@ -0,0 +1,69 @@
## Install Debian
We recommend Debian Bullseye
## Install Docker CE from docker.io
Do not use the docker engine shipped by Debian
Doc:
- https://docs.docker.com/engine/install/debian/
- https://docs.docker.com/compose/install/
On a fresh install, as root:
```bash
apt-get remove -y docker docker-engine docker.io containerd runc
apt-get update
apt-get install apt-transport-https ca-certificates curl gnupg lsb-release
curl -fsSL https://download.docker.com/linux/debian/gpg | sudo gpg --dearmor -o /usr/share/keyrings/docker-archive-keyring.gpg
echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/docker-archive-keyring.gpg] https://download.docker.com/linux/debian $(lsb_release -cs) stable" | tee /etc/apt/sources.list.d/docker.list > /dev/null
apt-get update
apt-get install -y docker-ce docker-ce-cli containerd.io
curl -L "https://github.com/docker/compose/releases/download/1.29.2/docker-compose-$(uname -s)-$(uname -m)" -o /usr/local/bin/docker-compose
chmod +x /usr/local/bin/docker-compose
```
## Install the runner
*This is our Nix runner version 2, previously we had another way to start Nix runners. This one has a proper way to handle concurrency, require less boilerplate, and should be safer and more idiomatic.*
```bash
wget https://git.deuxfleurs.fr/Deuxfleurs/infrastructure/raw/branch/main/app/drone-ci/integration/nix.conf
wget https://git.deuxfleurs.fr/Deuxfleurs/infrastructure/raw/branch/main/app/drone-ci/integration/docker-compose.yml
# Edit the docker-compose.yml to adapt its variables to your needs,
# especially the capacitiy value and its name.
COMPOSE_PROJECT_NAME=drone DRONE_SECRET=xxx docker-compose up -d
```
That's all folks.
## Check if a given job is built by your runner
```bash
export URL=https://drone.deuxfleurs.fr
export REPO=Deuxfleurs/garage
export BUILD=1312
curl ${URL}/api/repos/${REPO}/builds/${BUILD} \
| jq -c '[.stages[] | { name: .name, machine: .machine }]'
```
It will give you the following result:
```json
[{"name":"default","machine":"1686a"},{"name":"release-linux-x86_64","machine":"vimaire"},{"name":"release-linux-i686","machine":"carcajou"},{"name":"release-linux-aarch64","machine":"caribou"},{"name":"release-linux-armv6l","machine":"cariacou"},{"name":"refresh-release-page","machine":null}]
```
## Random note
*This part might be deprecated!*
This setup is done mainly to allow nix builds with some cache.
To use the cache in Drone, you must set your repository as trusted.
The command line tool does not work (it says it successfully set your repository as trusted but it did nothing):
the only way to set your repository as trusted is to connect on the DB and set the `repo_trusted` field of your repo to true.

View File

@ -0,0 +1,54 @@
version: '3.4'
services:
nix-daemon:
image: nixpkgs/nix:nixos-22.05
restart: always
command: nix-daemon
privileged: true
volumes:
- "nix:/nix"
- "./nix.conf:/etc/nix/nix.conf:ro"
drone-runner:
image: drone/drone-runner-docker:latest
restart: always
environment:
- DRONE_RPC_PROTO=https
- DRONE_RPC_HOST=drone.deuxfleurs.fr
- DRONE_RPC_SECRET=${DRONE_SECRET}
- DRONE_RUNNER_CAPACITY=3
- DRONE_DEBUG=true
- DRONE_LOGS_TRACE=true
- DRONE_RPC_DUMP_HTTP=true
- DRONE_RPC_DUMP_HTTP_BODY=true
- DRONE_RUNNER_NAME=i_forgot_to_change_my_runner_name
- DRONE_RUNNER_LABELS=nix-daemon:1
# we should put "nix:/nix:ro but it is not supported by
# drone-runner-docker because the dependency envconfig does
# not support having two colons (:) in the same stanza.
# Without the RO flag (or using docker userns), build isolation
# is broken.
# https://discourse.drone.io/t/allow-mounting-a-host-volume-as-read-only/10071
# https://github.com/kelseyhightower/envconfig/pull/153
#
# A workaround for isolation is to configure docker with a userns,
# so even if the folder is writable to root, it is not to any non
# privileged docker daemon ran by drone!
- DRONE_RUNNER_VOLUMES=drone_nix:/nix
- DRONE_RUNNER_ENVIRON=NIX_REMOTE:daemon
ports:
- "3000:3000/tcp"
volumes:
- "/var/run/docker.sock:/var/run/docker.sock"
drone-gc:
image: drone/gc:latest
restart: always
environment:
- GC_DEBUG=true
- GC_CACHE=10gb
- GC_INTERVAL=10m
volumes:
- "/var/run/docker.sock:/var/run/docker.sock"
volumes:
nix:

View File

@ -0,0 +1,9 @@
substituters = https://cache.nixos.org https://nix.web.deuxfleurs.fr
trusted-public-keys = cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= nix.web.deuxfleurs.fr:eTGL6kvaQn6cDR/F9lDYUIP9nCVR/kkshYfLDJf1yKs=
max-jobs = auto
cores = 0
log-lines = 200
filter-syscalls = true
sandbox = true
keep-outputs = true
keep-derivations = true

View File

@ -0,0 +1 @@
CMD openssl rand -hex 16

View File

@ -0,0 +1 @@
CMD_ONCE openssl rand -hex 16

View File

@ -0,0 +1 @@
SERVICE_PASSWORD drone

View File

@ -0,0 +1 @@
CONST drone

View File

@ -0,0 +1 @@
USER OAuth client ID (on Gitea)

View File

@ -0,0 +1 @@
USER OAuth client secret (for gitea)

View File

@ -0,0 +1 @@
CMD openssl rand -hex 16

View File

@ -0,0 +1 @@
USER S3 (garage) access key for Drone

View File

@ -0,0 +1 @@
CONST drone

View File

@ -0,0 +1 @@
USER S3 (garage) secret key for Drone

View File

@ -0,0 +1 @@
CMD head -c 10 /dev/urandom | base64

View File

@ -0,0 +1 @@
CONST this is a constant

View File

@ -0,0 +1,5 @@
CONST_LONG
this is a
constant
on several
lines

View File

@ -0,0 +1 @@
SERVICE_DN dummy Dummy service for testing secretmgr.py

View File

@ -0,0 +1 @@
SERVICE_PASSWORD dummy

View File

@ -0,0 +1 @@
USER Test user value

View File

@ -0,0 +1,20 @@
FROM golang:1.15.6-buster as builder
ARG VERSION
ENV CGO_ENABLED=0 GOOS=linux GOARCH=amd64
WORKDIR /tmp/alps
RUN git init && \
git remote add origin https://git.deuxfleurs.fr/Deuxfleurs/alps.git && \
git fetch --depth 1 origin ${VERSION} && \
git checkout FETCH_HEAD
RUN go build -a -o /usr/local/bin/alps ./cmd/alps
FROM scratch
COPY --from=builder /usr/local/bin/alps /alps
COPY --from=builder /tmp/alps/themes /themes
COPY --from=builder /tmp/alps/plugins /plugins
COPY --from=builder /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/ca-certificates.crt
ENTRYPOINT ["/alps"]

View File

@ -1,4 +1,4 @@
FROM amd64/debian:stretch
FROM amd64/debian:bullseye
RUN apt-get update && \
apt-get install -y \
@ -11,7 +11,6 @@ RUN apt-get update && \
dovecot-lmtpd && \
rm -rf /etc/dovecot/*
RUN useradd mailstore
COPY ./conf/* /etc/dovecot/
COPY entrypoint.sh /usr/local/bin/entrypoint
ENTRYPOINT ["/usr/local/bin/entrypoint"]

View File

@ -0,0 +1,5 @@
require ["fileinto", "mailbox"];
if header :contains "X-Spam-Flag" "YES" {
fileinto :create "Junk";
}

View File

@ -0,0 +1,8 @@
hosts = ldap.example.com
dn = cn=admin,dc=example,dc=com
dnpass = s3cr3t
base = dc=example,dc=com
scope = subtree
user_filter = (&(mail=%u)(&(objectClass=inetOrgPerson)(memberOf=cn=email,ou=groups,dc=example,dc=com)))
pass_filter = (&(mail=%u)(&(objectClass=inetOrgPerson)(memberOf=cn=email,ou=groups,dc=example,dc=com)))
user_attrs = mail=/var/mail/%{ldap:mail}

View File

@ -0,0 +1,17 @@
require ["vnd.dovecot.pipe", "copy", "imapsieve", "environment", "variables", "vnd.dovecot.debug"];
if environment :matches "imap.mailbox" "*" {
set "mailbox" "${1}";
}
if string "${mailbox}" "Trash" {
stop;
}
if environment :matches "imap.user" "*" {
set "username" "${1}";
}
pipe :copy "sa-learn" [ "--ham", "-u", "debian-spamd" ];
debug_log "ham reported by ${username}";

View File

@ -0,0 +1,9 @@
require ["vnd.dovecot.pipe", "copy", "imapsieve", "environment", "variables", "vnd.dovecot.debug"];
if environment :matches "imap.user" "*" {
set "username" "${1}";
}
pipe :copy "sa-learn" [ "--spam", "-u", "debian-spamd"];
debug_log "spam reported by ${username}";

View File

@ -1,8 +1,10 @@
FROM amd64/debian:buster
ARG VERSION
RUN apt-get update && \
apt-get install -y \
postfix \
postfix=$VERSION \
postfix-ldap
COPY entrypoint.sh /usr/local/bin/entrypoint

View File

@ -26,5 +26,6 @@ for file in $(ls /etc/postfix-conf); do
done
echo ${MAILNAME} > /etc/mailname
postmap /etc/postfix/transport
exec "$@"

View File

@ -1,6 +1,6 @@
#FROM amd64/debian:stretch as builder
FROM amd64/debian:stretch
FROM amd64/debian:buster
RUN mkdir ~/.gnupg && echo "disable-ipv6" >> ~/.gnupg/dirmngr.conf
@ -8,7 +8,7 @@ RUN apt-get update && \
apt-get install -y apt-transport-https gnupg2 sudo nginx && \
rm -rf /etc/nginx/sites-enabled/* && \
apt-key adv --keyserver keys.gnupg.net --recv-key 0x810273C4 && \
echo "deb https://packages.inverse.ca/SOGo/nightly/4/debian stretch stretch" > /etc/apt/sources.list.d/sogo.list && \
echo "deb http://packages.inverse.ca/SOGo/nightly/5/debian/ buster buster" > /etc/apt/sources.list.d/sogo.list && \
apt-get update && \
apt-get install -y sogo sogo-activesync sope4.9-gdl1-postgresql postgresql-client

View File

@ -0,0 +1,83 @@
server {
listen 8080;
server_name default_server;
root /usr/lib/GNUstep/SOGo/WebServerResources/;
## requirement to create new calendars in Thunderbird ##
proxy_http_version 1.1;
# Message size limit
client_max_body_size 50m;
client_body_buffer_size 128k;
location = / {
rewrite ^ '/SOGo';
allow all;
}
location = /principals/ {
rewrite ^ '/SOGo/dav';
allow all;
}
location ^~/SOGo {
proxy_pass 'http://127.0.0.1:20000';
proxy_redirect 'http://127.0.0.1:20000' default;
# forward user's IP address
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $host;
proxy_set_header x-webobjects-server-protocol HTTP/1.0;
proxy_set_header x-webobjects-remote-host 127.0.0.1;
proxy_set_header x-webobjects-server-name $server_name;
proxy_set_header x-webobjects-server-url $scheme://$host;
proxy_set_header x-webobjects-server-port $server_port;
proxy_connect_timeout 90;
proxy_send_timeout 90;
proxy_read_timeout 90;
proxy_buffer_size 4k;
proxy_buffers 4 32k;
proxy_busy_buffers_size 64k;
proxy_temp_file_write_size 64k;
break;
}
location /SOGo.woa/WebServerResources/ {
alias /usr/lib/GNUstep/SOGo/WebServerResources/;
allow all;
expires max;
}
location /SOGo/WebServerResources/ {
alias /usr/lib/GNUstep/SOGo/WebServerResources/;
allow all;
expires max;
}
location (^/SOGo/so/ControlPanel/Products/([^/]*)/Resources/(.*)$) {
alias /usr/lib/GNUstep/SOGo/$1.SOGo/Resources/$2;
expires max;
}
location (^/SOGo/so/ControlPanel/Products/[^/]*UI/Resources/.*\.(jpg|png|gif|css|js)$) {
alias /usr/lib/GNUstep/SOGo/$1.SOGo/Resources/$2;
expires max;
}
location ^~ /Microsoft-Server-ActiveSync {
access_log /var/log/nginx/activesync.log;
error_log /var/log/nginx/activesync-error.log;
proxy_connect_timeout 75;
proxy_send_timeout 3600;
proxy_read_timeout 3600;
proxy_buffers 64 256k;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass http://127.0.0.1:20000/SOGo/Microsoft-Server-ActiveSync;
proxy_redirect http://127.0.0.1:20000/SOGo/Microsoft-Server-ActiveSync /;
}
}

Some files were not shown because too many files have changed in this diff Show More